Beruflich Dokumente
Kultur Dokumente
1 out of 1 points
System requirements serve as benchmarks to measure the overall acceptability of
a finished system.
Selected Answer:
Correct Answer:
True
True
Question
1 out of 1 points
True
True
Question
1 out of 1 points
False
False
1 out of 1 points
Correct
Answer:
Question
1 out of 1 points
Question
6
Selected Answer:
Correct Answer:
Examples of tangible benefits include all of the following except a(n) ____.
Selected
Answer:
Correct Answer:
Question
1 out of 1 points
In a sequence diagram, the interaction proceeds from left to right along horizontal
arrows, while a vertical timeline represents messages from one object to another.
Selected Answer:
Correct Answer:
False
False
Question
1 out of 1 points
Internal factors that affect IT systems projects include all of the following except
____.
Selected Answer:
the economy
Correct Answer:
the economy
Question
1 out of 1 points
False
False
1 out of 1 points
Question
11
Selected
Answer:
Correct
Answer:
Selected
Answer:
Correct Answer:
Question
12
1 out of 1 points
Supporters of neutral locations for interviews believe that it ____.
Selected
Answer:
Correct
Answer:
Question
13
1 out of 1 points
A horizontal system is designed to meet the unique requirements of a specific
business or industry, such as a Web-based retailer, a medical practice, or a video
chain.
Selected Answer:
Correct Answer:
False
False
Question
14
1 out of 1 points
All of the following are common reasons for systems requests except ____.
Selected Answer:
weaker controls
Correct Answer:
weaker controls
Question
15
1 out of 1 points
The main objective of all RAD approaches is to extend development time and
expense by excluding users from every phase of systems development.
Selected Answer:
Correct Answer:
False
False
Question
16
1 out of 1 points
Examples of company-wide applications, called ____, include order processing
systems, payroll systems, and company communications networks.
Selected Answer:
enterprise applications
Correct Answer:
enterprise applications
Question
17
1 out of 1 points
Product-oriented companies primarily offer information or services or sell goods
produced by others.
Selected Answer:
Correct Answer:
False
False
Question
18
1 out of 1 points
A systems request might propose enhancements for an existing system, the
correction of problems, or the development of an entirely new information
system.
Selected Answer:
Correct Answer:
True
True
Question
19
1 out of 1 points
Knowledge management systems are called expert systems because they ____.
Selected
Answer:
Correct
Answer:
Question
20
1 out of 1 points
When preparing a checklist of specific tasks to observe and questions to ask, a
systems analyst should consider ____.
Selected Answer:
Correct Answer:
Question
21
1 out of 1 points
A systems request form should not ____.
Question
Selected Answer:
Correct Answer:
22
In an information system, information consists of basic facts that are the
system’s raw material.
Selected Answer:
Correct Answer:
False
False
Question
23
1 out of 1 points
In a typical company organizational model, middle managers ____.
Selected
Answer:
Correct
Answer:
Question
24
1 out of 1 points
Each activity within the systems analysis phase has an end product and one or
more milestones.
Selected Answer:
Correct Answer:
True
True
Question
25
1 out of 1 points
Performance limitations result when a system that was designed for a specific
hardware configuration becomes obsolete when new hardware is introduced.
Selected Answer:
Correct Answer:
Question
26
True
True
1 out of 1 points
Question
27
Selected
Answer:
Correct
Answer:
Question
28
Selected
Answer:
Correct
Answer:
Traditionally, the SDLC is pictured as a(n) ____, like that shown in the
accompanying figure, where the result of each phase, which is called a
deliverable or end product, flows sequentially into the next phase.
Selected Answer:
waterfall model
Correct Answer:
waterfall model
Question
29
1 out of 1 points
When planning an information system, a company must consider how a new
system will interface with older systems, which are called ____.
Selected Answer:
legacy systems
Correct Answer:
legacy systems
Question
30
1 out of 1 points
In many large companies, applications called enterprise resource planning
(ERP) systems provide cost-effective support for users and managers throughout
the company.
Selected Answer:
Correct Answer:
True
True
Question
31
1 out of 1 points
In an information system, data is information that has been transformed into
output that is valuable to users.
Selected Answer:
Correct Answer:
Question
32
False
False
1 out of 1 points
Question
33
Selected Answer:
operational feasibility
Correct Answer:
operational feasibility
1 out of 1 points
Selected Answer:
Correct Answer:
False
False
Question
34
1 out of 1 points
To evaluate ____, a systems analyst needs information about projected future
volume for all outputs, inputs, and processes.
Selected Answer:
scalability
Correct Answer:
scalability
Question
35
1 out of 1 points
Greater user involvement in the system development process usually results in
poorer communication, slower development times, and less satisfied users.
Selected Answer:
Correct Answer:
False
False
Question
36
1 out of 1 points
Examples of intangible benefits include all of the following except a(n) ____.
Selected
Answer:
Correct
Answer:
Question
37
1 out of 1 points
The ____ phase of the SDLC includes four main activities: requirements
modeling, data and process modeling, object modeling, and consideration of
development strategies.
Selected Answer:
systems analysis
Correct Answer:
systems analysis
Question
38
1 out of 1 points
In object-oriented programming, an object is a member of a(n) ____, which is a
collection of similar objects.
