MIDTERM EXAM Flashcards

1
Q

With a report generator, users can control how a screen will display captions, data fields, data, and other visual attributes.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Widespread use of object-oriented languages has spurred interest in object-oriented (O-O) computer-aided systems engineering (CASE) and Unified Modeling Language (UML)-based modeling tools,
which can provide a seamless development sequence from planning to actual coding.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Although generic computer-aided systems engineering (CASE) tools can be used to plan and design any type of information system, it usually is easier to use an integrated development environment (IDE).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carnegie Mellon University’s Software Engineering Institute (SEI) is a world leader in software engineering and development.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A drawback of a computer-aided systems engineering (CASE) environment is that it does not provide an overall framework for a developer to create a series of graphical models based on data available
in a central repository.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of the most vexing problems for computer-aided systems engineering (CASE) tools has always been integration.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a specific software environment, an integrated development tool is ineffective.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using a forward engineering computer-aided systems engineering (CASE) tool, an analyst can transform existing application source code into a working model of the system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Agile teams use only whiteboard sketching for drawing instead of modeling tools.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A code generator allows users to modify a report easily at any stage of the design process.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Once a data element has been defined in the repository, it can no longer be accessed and used by processes and other information systems.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Object-oriented development relies heavily on data flow diagrams (DFDs) and structure charts.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) _____ represents the steps in a specific business function or process.

A

use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ enable objects to communicate and interact as they perform business functions and transactions required by a system.

A

Relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a class diagram, each class appears as a(n) _____, with the class name at the top, followed by the class’s attributes and methods.

A

rectangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ describes how instances of one class relate to instances of another class.

A

Cardinality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An object has certain _____, which are characteristics that describe the object, such as the make, model, and color of a car.

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.

A

Gantt chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A _____ might involve maximums for one or more resources, such as time, dollars, or people.

A

constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Project reporting, an activity of a project manager, _____.

A

includes informing management, users, and the project team about the progress of a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _____ represents the work that one person can complete in one day.

A

person-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ give the project managers an opportunity to seek input and conduct brainstorming sessions.

A

Project status meetings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____, a free cloud-based project management tool, runs in a browser window, so there is no software to install to use it.

A

Gantter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Critical Thinking Questions

Mauricio, a project manager at a reputed firm, has been assigned to handle a new project that the firm has received. This project involves a lot of scheduling that has to be handled by Mauricio.

Mauricio estimates that the first module of the project could be completed in as few as 15 days or could take as many as 25 days, but most likely will require 20 days. What is the 20 day estimate called?

A

probable-case estimate (P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.

A

type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The major benefit of _____ is that it gives a clear picture of current system functions before any modifications or improvements are made.

A

the four-model approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Typical process description tools include _____.

A

decision trees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A data flow diagram (DFD) shows _____.

A

how a system transforms input data into useful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Since diagram 0 is a(n) _____ version of process 0, it shows considerably more detail than a context diagram.

A

exploded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In a data flow diagram (DFD), a gray hole is a process that has _____.

A

at least one input and one output, but the input obviously is insufficient to generate the output shown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Among the symbols in the accompanying figure, a _____ receives input data and produces output that has a different content, form, or both.

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an information system.

A

field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In a data flow diagram (DFD), the Gane and Sarson symbol for a process is a _____.

A

rectangle with rounded corners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.

A

computer resources committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called _____.

A

project creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

A

Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which is an example of a tangible benefit?

A

An online package tracking system that improves service and decreases the need for clerical staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Hardware-based security controls include _____.

A

biometric devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

_____ includes ongoing support and maintenance costs, as well as acquisition costs.

A

TCO (total cost of ownership)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.

A

class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

During the _____ of the systems development life cycle (SDLC), a new system is constructed.

A

systems implementation phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Transaction processing (TP) systems _____.

A

process data generated by day-to-day business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.

A

Electronic data interchange (EDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A(n) _____ shows the data that flow in and out of system processes.

A

process model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

_____ design and construct web pages, monitor traffic, manage hardware and software, and link web-based applications to a company’s information systems.

A

Web support specialists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Supporters of neutral locations for interviews believe that it _____.

A

keeps interruptions to a minimum so people can concentrate fully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Representing requirements deals with _____ the problem.

