Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Final Examination

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

FINAL EXAMINATION – SEMESTER 1, 2010

1. The first official activity of the project team as it initiates the project planning phase is to ____.

a. define the business problem

b. staff the project team

c. develop a cost/benefit analysis

d. write a project proposal

2. A(n) ____ is a thing in the computer system that is capable of responding to messages.

a. entity-relationship diagram (ERD)

b. model

c. tool

d. object

3. The objective of the ____ phase is to keep the system running productively during the years following
its initial installation.

a. support

b. design

c. planning

d. analysis

4. A(n) ____ is a good tool for monitoring the progress of a project as it moves along.

a. entity-relationship diagram (ERD)

b. Gantt chart

c. work breakdown structure

d. context diagram
5. Which of the following is also referred to as the breakeven point?

a. Net present value (NPV)

b. Payback period

c. Critical path

d. Return on investment (ROI)

6. The objective of a structured walkthrough is to ____.

a. fix problems in the system

b. inform the project leader of progress

c. find errors and problems

d. walkthrough a piece of work

7. Consider the following sequence diagram shown in Figure 1.

Which of the following options show the correct methods of classes Class1, Class2, and Class3?

a.

b.

c.

d.

Figure 1

8. The first item to be reviewed during a structured walkthrough is the documentation that was
developed as part of the ____ phase of the systems development life cycle (SDLC).

a. design

b. planning

c. analysis

d. implementation
9. An occurrence at a specific time and place, which can be described and is worth remembering, is
called a(n) ____.

a. external agent

b. event

c. temporary effect

d. state of requirement

10. The domain model class diagram is used to ____.

a. show the things involved in the user’s work that are important to the system

b. show the software classes in the problem domain layer of the system

c. show the data entities in the traditional approach

d. show the use cases in the OO approach

11. Which of the following statements is correct about the UML Activity Diagram given in Figure 2?

a. Activity C can be started when Activity B or Activity D completes.

b. Activity B and Activity C will be carried out together.

c. Only one of Activity B and Activity C will be carried out.

d. This diagram is incorrect.

Figure 2

12. Which of the following is NOT a step in identifying the “things” in a system?

a. Identify all the nouns.

b. Do a CRUD analysis.

c. From the list, identify things that need further research.

d. Refine the list and record assumptions or issues to explore.


Figure 3 below shows a class diagram. Use this figure to answer question 14.

13. Which of the following is NOT an attribute of class Kids?

a. ItemID

b. Pages

c. Age

d. Authors

Figure 3

14. Why is the Item object shown lower than the other three objects in Figure 4 below?

a. The diagram is incorrect

b. It does not matter where you place the objects. The sequence of messages are important

c. It shows when the object was first created in the execution of the use case

d. None of the above

15. Which two models are the primary models in object-oriented detailed design?

a. Design class diagram and component diagram

b. Package diagram and CRC cards

c. Interaction diagram and state machine diagram

d. Interaction diagram and design class diagram


Automation boundary
the separation between the automated part of a system and the manual part of a
system
Information system
a collection of interrelated components that collect, process, store, and provide as
output the information needed to complete business tasks
Systems analyst
a business professional who uses analysis and design techniques to solve business
problems by using information technology
System boundary
the separation between a system and its environment that inputs and outputs must
cross
Techniques
strategies for completing specific system development activities
Tools
a software application that assists developers in creating models or other components
required for a project