Selected Answer:
class
Correct Answer:
class
Question
39
1 out of 1 points
Creating an FDD is different from drawing an organization chart —
systems analysts start at the bottom and work their way up.
Selected Answer:
Correct Answer:
False
False
Question
40
1 out of 1 points
Systems requests seldom are aimed at improving service to customers or users
within a company.
Selected Answer:
Correct Answer:
False
False
Question
41
1 out of 1 points
The primary advantage of RAD is that ____.
Selected
Answer:
Correct
Answer:
Question
42
1 out of 1 points
TP systems are inefficient because they process a set of transaction-related
commands individually rather than as a group.
Selected Answer:
Correct Answer:
False
False
Question
43
1 out of 1 points
While RAD typically focuses only on fact-finding and requirements
determination, JAD provides a fast-track approach to a full spectrum of system
development tasks, including planning, design, construction, and
implementation.
Selected Answer:
Correct Answer:
Question
False
False
1 out of 1 points
44
____ is a traditional, time-tested, easy to understand systems development
technique that uses a set of process models to describe a system graphically.
Selected Answer:
Structured analysis
Correct Answer:
Structured analysis
Question
45
1 out of 1 points
A risk of RAD is that a system might work well in the short term, but the
corporate and long-term objectives for the system might not be met.
Selected Answer:
Correct Answer:
True
True
Question
46
1 out of 1 points
____ is an example of a discretionary project.
Selected Answer:
Correct Answer:
Question
47
1 out of 1 points
A(n) ____ describes the logic that programmers use to write code modules.
Selected Answer:
process model
Correct Answer:
process model
Question
48
0 out of 1 points
In an interview, ____ are questions that ask a person to evaluate something by
providing limited answers to specific responses or on a numeric scale.
Question
49
Selected Answer:
closed-ended questions
Correct Answer:
range-of-response questions
1 out of 1 points
IBM claims that its WebSphere strategy is best for Web-based application
development, while Microsoft counters with a broad vision called .NET that
redefines that company’s approach to Web-based application
development.
Selected Answer:
Correct Answer:
True
True
Question
50
1 out of 1 points
Hardware-based security controls include passwords, various levels of user
access, and coding data.
Selected Answer:
Correct Answer:
False
False
Question
51
1 out of 1 points
A business process describes a specific set of transactions, events, tasks, and
results.
Selected Answer:
Correct Answer:
True
True
Question
52
1 out of 1 points
A ____, or requirements model, describes the information that a system must
provide.
Selected Answer:
business model
Correct Answer:
business model
Question
53
1 out of 1 points
Compared with traditional methods, the entire RAD process is expanded and, as
a result, the new system is built, delivered, and placed in operation much later.
Selected Answer:
Correct Answer:
False
False
Question
54
1 out of 1 points
As users rely more heavily on information systems to perform their jobs, they
are likely to request even more IT services and support.
Selected Answer:
Correct Answer:
Question
55
True
True
1 out of 1 points
True
True
Question
56
1 out of 1 points
Business support systems ____.
Selected
Answer:
Correct
Answer:
Question
57
1 out of 1 points
When setting priorities for systems requests, the highest priority goes to projects
that provide the ____.
Selected
Answer:
Correct Answer:
Question
58
1 out of 1 points
System requirements fall into five general categories: outputs, inputs, processes,
performance, and controls.
Selected Answer:
Correct Answer:
True
True
Question
59
1 out of 1 points
A SWOT analysis contributes to the strategic planning process by identifying
____ resources.
Question
60
Selected Answer:
Correct Answer:
times greater.
Selected Answer:
Correct Answer:
False
False
Question
61
1 out of 1 points
IT professionals recognize that successful systems must be user-oriented, and
users need to be involved, formally or informally, at every stage of systems
development.
Selected Answer:
Correct Answer:
True
True
Question
62
1 out of 1 points
Transaction processing (TP) systems ____.
Selected
Answer:
Correct Answer:
Question
63
1 out of 1 points
Traditionally, a company either developed its own information systems, called
in-house applications, or purchased systems called software packages from
outside vendors.
Selected Answer:
Correct Answer:
Question
64
True
True
1 out of 1 points
Question
65
Selected
Answer:
Correct
Answer:
System analysts use modeling and fact-finding interactively — first they
build fact-finding results into models, then they study the models to determine
whether additional fact-finding is needed.
Selected Answer:
Correct Answer:
True
True
Question
66
1 out of 1 points
In a typical company organizational model, top managers ____.
Selected
Answer:
Correct
Answer:
Question
67
1 out of 1 points
Using a(n) ____, an analyst can show business functions and break them down
into lower-level functions and processes.
Selected Answer:
FDD
Correct Answer:
FDD
Question
68
1 out of 1 points
When companies attempt to simplify operations or reduce costs, a popular
strategy is to have managers and systems analysts perform ____.
Selected Answer:
Correct Answer:
Question
69
1 out of 1 points
Compared with traditional methods, when properly used, JAD can result in all
of the following except ____.
Question
70
Selected
Answer:
Correct Answer:
closed-ended questions
Correct Answer:
closed-ended questions
Question
71
1 out of 1 points
Because use cases depict a system through the eyes of a user, common business
language can be used to describe the transactions.