A

describing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

When phrasing interview questions, a systems analyst should avoid _____ that suggest or favor a particular reply.

A

leading questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.

A

scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Critical Thinking Questions
Case 4-1

John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder.

There have been some rumblings within the firm that this development project is not necessary so John and others feel it is important to explain the reason for the project at the outset. Whose name goes next to this point on the agenda?

A

Tom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A _____ shows a logical structure, with all possible combinations of conditions and resulting actions.

A

decision table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In a data flow diagram (DFD), a black hole is a process that has _____

A

no output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A _____ documents the details of a functional primitive and represents a specific set of processing steps and business logic.

A

process description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A data dictionary specifies a data element’s _____, which is the set of values permitted for the data element.

A

domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

By showing processes as _____, an analyst can create data flow diagrams (DFDs) that show how the system functions but avoid unnecessary detail and clutter.

A

black boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The data dictionary usually records and describes a default value, which is the _____.

A

value for the data element if a value otherwise is not entered for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The iteration structure is the completion of _____.

A

process step that is repeated until a specific condition changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The selection structure is the completion of _____

A

one or more process steps based on the results of a test or condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

User productivity systems _____.

A

include groupware programs that enable users to share data, collaborate on projects, and work in teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Transaction processing (TP) systems _____.

A

process data generated by day-to-day business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

In a typical company organizational model, middle managers _____.

A

provide direction, necessary resources, and performance feedback to supervisors and team leaders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

_____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.

A

Prototyping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A _____ answers questions, troubleshoots problems, and serves as a clearinghouse for user problems and solutions.

A

user support specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.

A

spiral model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called _____.

A

engaged listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

In an interview, _____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

A

range-of-response questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Critical Thinking Questions
Case 4-1

John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder.

As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of documenting the results of the JAD session and preparing the report that will be sent to JAD team members?

A

His own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____.

A

total cost of ownership (TCO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A repository, a computer-aided systems engineering (CASE) tool feature, organizes and documents system development tasks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

It seems clear that computer-aided systems engineering (CASE) tools will continue to evolve and become more powerful.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Currently, use of completely online cloud-based development environments is increasing.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Structured development methods use a variety of diagrams, such as use case, class, sequence, and transition state diagrams.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

The features of an object-oriented (O-O) approach include modular design and single-use code, which increases costs and slows down development.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Nonspecific CASE tools such as Visible Analyst can be used in any development environment.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track.

A

critical path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A(n) _____ is a recognizable reference point that can be used to monitor progress.

A

event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Two or more _____ depend on a predecessor task.

A

concurrent tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Adding more people to a project actually might increase the time necessary to complete the project because of a principle called _____.

A

Brooks’ law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A(n) _____ is an event that could affect a project negatively.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

_____ components can provide automated responses to sales inquiries, online order processing, and inventory tracking.

A

Customer relationship management (CRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Determining the _____ means defining the specific boundaries, or extent, of a project.

A

project scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

_____ are advantages that are difficult to measure in dollars but are important to a company.

A

Intangible benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which is an example of a discretionary project?

A

Creating a new report for a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.

A

Pareto chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

A car performs a(n) _____ called OPERATE WIPERS when it is sent a message with the wiper control.

A

method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A _____ shows how an object changes from one state to another, depending on events that affect the object.

A

state transition diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects.

A

modular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

A _____ is a visual summary of several related use cases within a system or subsystem.

A

use case diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

_____ can involve a modeling process called what-if analysis, which allows a project manager to vary one or more element(s) in a model to measure the effect on other elements.

A

Quantitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A _____ includes a review of a project’s scope, stakeholders, budget, schedule, and any other internal or external factors that might affect the project.

A

risk management plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

A _____ displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more detail.

A

network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

The first step in the creation of a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart is to _____.

A

identify all the project tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

A _____ is a review of a project team member’s work by other members of a team.

A

structured walk-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

A _____ (sometimes called an epic) is a simple, high-level statement of a requirement.

A

feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which technique involves each participant speaking or passing when it is his or her turn?

A

structured brainstorming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

_____ is a planned meeting during which a systems analyst obtains information from another person.

A

An interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select any 20 customers.

A

random sample

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Microsoft OneNote is a type of _____ software.

A

information management

99
Q

Which method of system development stresses intense team-based effort and reflects a set of community-based values?

