Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Chapter 01 Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Chapter 1 Introduction to Systems Analysis and Design

MULTIPLE CHOICE (1 point each) 1. In launching a new information system, the greatest risk occurs when a company ____. a. begins by outlining its business models and identifying possible IT solutions b. tries to decide how the system will be implemented before determining what the system is supposed to do c. considers implementation options after having a clear set of objectives d. all of the above 2. ____ software controls the flow of data, provides data security, and manages network operations. a. Enterprise c. Application b. System d. Legacy 3. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. a. enterprise applications c. operating applications b. network operating systems (NOS) d. legacy systems 4. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____. a. 2 months c. 24 months b. 12 months d. 48 months 5. When planning an information system, a company must consider how a new system will interface with older systems, which are called ____. a. enterprise applications c. operating applications b. network operating systems (NOS) d. legacy systems 6. When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____. a. electronic data interchange (EDI) c. business process reengineering (BPR) b. joint application development (JAD) d. rapid application development (RAD) 7. Systems analysts use a process called ____ to represent a companys operations and information needs. a. JAD c. RAD b. Scrum d. business process modeling 8. A business ____ is an overview that describes a companys overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction. a. matrix c. index b. profile d. glossary

9. A business ____ is a graphical representation of one or more business processes that a company performs, such as accepting airline reservations, selling a ticket, or crediting a customer account.

a. iteration b. model

c. method d. process

10. ____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks. a. EDI c. TCH b. ACH d. O-O 11. Transaction processing (TP) systems ____. a. provide job-related information to users at all levels of a company b. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c. process data generated by day-to-day business operations d. include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access 12. Business support systems ____. a. provide job-related information support to users at all levels of a company b. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c. process data generated by day-to-day business operations d. include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access 13. Knowledge management systems are called expert systems because they ____. a. provide job-related information to users at all levels of a company b. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c. process data generated by day-to-day business operations d. include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access 14. User productivity systems ____. a. provide job-related information to users at all levels of a company b. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c. process data generated by day-to-day business operations d. include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access 15. In a typical company organizational model, top managers ____. a. develop long-range plans, called strategic plans, which define the companys overall mission and goals b. provide direction, necessary resources, and performance feedback to supervisors and team leaders c. oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people d. include users who rely on TP systems to enter and receive the data they need to perform their jobs 16. In a typical company organizational model, middle managers ____.

a. develop long-range plans, called strategic plans, which define the companys overall mission and goals b. provide direction, necessary resources, and performance feedback to supervisors and team leaders c. oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people d. include users who rely on TP systems to enter and receive the data they need to perform their jobs 17. A ____, or requirements model, describes the information that a system must provide. a. process model c. business model b. data model d. network model 18. A(n) ____ describes the logic that programmers use to write code modules. a. process model c. business model b. object model d. network model 19. ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify. a. Prototyping c. Scrum b. Rapid application development d. Modeling 20. ____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made. a. Scrum c. Modeling b. Prototyping d. Rapid application development 21. ____ methods include the latest trends in software development. a. Object-oriented analysis c. Structured analysis b. Agile/Adaptive d. Rapid application development 22. The ____ method of developing systems is well-suited to project management tools and techniques. a. object-oriented analysis c. structured analysis b. adaptive d. rapid application development 23. The ____ method of developing systems produces code that is modular and reusable. a. object-oriented analysis c. structured analysis b. adaptive d. rapid application development 24. The ____ method of developing systems stresses team interaction and reflects a set of community-based values. a. object-oriented analysis c. structured analysis b. adaptive d. rapid application development

25. Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system. a. O-O c. MSF

b. SDLC

d. RUP

26. Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique. a. iterative c. inferred b. process-centered d. empowered

27. Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase. a. interactive model c. waterfall model b. requirements model d. object model

28. In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process. a. systems design phase c. systems support and security phase b. systems planning phase d. systems analysis phase 29. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system. a. systems analysis phase c. systems design phase b. systems implementation phase d. systems support and security phase 30. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a blueprint that will satisfy all documented requirements for the system. a. systems implementation phase c. systems analysis phase b. systems planning phase d. systems design phase 31. In the model of the SDLC shown in the accompanying figure, during ____, the new system is constructed. a. systems planning c. systems design b. systems support and security d. systems implementation 32. In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system. a. systems support and security c. systems analysis b. systems implementation d. systems planning 33. Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects. a. the MSF c. RUP b. the SDLC d. O-O 34. In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects. a. property c. message b. class d. instance 35. In object-oriented design, built-in processes called ____ can change an objects properties. a. methods c. attributes b. functions d. features

36. Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback. a. gradual c. spiral b. extreme d. evaluative

37. When building an information system, all of the following basic guidelines should be considered except ____. a. stick to an overall development plan b. identify major milestones for project review and assessment c. provide accurate and reliable cost and benefit information d. ensure that users are not involved in the development process 38. Traditionally, IT departments had a(n) ____ group composed of systems analysts and programmers who handled information system design, development, and implementation. a. Web support c. systems support b. application development d. database administration 39. ____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure. a. User support c. Systems support and security b. Database administration d. Network administration 40. A systems analyst needs ____. a. solid technical knowledge and good analytical ability b. strong oral and written communication skills c. an understanding of business operations and processes d. all of the above

MODIFIED TRUE/FALSE (2 points each) 1. System software consists of programs that support day-to-day business functions and provide users with the information they require. _________________________ 2. Product-oriented companies primarily offer information or services or sell goods produced by others. _________________________ 3. Extreme Programming is a popular process with agile developers and refers to a powerful effort to achieve short-term goals. _________________________ 4. Rapid application development focuses on team-based fact-finding. _________________________ 5. User support provides users with technical information, training, and productivity support. _________________________

You might also like