Selected Answer:
Correct Answer:
True
True
Question
72
1 out of 1 points
A company’s mission statement is unrelated to its major goals, shorterterm objectives, and day-to-day business operations.
Selected Answer:
Correct Answer:
False
False
Question
73
1 out of 1 points
Strategic planning looks beyond day-to-day activities and focuses on a horizon
that is 3, 5, or even 10 years in the future.
Selected Answer:
Correct Answer:
True
True
Question
74
1 out of 1 points
____ are especially important to a systems analyst who must work with people
at all organizational levels, balance conflicting needs of users, and communicate
effectively.
Question
75
Selected Answer:
Interpersonal skills
Correct Answer:
Interpersonal skills
1 out of 1 points
economic feasibility
Correct Answer:
economic feasibility
Question
76
1 out of 1 points
____ is a typical example of a system requirement for the process category.
Selected
Answer:
Correct
Answer:
Question
77
1 out of 1 points
Internal and external factors affect every business decision that a company
makes, and IT systems are no exception.
Selected Answer:
Correct Answer:
True
True
Question
78
1 out of 1 points
Because it is linked to a specific development methodology, systems developers
use JAD whenever group input and interaction is not desired.
Selected Answer:
Correct Answer:
False
False
Question
79
1 out of 1 points
External factors that affect IT systems projects include all of the following
except ____.
Selected Answer:
managers
Correct Answer:
managers
Question
80
1 out of 1 points
The purpose of a JIT (just-in-time) system is to provide the right product at the
right place at the right time.
Selected Answer:
Correct Answer:
True
True
Question
81
1 out of 1 points
Some industry experts predict that bar code technology will be overshadowed in
the future by electronic product code (EPC) technology that uses RFID tags to
identify and monitor the movement of each individual product.
Selected Answer:
Correct Answer:
Question
82
True
True
1 out of 1 points
Correct
Answer:
Question
83
1 out of 1 points
Management leadership and information technology are unconnected, and no
significant changes have occurred in either area.
Selected Answer:
Correct Answer:
Question
84
False
False
1 out of 1 points
Question
85
Selected Answer:
technical feasibility
Correct Answer:
technical feasibility
1 out of 1 points
____ software controls the flow of data, provides data security, and manages
network operations.
Selected Answer:
System
Correct Answer:
System
Question
86
1 out of 1 points
Of the measures of feasibility in the accompanying figure, issues that relate to
____ include “Has management established a firm timetable for the
project?” and “Will a project manager be appointed?”
Selected Answer:
schedule feasibility
Correct Answer:
schedule feasibility
Question
87
1 out of 1 points
When assessing priorities for systems requests, a systems analyst should look
for high scores in all of the following except ____.
Selected
Answer:
Correct Answer:
Question
88
1 out of 1 points
Because of the limited range of input and interaction among participants, few
companies believe that a JAD group produces the best definition of a new
system.
Selected Answer:
Correct Answer:
False
False
Question
89
1 out of 1 points
Application software manages hardware components, which can include a
single workstation or a global network with many thousands of clients.
Selected Answer:
Correct Answer:
Question
90
False
False
1 out of 1 points
Selected Answer:
Correct Answer:
False
False
Question
91
1 out of 1 points
The success or failure of an information system usually is unrelated to whether
users are satisfied with the system’s output and operations.
Selected Answer:
Correct Answer:
False
False
Question
92
1 out of 1 points
In an interview, ____ encourage spontaneous and unstructured responses.
Selected Answer:
open-ended questions
Correct Answer:
open-ended questions
Question
93
1 out of 1 points
A system must have effective controls to ensure that data is secure and accurate.
Selected Answer:
Correct Answer:
True
True
Question
94
1 out of 1 points
UML provides various graphical tools, such as use case diagrams and sequence
diagrams.
Selected Answer:
Correct Answer:
True
True
Question
95
1 out of 1 points
Service-oriented companies manufacture and sell products such as computers,
routers, or microchips.
Selected Answer:
Correct Answer:
Question
96
False
False
1 out of 1 points
Selected
Answer:
Correct
Answer:
Question
97
1 out of 1 points
A strong business case suggests that a company should pursue other options,
above the alternative, because it would be in the firm’s best interest to
do so.
Selected Answer:
Correct Answer:
False
False
Question
98
1 out of 1 points
Much of the time a systems analyst spends talking with people is spent
conducting ____, which is/are the most common fact-finding technique.
Selected Answer:
interviews
Correct Answer:
interviews
Question
99
1 out of 1 points
Data entry controls should be excessive without being effective.
Selected Answer:
Correct Answer:
False
False
Question 100
1 out of 1 points
RAD relies heavily on prototyping and user involvement.
Selected Answer:
Correct Answer:
Question 1
1 out of 1 points
When determining outsourcing fees, a ____ uses a set fee based on a specified
level of service and user support.
Correct Answer:
Question
2
True
True
redefining the way that companies develop and deploy their information systems.
Correct Answer:
software as a service
Question
1 out of 1 points
3
In a DFD, the Gane and Sarson symbol for an entity is a ____.
Correct
Answer:
Question
1 out of 1 points
Another term for IBS is managed hosting, because the operation is managed by
the outside firm, or host.