A

Agile method

100
Q

A _____ describes the information that a system must provide.

A

business model

101
Q

Knowledge management systems use a large database called a(n) _____ that allows users to find information by entering keywords or questions in normal English phrases.

A

knowledge base

102
Q

In a(n) _____ model, the result of each phase is called a deliverable, which flows into the next phase.

A

waterfall

103
Q

The objective of _____ is to gather data about project usability, costs, benefits, and schedules.

A

fact-finding

104
Q

Of the measures of feasibility, questions such as “Does management support the project?” and “Will the new system require training for users?” would help predict a system’s _____.

A

operational feasibility

105
Q

Projects where management has a choice in implementing them are called _____ projects.

A

discretionary

106
Q

A systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.

A

systems request

107
Q

Many companies implement _____ systems that integrate all customer-related events and transactions.

A

CRM (customer relationship management)

108
Q

The computer-aided systems engineering (CASE) tool marketplace includes a limited variety of vendors and products, and all the tools dominate the marketplace.

A

False

109
Q

As early as the 1960s, programmers used tools such as editors and code debuggers to write mainframe computer applications.

A

True

110
Q

Using _____, an analyst starts with an overall view, which is a context diagram with a single process symbol, and then creates diagram 0, which shows more detail.

A

leveling

111
Q

In addition to the Gane and Sarson symbol set, another popular symbol set is the _____ symbol set.

A

Yourdon

112
Q

Among the symbols in the accompanying figure, a _____ is used to represent data that a system stores because one or more processes need to use the data at a later time.

A

data store

113
Q

In data flow diagrams (DFDs), a process resembles a _____, where the inputs, outputs, and general functions of the process are known, but the underlying details are not shown.

A

black box

114
Q

_____ is a widely used method of visualizing and documenting an information system.

A

Unified Modeling Language (UML)

115
Q

The systems support and _____ phase begin when a system becomes operational and continues until the system reaches the end of its useful life.

A

security

116
Q

In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.

A

1.1

117
Q

The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

A

functional baseline

118
Q

When a new version of a system is installed, the prior release is _____ or stored.

A

archived

119
Q

_____ measures risk likelihood and impact.

A

Risk assessment

120
Q

If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.

A

user training package

121
Q

To avoid problems, preventive maintenance _____.

A

requires analysis of areas where the trouble is likely to occur

122
Q

The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information.

A

report header

123
Q

Companies use various _____ methods to maintain output integrity and security.

A

output control

124
Q

A(n) _____ does not distract a user and calls no attention to itself.

A

transparent interface

125
Q

To produce a control break report, the records must be arranged, or sorted, in _____.

A

control field order

126
Q

In a source document, the _____ contains any required signatures.

A

authorization zone

127
Q

In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.

A

process-control

128
Q

A new system might have to interface with one or more _____, which are older systems that use outdated technology.

A

legacy systems

129
Q

In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

A

system environment

130
Q

_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design.

A

Enterprise resource planning (ERP)

131
Q

At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.

A

switch

132
Q

The _____ allows the expansion of wireless access over a wide area.

A

Extended Service Set (ESS) topology

133
Q

The term “_____” generally refers to systems that divide processing between one or more networked clients and a central server.

A

client/server

134
Q

_____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

A

Scalability

135
Q

Identify an example of fixed costs.

A

Hardware rental charges

136
Q

Payback analysis that is recorded and calculated in spreadsheets requires a formula to display cumulative totals, year by year.

A

True

137
Q

In a fixed charge method, the IT group is regarded as a _____ center, which is a department that is expected to break even or show a profit.

A

profit

138
Q

Indirect costs, or overhead expenses, cannot be attributed to the development of a particular information system.

A

True

139
Q

The cost of customer dissatisfaction, lower employee morale, and reduced information availability are examples of _____.

A

intangible costs

140
Q

When comparing the net present values of projects, all things being equal, the project with the lowest net present value is the best investment.

A

False

141
Q

Positive benefits increase revenues, improve services, or otherwise contribute to an organization as a direct result of a new information system.

A

True

142
Q

Critics of return on investment analysis raised a point that return on investment (ROI) measures the overall rate of return for a total period and annual return rates vary considerably.

A

True

143
Q

Critics of return on investment analysis raised a point that the return on investment (ROI) technique does not recognize the timing of costs and benefits.