Which of the following is NOT a defined area of knowledge that is required of systems
analysts?
a. business knowledge
b. technical knowledge
c. problem solving knowledge
d. people knowledge
c. problem solving knowledge
The two systems that are externally oriented, i.e. they focus on entities outside of the
organization
a. collaboration support and knowledge management systems
b. manufacturing and supply chain management systems
c. accounting/financial and human resource management systems
d. customer relationship and supply chain management systems
d. customer relationship and supply chain management systems
The most important role of systems analyst in business is ______
a. special programming skills
b. problem solving
c. knowing what data needs to be stored and used
d. technical understanding of information systems
b. problem solving
A type of information system that allows geographically distributed personnel to work
together on projects and tasks is called a(n) _______
a. business intelligence system
b. collaboration support system (CSS)
c. human resource management system (HRM)
d. knowledge management system (KMS)
b. collaboration support system (CSS)
A business intelligence system supports _______
a. strategic planning and executive decision making
b. customer service requirements
c. business process activities
d. just in time inventory decisions
a. strategic planning and executive decision making
A knowledge management system
a. supports the storage of and access to documents within an organization
b. indexes all the knowledge contained within an organization
c. is another term for a library system
d. requires a very large amount of online storage space
a. supports the storage of and access to documents within an organization
The term "_____" refers to a business professional who uses analysis and design
techniques to solve business problems using information technology
a. systems analyst
b. business analyst
c. computer programmer
d. database manager
a. systems analyst
The text identifies three primary areas of skills that are required of a system analyst.
Which of the following is NOT one of the three?
a. writing skills
b. technical skills
c. business skills
d. people skills
a. writing skills
A process in which an organization commits to using an integrated set of software
packages for key information systems is called ______
a. applications architecture planning
b. enterprise resource planning (ERP)
c. business process re-engineering
d. strategic planning
b. enterprise resource planning (ERP)
After investing resources in thoroughly understanding the business problem, the analyst
decides that the costs of solving the problem will likely outweigh the benefits. The
analyst should _____
a. resolve feasibility issues
b. suggest that the project be discontinued
c. move to the design activities
d. invest more in the project to increase the benefits
b. suggest that the project be discontinued
Such things as how to do project planning, or how to do cost/benefit analysis, or how to
conduct an interview is called ______
a. techniques
b. strategies
c. methodologies
d. a knowledge base
a. techniques
Which of the following is the analyst's approach to problem solving?
a. verify that the benefits of solving the problem outweigh the costs, then research and
understand the problem
b. verify that the benefits of solving the problem outweigh the costs, then define the
requirements for solving the problem
c. define the details of the chosen solution, then implement it
d. develop a set of possible solutions, then verify that the benefits of solving the problem
outweigh the costs
b. verify the benefits of solving the problem outweigh the costs, then define the
requirements for solving the problem
Understanding the way an organization performs its procedures is what kind of skill
area?
a. business skills
b. technical skills
c. organizational skills
d. people skills
a. business skills
A(n) _____ includes hardware, software, inputs, outputs, data, people, and procedures
a. information system
b. system
c. subsystem
d. functional decomposition
a. information system
The process of understanding and specifying in detail what the information system
should accomplish is called systems _____
a. specification
b. administration
c. analysis
d. design
c. analysis
_____ refers to the division of a system into processes or subsystems
a. data management
b. functional decomposition
c. system design
d. programming
b. functional decomposition
Support systems that allow employees to communicate with each other and with
customers and suppliers are called _____
a. decision support/knowledge based systems (DSS/KBS)
b. collaboration support systems (CSS)
c. office support systems (OSS)
d. transaction processing systems (TPS)
b. collaboration support systems (CSS)
Systems _____ means specifying in detail how the many components of the information
system should be physically implemented
a. specification
b. administration
c. design
d. analysis
c. design
One common element of all types of business information systems is that they all ____
a. use database technology
b. use client/server architecture
c. interact with investors
d. interact with customers
a. user database technology
An automation boundary is best described as the separation between the ____.
a. system and its environment
b. manual part of a system and its environment
c. automated part of a system and the manual part of a system
d. automated part of a system and its environment
SEMESTER 1, 2012

1. There are different types of questions that can be asked during an interview. Which type is 
used in the sample question below? 

Are you willing to use the new implemented system?

A. Open question 

B. Closed question 

C. Opinion question 

D. Threat question 

2. Which of these data gathering methods involved obtaining first‐hand knowledge of activities 
in actual workplace?   

A. Interviews 

B. Questionnaires 

C. Observation 

D. Analyzing business document 

3. The stakeholders are those who have interests in the success of a new system. Suppose 
there are three people, called P1, P2 and P3 respectively. P1 pays for and owns the system, 
P2 uses the system on daily basis, and P3 ensures that the system operates in the computing 
environment of the organization. Which of the following statement is correct?   