Correct Answer:
True
Question
1 out of 1 points
Question
1 out of 1 points
Question
1 out of 1 points
7
An object treats data and processes separately.
Correct Answer:
False
Question
1 out of 1 points
8
In a DFD, the Gane and Sarson symbol for a process is a ____.
Correct Answer:
Question
1 out of 1 points
9
A gray hole process is a process that has ____.
Correct
Answer:
at least one input and one output, but the input obviously is
too insufficient to generate the output shown
Question
10
1 out of 1 points
All of the following are true of a traditional systems development environment
except ____.
Correct
Answer:
Question
11
1 out of 1 points
When DFDs are drawn, each of the following conventions should be followed
except ____.
Correct Answer:
Question
12
1 out of 1 points
Which of the following is NOT an attribute of a car?
Correct Answer:
parking
Question
13
1 out of 1 points
Two Web-based development environments are IBM’s WebSphere and
Microsoft’s .NET.
Correct Answer:
True
Question
14
1 out of 1 points
Some data files should be totally hidden from view, while others should have
____ so users can view, but not change, the data.
Correct Answer:
Question
15
read-only properties
1 out of 1 points
Correct Answer:
True
Question
16
1 out of 1 points
Because diagram 0 is a more detailed or expanded version of process 0 on a
context diagram, diagram 0 is called a(n) ____.
Correct Answer:
exploded view
Question
17
1 out of 1 points
____ is a widely used method of visualizing and documenting an information
system.
Correct Answer:
UML
Question
18
1 out of 1 points
A logical model describes how a system will be constructed.
Correct Answer:
False
Question
19
1 out of 1 points
In a DFD, a process symbol can have only one outgoing data flow.
Correct Answer:
False
Question
20
1 out of 1 points
In a DFD, a data flow must have a process symbol on at least one end.
Correct Answer:
Question
21
True
1 out of 1 points
Typically, customers purchase licenses that give them the right to use the
software under the terms of the license agreement.
Correct Answer:
True
Question
22
1 out of 1 points
When companies use a ____, they already know the specific products or service
they want and need to obtain price quotations or bids from vendors.
Correct Answer:
Question
23
1 out of 1 points
Mergers and acquisitions typically have no impact on clients and customers of
large, financially healthy firms.
Correct Answer:
False
Question
24
1 out of 1 points
A gas pump is an example of a black box.
Correct Answer:
True
Question
25
1 out of 1 points
An IBS (Internet business services) solution is attractive to customers because it
offers online data center support, mainframe computing power for missioncritical functions, and universal access via the Internet.
Correct Answer:
True
Question
26
1 out of 1 points
Your car performs a(n) ____ called operate wipers when you send a message by
moving the proper control.
Correct Answer:
Question
27
method
1 out of 1 points
A company considering outsourcing must realize that the solution can be only as
good as the outsourcing firm that provides the service.
Correct Answer:
True
Question
28
1 out of 1 points
A black hole process is a process that has ____.
Correct Answer:
no output
Question
29
1 out of 1 points
In a use case, an external entity is called a(n) ____.
Correct Answer:
actor
Question
30
1 out of 1 points
Leveling ____.
Correct
Answer:
Question
31
1 out of 1 points
In a DFD, the Gane and Sarson symbol for a data store is a ____.
Correct
Answer:
Question
32
1 out of 1 points
Several years ago, Gartner, a leading IT research and consulting firm, accurately
forecast the enormous growth of offshore outsourcing.
Correct Answer:
True
Question
33
1 out of 1 points
A major advantage of O-O designs is that systems analysts can save time and
avoid errors by using modular objects.
Correct Answer:
Question
True
1 out of 1 points
34
An auto parts store inventory ____ might include part number, description,
supplier code, minimum and maximum stock levels, cost, and list price.
Correct Answer:
record
Question
35
1 out of 1 points
All of the following are true of Web-based development except ____.
Correct
Answer:
Question
36
1 out of 1 points
Mission-critical IT systems should be outsourced only if the result is a costattractive, reliable, business solution that fits the company’s long-term
business strategy.
Correct Answer:
True
Question
37
0 out of 1 points
Many valuable reports can be obtained from a data dictionary, including a(n)
____.
Correct Answer:
Question
38
1 out of 1 points
In a DFD, the Gane and Sarson symbol for a data flow is a ____.
Correct Answer:
Question
39
1 out of 1 points
Microsoft’s ____ is one of the major Web-based development
environments.
Correct Answer:
.NET
Question
40
1 out of 1 points
A data flow in a DFD represents one or more data items.
Correct Answer:
True
Question
41
1 out of 1 points
The number of attributes needed to describe an object depends on the business
requirements of the information system and its users.
Correct Answer:
True
Question
42
1 out of 1 points
An object’s ____ are the tasks or functions the object performs.
Correct Answer:
methods
Question
43
1 out of 1 points
A major advantage of outsourcing is that it eliminates employee concerns about
job security.
Correct Answer:
False
Question
44
1 out of 1 points
The UML symbol for a use case is a(n) ____ with a label that describes the
action or event.
Correct Answer:
oval
Question
45
1 out of 1 points
Using Gane and Sarson symbols, a DFD represents processes as circles.