A

True

144
Q

Return on investment analysis considers costs and benefits over a shorter time span than payback analysis.

A

False

145
Q

Critical Thinking Questions 11-1

Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform.

Lisa mentions that one program has been developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process?

A

Stub testing

146
Q

_____ is the process of putting a new information system online and retiring the old system.

A

System changeover

147
Q

A _____ consists of related program code organized into small units that are easy to understand and maintain.

A

module

148
Q

User documentation _____

A

consists of instructions and information for users who will interact with the system

149
Q

During _____, existing data is loaded into the new system.

A

data conversion

150
Q

Access to the operational environment is limited to _____ and must strictly be controlled.

A

users

151
Q

Critical Thinking Questions

Case 9-1

Eamon is planning to start an online store that specializes in books and electronics. Since it’s his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions.

Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest that Eamon use?

A

Cipher code

152
Q

A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

A

entity-relationship diagram (ERD)

153
Q

With a _____, users provide an example of the data requested.

A

query by example language

154
Q

The data mining technique that relies on association rule learning is often called _____.

A

market basket analysis

155
Q

To bridge the gap between a database and the Internet, it is necessary to use _____, which is software that integrates different applications and allows them to exchange data.

A

middleware

156
Q

_____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.

A

data warehouse

157
Q

Typically, a database management system is managed by a person called a _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.

A

database administrator

158
Q

CASE

Critical Thinking Questions

Case 7-1

Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding.

Which is a reason Priscilla will share with the new analysts for recommending that a client purchase a software package?

A

The client is looking for the lowest possible costs.

159
Q

When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.

A

subscription model

160
Q

The software that a company’s IT department makes, builds, and develops is called _____.

A

in-house software

161
Q

The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.

A

Web 2.0

162
Q

Which is true of a web-based systems development environment?

A

Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.

163
Q

An accurate forecast of TCO is critical, because nearly _____ percent of total costs occur after the purchase of the hardware and software, according to Gartner, Inc.

A

80

164
Q

A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

A

32

165
Q

_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

A

Open database connectivity (ODBC)

166
Q

A table is in _____ if it does not contain a repeating group.

A

first normal form

167
Q

A _____ specifies the fields and identifies the primary key in a particular file.

A

table design

168
Q

Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.

A

mnemonic

169
Q

_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.

A

Normalization

170
Q

_____ is strictly hardware related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

A

Physical storage

171
Q

_____ reduces the customer’s need for software maintenance, operation, and support.

A

Software as a Service

172
Q

CASE

Critical Thinking Questions

Case 7-1​

Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding.

Which is a reason why Priscilla would offer in-house software development?

A

The client has a number of very distinctive security requirements.

173
Q

A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.

A

application service provider

174
Q

When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.

A

software license

175
Q

The main reason for offshore outsourcing is to _____

A

lower bottom-line costs

176
Q

Developmental costs are incurred after a system is implemented and continues while the system is in use.

A

False

177
Q

In present value analysis, most companies require a rate of return that is higher than the discount rate because of the degree of risk in any project compared with investing in a bond.

A

True

178
Q

Intangible costs are costs that can be assigned a specific dollar value.

A

False

179
Q

Variable costs are costs that vary depending on the level of activity.

A

True

180
Q

Direct costs usually are more difficult to identify and predict than indirect costs.

A

False

181
Q

Identify an example of direct costs.

A

Project team members’ salaries

182
Q

When comparing the net present values of projects, all things being equal, the project with the lowest net present value is the best investment.

A

False

183
Q

When conducting a payback analysis, the time it takes for the accumulated benefits of an information system to equal the accumulated costs of developing and operating the system is calculated.

A

True

184
Q

The _____ value of a future dollar is the amount of money that, when invested today at a specified interest rate, grows to exactly one dollar at a certain point in the future.

A

present

185
Q

_____ describes the way the components in a network interact.

A

Logical topology

186
Q

_____ is the amount of data that can be transferred in a fixed time period.

A

Bandwidth

187
Q

Cloud computing provides _____, which matches resources to needs at any given time.

A

scaling on demand

188
Q

Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.

A

local area network (LAN)

189
Q

A _____ design locates all or most of the processing logic on the server.

A

thin client

190
Q

The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.