Correct Answer:
False
Question
46
1 out of 1 points
A black box does not want or need outside interference.
Correct Answer:
True
Question
47
1 out of 1 points
The Software & Information Industry Association (SIIA) believes that the
acquisition of software as a service rather than a product will have a major
impact on the software industry.
Correct Answer:
True
Question
48
1 out of 1 points
Two data stores can be connected by a data flow without an intervening process.
Correct Answer:
False
Question
49
1 out of 1 points
Just as objects are similar to adjectives, attributes resemble verbs that describe
what and how an object does something.
Correct Answer:
False
Question
50
1 out of 1 points
A class can belong to a more general category called a subclass.
Correct Answer:
False
Question
51
1 out of 1 points
The concept that a message gives different meanings to different objects is
called encapsulation.
Correct Answer:
False
Question
52
1 out of 1 points
Oracle Corporation offers a service called ____, which provides E-business
applications on a fixed fee basis.
Correct Answer:
Oracle On Demand
Question
53
1 out of 1 points
Balancing ____.
Correct
Answer:
ensures that the input and output data flows of the parent
DFD are maintained on the child DFD
Question
54
1 out of 1 points
In data and process modeling, a(n) ____ model shows what the system must do,
regardless of how it will be implemented physically.
Correct Answer:
logical
Question
55
1 out of 1 points
The UML represents an object as a(n) ____ with the object name at the top,
followed by the object’s attributes and methods.
Correct Answer:
rectangle
Question
56
1 out of 1 points
When determining outsourcing fees, a ____ has a variable fee based on the
number of users or workstations that have access to the application.
Correct Answer:
subscription model
Question
57
1 out of 1 points
All relationships have equal weight; none is stronger than any other.
Correct Answer:
False
Question
58
0 out of 1 points
A method is like a blueprint, or template, for all the objects within a class.
Correct Answer:
False
Question
59
1 out of 1 points
A DFD shows the structure and detailed contents of a data flow.
Correct Answer:
False
Question
60
1 out of 1 points
In a traditional systems development environment, security issues usually are
less complex than with Web-based systems, because the system operates on a
private telecommunications network, rather than the Internet.
Correct Answer:
True
Question
61
1 out of 1 points
System analysts define an object’s attributes during the systems design
process.
Correct Answer:
True
Question
62
1 out of 1 points
An ASP provides a license to use the software, and nothing more.
Correct Answer:
False
Question
63
1 out of 1 points
A(n) ____ defines specific tasks that an object can perform.
Correct Answer:
method
Question
64
0 out of 1 points
The same message to two different objects produces the same results.
Correct Answer:
Question
65
False
1 out of 1 points
Correct Answer:
False
Question
66
1 out of 1 points
Spontaneous generation, black holes, and gray holes are logically impossible in
a DFD because a process must act on input, shown by an incoming data flow,
and produce output, represented by an outgoing data flow.
Correct Answer:
True
Question
67
1 out of 1 points
A use case ____ documents the name of the use case, the actor, a description of
the use case, a step-by-step list of the tasks and actions required for successful
completion, a description of alternative courses of action, preconditions,
postconditions, and assumptions.
Correct Answer:
description
Question
68
1 out of 1 points
Data flows are shown in a context diagram because data stores are external to
the system.
Correct Answer:
False
Question
69
1 out of 1 points
A software package that can be used by many different types of organizations is
called a vertical application.
Correct Answer:
False
Question
70
1 out of 1 points
Internet-based development treats the Web as just a communications channel,
rather than as a platform.
Correct Answer:
Question
False
1 out of 1 points
71
A DFD does not show the external entities that provide data to the system or
receive output from the system.
Correct Answer:
False
Question
72
1 out of 1 points
The ____ uses a set of symbols to represent graphically the various components
and relationships within a system.
Correct Answer:
UML
Question
73
1 out of 1 points
Late in the systems design phase, you build a logical model that describes how a
system will be constructed.
Correct Answer:
False
Question
74
1 out of 1 points
The main reason for offshore outsourcing is the same as domestic outsourcing:
lower bottom-line costs.
Correct Answer:
True
Question
75
1 out of 1 points
By limiting access to internal processes, an object prevents its internal code
from being altered by another object or process.
Correct Answer:
True
Question
76
1 out of 1 points
Systems analysts call an entity that supplies data to the system a sink, and an
entity that receives data from the system a source.
Correct Answer:
False
Question
77
1 out of 1 points
Typically, companies choose in-house software development for all of the
following reasons except to ____.
Correct
Answer:
Question
78
1 out of 1 points
Which of the following is not a path that development can follow?
Correct Answer:
Question
79
1 out of 1 points
DFD symbols are referenced by using all ____ letters for the symbol name.
Correct Answer:
capital
Question
80
1 out of 1 points
The data dictionary usually records and describes a default value, which is the
____.
Correct
Answer:
Question
81
1 out of 1 points
Leveling also is called ____.
Correct Answer:
Question
82
1 out of 1 points
The line from the actor to a use case is called a(n) ____.
Correct Answer:
Question
83
association
1 out of 1 points
Correct Answer:
False
Question
84
1 out of 1 points
Customer objects can perform specific tasks, such as placing an order, or paying
a bill.
Correct Answer:
True
Question
85
1 out of 1 points
A DFD does not show the detailed contents of a data store — the specific
structure and data elements are defined in the data dictionary.
Correct Answer:
True
Question
86
1 out of 1 points
A use case ____ is a visual summary of several related use cases within a
system or subsystem.
Correct Answer:
diagram
Question
87
0 out of 1 points
Advantages of purchasing a software package over developing software inhouse include all of the following except ____.
Correct Answer:
Question
88
1 out of 1 points
Inheritance enables an object to derive one or more of its attributes from a(n)
____.
Correct Answer:
parent
Question
89
0 out of 1 points
Buyers can customize a software package by ____.
Correct Answer:
Question
90
1 out of 1 points
Your red Mustang is a(n) ____ of the CAR class.
Correct Answer:
instance
Question
91
1 out of 1 points
Objects can have a specific attribute called a(n) ____, which describes the
object’s current status.
Correct Answer:
state
Question
92
1 out of 1 points
A physical model shows what the system must do, regardless of how it will be
implemented.
Correct Answer:
False
Question
93
1 out of 1 points
In a DFD, processes contain the business logic, also called business rules, that
transform the data and produce the required results.
Correct Answer:
True
Question
94
1 out of 1 points
Outsourcing can refer to ____.
Correct Answer:
Question
95
1 out of 1 points
A data flow diagram (DFD) shows how the system transforms input data into
useful information.
Correct Answer:
Question
96
True
1 out of 1 points
When you create a use case diagram, the first step is to identify the system
boundary, which is represented by a ____.
Correct Answer:
rectangle
Question
97
1 out of 1 points
Some objects might have a few attributes; others might have dozens.
Correct Answer:
True
Question
98
1 out of 1 points
A set of DFDs provides a logical model that shows how the system works, not
what the system does.
Correct Answer:
False
Question
99
0 out of 1 points
A spontaneous generation process is a process that has ____.
Correct Answer:
no input
Question
100
1 out of 1 points
An object has certain ____.
Correct Answer:
Question
1
attributes
1 out of 1 points
Problems found with 1NF (first normal form) design that do not exist in 2NF
(second normal form) include all of the following except ____.
Correct Answer:
Question
2
Correct Answer:
Question
1 out of 1 points
3
An existence check is a data validation check that ____.
Correct Answer:
Question
1 out of 1 points
Exception reports are useful when the user needs to know the details, but does
not want information only on records that might require action.
Correct Answer:
False
Question
0 out of 1 points
In a typical file processing environment, ____ problems can occur if updates are
not applied in every file.
Correct Answer:
data integrity
Question
1 out of 1 points
Correct Answer:
Question
False
1 out of 1 points
7
A combination check is a data validation check that ____.
Correct
Answer:
Question
8
Correct Answer:
True
Question
1 out of 1 points
Web pages are stored on a Web server, which is a computer that receives requests
and makes Web pages available to users.
Correct Answer:
True
Question
10
1 out of 1 points
Online processing systems typically have all of the following characteristics
except ____.
Correct
Answer:
Question
11
1 out of 1 points
A ____ is a text document written in HTML.
Correct Answer:
Web page
Question
12
0 out of 1 points
A table is in first normal form (1NF) if it contains a repeating group.
Correct Answer:
False
Question
13
1 out of 1 points
Relational databases are poorly suited to client/server computing because they
are so powerless and rigid.
Correct Answer:
False
Question
14
1 out of 1 points
____ is the measure of a system’s ability to expand, change, or
downsize easily to meet the changing needs of a business enterprise.
Correct Answer:
Scalability
Question
15
1 out of 1 points
Today, client/server architecture is the dominant form of systems design, using
Internet protocols and traditional network models.
Correct Answer:
True
Question
16
1 out of 1 points
A disadvantage of server-based processing is that character-based terminals
typically are used, which provide a limited interface for users.
Correct Answer:
True
Question
17
1 out of 1 points
In a file-oriented information system, a security file ____.
Correct Answer:
Question
18
1 out of 1 points
In the OSI (open system interconnection) model, the application layer ____.
Correct
Answer:
Question
19
1 out of 1 points
To design data entry screens that are easy to learn and use, employ all of the
following guidelines except ____.
Correct Answer:
Question
20
1 out of 1 points
Generally, reports used by individuals at higher levels in an organization include
more detail than reports used by lower-level employees.
Correct Answer:
Question
21
False
1 out of 1 points
A popular rule of thumb is that a design is in 3NF if every nonkey field depends
on the key, the whole key, and nothing but the key.
Correct Answer:
True
Question
22
1 out of 1 points
A batch processing system has all of the following characteristics except ____.
Correct
Answer:
Question
23
1 out of 1 points
In contrast to a centralized system, a client/server design separates applications
and data.
Correct Answer:
True
Question
24
1 out of 1 points
Impact printers can use multi-part forms to produce more than one copy, which
is an advantage to firms that require several copies of the same report.
Correct Answer:
True
Question
25
1 out of 1 points
In a client/server design, a database server ____.
Correct Answer:
Question
26
1 out of 1 points
In a Web-based database design, the Internet serves as the front end, or
interface, for the database management system.