A

unit-testing

191
Q

The main objective of _____ is to avoid problems or to identify them as soon as possible.

A

quality assurance

192
Q

The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework.

A

Capability Maturity Model Integration (CMMI)

193
Q

_____ involves more risk than other changeover methods.

A

Direct cutover

194
Q

​As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period.

A

parallel operation

195
Q

A class diagram includes the class _____, which describe the characteristics of objects in the class

A

attributes

196
Q

As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system at a selected location of the company.

A

pilot operation

197
Q

_____, a risk control strategy, eliminates risks by adding protective safeguards.

A

Avoidance

198
Q

_____ prevents unauthorized users from creating, modifying, or deleting information.

A

Integrity

199
Q

A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.

A

system administrator

200
Q

A _____ is a security weakness or soft spot.

A

vulnerability

201
Q

_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.

A

Fault management

202
Q

_____ measures risk likelihood and impact.

A

Risk assessment

203
Q

_____ protects information from unauthorized disclosure and safeguards privacy.

A

Confidentiality

204
Q

To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet.

A

webcast

205
Q

A(n) _____ is a data validation rule that should be applied to mandatory data items.

A

existence check

206
Q

Although the vast majority of reports are designed graphically, some systems still produce one or more _____ reports that use a character set with fixed spacing.

A

character-based reports

207
Q

In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.

A

body zone

208
Q

Printed output is used in _____, which are output documents that are later entered back into the same or another information system.

A

turnaround documents

209
Q

A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.

A

combination check

210
Q

_____ measures the time between submitting a request for information and the fulfillment of the request.

A

Turnaround time

211
Q

A(n) _____ is an attack that takes advantage of a vulnerability.

A

exploit

212
Q

Adaptive maintenance _____.

A

adds enhancements to an operational system and makes the system easier to use

213
Q

_____ is the overall time between a request for system activity and the delivery of the response.

A

Response time

214
Q

A _____ is an internal or external entity that could endanger an asset.

A

threat

215
Q

Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.

A

web-based

216
Q

A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.

A

usage model

217
Q

Which is true of a traditional systems development environment?

A

Many applications require substantial desktop computing power and resources.

218
Q

In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.

A

user interface

219
Q

Which is a software collection obtained from a vendor or application service provider?

A

software package

220
Q

The term “_____” is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered.

A

garbage in, garbage out (GIGO)

221
Q

A(n) _____ displays only those records that meet a specific condition or conditions.

A

exception report

222
Q

Critical Thinking Questions

Case 8-1

Betty has a number of report templates at her disposal filed in folders to respond to her boss’s requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request.

Betty’s lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report?

A

Exception reports

223
Q

A secure system includes _____ that can log every instance of data entry and changes.

A

audit trails

224
Q

Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.

A

graphical user interface

225
Q

In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms.

A

control zone

226
Q

A _____ follows Internet design protocols and enables a company to integrate new applications into its e-commerce strategy.

A

web-centric architecture

227
Q

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.

A

wireless local area network (WLAN)

228
Q

In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.

A

distributed database management system (DDBMS)

229
Q

_____ relies on collective data paths to increase bandwidth and range.

A

Multiple inputs / multiple-output (MIMO) technology

230
Q

The _____ describes how data actually moves from an application on one computer to an application on another networked computer.

A

OSI (Open Systems Interconnection) model

231
Q

A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.

A

platform

232
Q

A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device.

A

podcast

233
Q

In sequence, the steps typically followed to create a structure chart are _____.

A

reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart ^

234
Q

In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated.

A

loop

235
Q

In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.

A

stub testing

236
Q

_____ measures a module’s scope and processing characteristics.

A

Cohesion

237
Q

Tangible costs are costs whose dollar value cannot be calculated easily.

A

False

238
Q

Which concept includes ongoing support and maintenance costs as well as acquisition costs?

A

total cost of ownership

239
Q

Which is an example of variable costs?

A

Printer paper costs

240
Q

Critics of return on investment analysis raised a point that the return on investment (ROI) technique does not recognize the timing of costs and benefits.

A

True

241
Q

The inherent efficiency of high-volume processing on larger computers is called _____.

A

economy of scale

242
Q

_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.

A

EBCDIC (Extended Binary Coded Decimal Interchange Code)

243
Q

In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

A

foreign key

244
Q

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.

A

schema