Correct Answer:
Question
27
True
1 out of 1 points
In the OSI (open system interconnection) model, the presentation layer ____.
Correct
Answer:
Question
28
1 out of 1 points
Podcasts are especially important for legal reasons, or where it is necessary to
display a signature, date stamp, or other visual features of a document.
Correct Answer:
False
Question
29
1 out of 1 points
In a file-oriented information system, a transaction file ____.
Correct
Answer:
Question
30
1 out of 1 points
A(n) ____, which is used to access stored data, allows a user to specify a task
without specifying how the task will be accomplished.
Correct Answer:
query language
Question
31
1 out of 1 points
For upper-level managers who often want to see total figures and do not need
supporting details, a(n) ____ is appropriate.
Correct Answer:
summary report
Question
32
1 out of 1 points
In a file-oriented information system, a history file contains reference data used
by the information system.
Correct Answer:
Question
33
False
1 out of 1 points
An entity is a person, place, thing, or event for which data is collected and
maintained.
Correct Answer:
True
Question
34
1 out of 1 points
A client is a computer that supplies data, processing services, or other support to
one or more computers, called servers.
Correct Answer:
False
Question
35
1 out of 1 points
The Internet has had little impact on system architecture.
Correct Answer:
False
Question
36
1 out of 1 points
In e-commerce, data mining works best when a goal is to reduce clicks to close,
which means average page views to accomplish a purchase or obtain desired
information.
Correct Answer:
True
Question
37
1 out of 1 points
According to a usability expert at IBM, a computer user has the right to ____.
Correct Answer:
Question
38
1 out of 1 points
A reasonableness check is a data validation check that ____.
Correct
Answer:
Question
39
1 out of 1 points
A range check is a data validation check that ____.
Correct
Answer:
Question
40
1 out of 1 points
A system design where the server performs all the processing is described as
____.
Correct Answer:
mainframe architecture
Question
41
1 out of 1 points
In a typical LAN, clients share data stored on a local server that supports a
group of users or a department.
Correct Answer:
True
Question
42
1 out of 1 points
Intranets and extranets are called Web-centric because they use different
protocols, or data transmission standards, than the Internet.
Correct Answer:
False
Question
43
1 out of 1 points
In a(n) ____ design, the remote user’s keystrokes are transmitted to the
mainframe, which responds by sending screen output back to the user’s
screen.
Correct Answer:
centralized
Question
44
1 out of 1 points
One problem in a file processing environment is ____, which means that data
common to two or more information systems is stored in several places.
Correct Answer:
Question
45
data redundancy
1 out of 1 points
Interface design should call attention to the interface, rather than facilitating
design objectives.
Correct Answer:
False
Question
46
1 out of 1 points
In today’s interconnected world, output from one system often becomes
input into another system.
Correct Answer:
True
Question
47
1 out of 1 points
When using Microsoft Office, documents, spreadsheets, and databases can be
stored in Unicode-compatible form by using the font called ____.
Correct Answer:
Arial Unicode MS
Question
48
1 out of 1 points
Good interface design is based partly on ____, which focuses on how an
interface can be made attractive and easy to use.
Correct Answer:
aesthetics
Question
49
1 out of 1 points
A subschema is a view of a database used by one or more systems or users.
Correct Answer:
True
Question
50
1 out of 1 points
Good user interface design is based partly on ____, which describes how people
work, learn, and interact with computers.
Correct Answer:
ergonomics
Question
51
1 out of 1 points
____ describes how instances of one entity relate to instances of another entity.
Correct Answer:
Question
Cardinality
1 out of 1 points
52
____ protects privacy rights and shields an organization’s proprietary
data from theft or unauthorized access.
Correct Answer:
Output security
Question
53
1 out of 1 points
____ means that a system can be expanded, modified, or downsized easily to
meet the rapidly changing needs of a business enterprise.
Correct Answer:
Scalability
Question
54
1 out of 1 points
Centering headings over maximum field widths is ideal when many of the actual
values are shorter than the maximum width.
Correct Answer:
False
Question
55
1 out of 1 points
Middleware provides a transparent interface that enables system designers to
integrate dissimilar software and hardware.
Correct Answer:
True
Question
56
1 out of 1 points
The speed of laser printers is rated in ____, which can be used to estimate the
time required to print a report.
Correct Answer:
Question
57
0 out of 1 points
As the size of a business changes, it is easier to alter the capability of a largescale central server than it is to adjust the number of clients and the processing
functions they perform.
Correct Answer:
Question
False
1 out of 1 points
58
A repeating group is a set of one or more fields that can occur only once in a
single record, with each occurrence having the same value.
Correct Answer:
False
Question
59
1 out of 1 points
On a source document, the ____ contains codes, identification information,
numbers, and dates that are used for storing completed forms.
Correct Answer:
control zone
Question
60
1 out of 1 points
Compared to file server designs, client/server systems ____.
Correct Answer:
Question
61
1 out of 1 points
A report footer, which appears at the end of a report, can include grand totals for
numeric fields and other end-of-report information.
Correct Answer:
True
Question
62
1 out of 1 points
In a typical client/server system, the client stores the data and provides data
access and database management functions.
Correct Answer:
False
Question
63
1 out of 1 points
Apart from backup and recovery procedures necessary to sustain business
operations ____ laws and regulations apply to company data.
Correct Answer:
Question
64
file retention
1 out of 1 points
When considering physical design, a systems analyst must determine how a new
application will communicate with existing legacy systems.
Correct Answer:
True
Question
65
1 out of 1 points
After a report design is approved, the design should be documented in a ____,
which contains information about the fields, data types and lengths, report
frequency and distribution, and other comments.
Correct Answer:
Question
66
1 out of 1 points
A fat client, also called a thick client, design locates all or most of the
processing logic at the server.
Correct Answer:
False
Question
67
1 out of 1 points
Visio is an example of a CASE tool that can help users plan, analyze, design,
and implement an information system.
Correct Answer:
True
Question
68
1 out of 1 points
A(n) ____ produces one or more lines of output for each record processed.
Correct Answer:
detail report
Question
69
1 out of 1 points
In a file-oriented information system, a work file ____.
Correct
Answer:
Question
70
The type of output and the technology needed usually is decided during the
systems analysis phase, based on user requirements.
Correct Answer:
True
Question
71
1 out of 1 points
A database system stores and manages data in separate files using a method
called file processing.
Correct Answer:
False
Question
72
1 out of 1 points
When designing a report, a sample report, which is a ____, or prototype, should
be prepared for users to review.
Correct Answer:
mock-up
Question
73
1 out of 1 points
A(n) ____ displays only those records that meet a specific condition or
conditions.
Correct Answer:
exception report
Question
74
1 out of 1 points
In the OSI (open system interconnection) model, the session layer ____.
Correct
Answer:
Question
75
0 out of 1 points
Either a page header or a page footer, which appears at the bottom of a page, is
used to display the name of the report and a page number.
Correct Answer:
Question
76
True
1 out of 1 points
A fat client design is ____ to develop than a thin client design, because the
architecture resembles traditional file-server designs where all processing is
performed at the client.
Correct Answer:
Question
77
1 out of 1 points
A three-tier design includes a middle layer between the client and server that
processes the client requests and translates them into data access commands that
can be understood and carried out by the server.
Correct Answer:
True
Question
78
1 out of 1 points
The ____ section in a typical system design specification describes the
constraints, or conditions, affecting a system, including any requirements that
involve operations, hardware, systems software, or security.
Correct Answer:
System Environment
Question
79
1 out of 1 points
When a system produces multiple reports, each report should have completely
different design elements.
Correct Answer:
False
Question
80
1 out of 1 points
In a report, a group header can be printed after the last detail line in a group and
a group footer above the first detail line.
Correct Answer:
False
Question
81
1 out of 1 points
In a file-oriented information system, a master file ____.
Correct Answer:
Question
82
A report header, which appears at the beginning of a report, identifies the report,
and contains the report title, date, and other necessary information.
Correct Answer:
True
Question
83
1 out of 1 points
In a client/server design, tasks are divided between servers, which are
workstations that users interact with, and clients, which are computers that
supply data, processing, and services to the server workstations.
Correct Answer:
False
Question
84
1 out of 1 points
When a system reads a physical record, it loads the data from storage into a
____, which is a segment of computer memory.
Correct Answer:
buffer
Question
85
1 out of 1 points
An extranet is a private, company-owned network to provide Web-based access
to users.
Correct Answer:
False
Question
86
1 out of 1 points
Specific DBMS (database management system) advantages include all of the
following except ____.
Correct Answer:
Question
87
data dependence
1 out of 1 points
Correct Answer:
True
Question
88
0 out of 1 points
Physical storage refers to information as seen through a user’s eyes,
regardless of how or where the information actually is organized or stored.
Correct Answer:
False
Question
89
1 out of 1 points
Using a DDBMS (distributed database management system) offers all of the
following advantages except ____.
Correct
Answer:
Question
90
1 out of 1 points
File sharing designs are efficient only if the number of networked users is ____.
Correct Answer:
Question
91
1 out of 1 points
Initial screen designs can be presented to users in the form of a(n) ____, which
is a sketch that shows the general screen layout and design.
Correct Answer:
storyboard
Question
92
1 out of 1 points
HTML uses formatting codes called ____, which specify how the text and visual
elements on a Web page will be displayed in a Web browser.
Correct Answer:
Question
93
tags
1 out of 1 points
Correct Answer:
False
Question
94
1 out of 1 points
A dialog box allows a user to enter information about a task that the system will
perform.
Correct Answer:
True
Question
95
1 out of 1 points
In a client/server interaction, the client submits a request for information from
the server, which carries out the operations and responds to the client.
Correct Answer:
True
Question
96
1 out of 1 points
Every information system involves ____.
Correct Answer:
Question
97
1 out of 1 points
Scalability is especially important in implementing systems that are volumerelated, such as transaction processing systems.
Correct Answer:
True
Question
98
1 out of 1 points
User-selected Help always offers assistance for the task in progress.
Correct Answer:
False
Question
99
1 out of 1 points
In most organizations, the IT department is responsible for output control and
security measures.
Correct Answer:
True
Question
100
1 out of 1 points
In older systems, often the user interface mainly consisted of process-control
screens that allowed a user to send commands to the system.
Correct Answer:
True