A. P1 is a user stakeholder. 

B. P1 is a client stakeholder. 

C. P1 is a technical stakeholder. 

D. P1 is both a client and a user stakeholder. 

4. How many steps are in the systems development life cycle (SDLC)? 

  A. 4 

B. 5 

C. 6 

D. 10 

5. A critical path is ______________________________________________________.   
A. A sequence of activities whose order and durations indirectly affect the completion date of a project. 

B. A sequence of activities whose order and durations directly affect the completion date of a project. 

C. A sequence of activities whose order must be performed in parallel. 

D.A sequence of activities whose duration cannot last more than 40% of the time allotted to the project

6. Calculating an employee’s salary is represented on a data flow diagram as a_________. 

A. Data flow 

B. Source 

C. Data store 

D. Process 

7.
In the Analysis phase, the development of the ____________ occurs, which is a clear statement of the g
oals and objectives of the project.   

A. documentation 

B. flowchart 

C. program specification 

D. design 

8. ____________ spend most of their time in the beginning stages of the SDLC, talking with  end‐
users, gathering information, documenting systems, and proposing solutions. 

A. Systems analysts 

B. Project managers 

C. Network engineers 

D. Database administrators 

9. __________ manage the system development, assign staff, manage the budget and 
reporting, and ensure that deadlines are met.   

A. Project managers 

B. Network engineers 

C. Graphic designers 

D. Systems analysts 

10. All of the following are the types of events that are associated with inputs on the context 
diagram EXCEPT:     
A. external events  

B. temporal events  

C. national events  

D. state events  

11. Which of the following is a language syntax for specifying the logic of a process?    

A. jargon  

B. policy  

C. structured English  

D. decision table  

12. The act of breaking a system into its component subsystems, processes, and sub processes 
is known as __    

A. control flow  

B. data conservation  

C. dissecting  

D. decomposition  

13. What do rounded rectangles represent in data flow diagrams?     

A. processes  

B. external agents  

C. data stores 

  D. data flows  

14. Which of the following is the best definition of a decision table?    

  A. table of rules that governs how a process is to be completed?  

B. table presentation of the use‐case list  

C. tabular presentation that specifies a set of conditions and their corresponding actions 

  D. table that documents processes and the locations where they are performed

15. What is a context diagram?     

A. a diagram used to document the scope for a system  

B. the most in depth data flow diagram  
C. a model of the final design, ready for implementation  

D. a flowchart depicting one small, specific process broken down to its lowest level

16. What is process modeling?     

A. a technique used to organize and document a system's process  

B. the number of entities that participate in a relationship  

C. the act of breaking a system into sub components  

D. a description of activities and services a system must provide

17. You will find all of the following in use cases EXCEPT:     

A. actors  

B. members  

C. events  

D. inputs  

E. outputs 

18. Which statement below is true about data flow diagrams (DFDs)?    

  A.a DFD is a tool that depicts the flow of data through a system and the work or 
processing performed by that system 

  B. a DFD is known as a process model  

C. a DFD is known as a conceptual model  

D. A & B  

E. A& C   

19. The CRUD in a CRUD matrix stands for?     

A. customer, receiver, user, data  

B. create, relay, uploaded, delete  

C. context diagram, requirements diagram, use‐case diagram, decomposition diagram  

D. create, read, update, delete  

E. check, resume, update, delete  

20. When data is at "rest" it is most likely an:     

A. system  

B. external agent  
C. data flow  

D. data store  

E. process 

Semester 1 2017

1. Which of the following is the analyst’s approach to problem solving?


A. Verify that the benefits of solving the problem outweigh the costs, then research and understand
the problem.

B. Develop a set of possible solutions, then verify that the benefits of solving the problem outweigh
the costs.

C. Verify that the benefits of solving the problem outweigh the costs, then define the requirements
for solving the problem.

D. Implement the solution, then define the details of the chosen solution.

2. Usually, the longest phase for any information system is the ____ phase.

A. analysis

B. implementation

C. design

D. support

3. Questionnaires can be useful in information gathering when users ____.

A. are widely distributed geographically

B. need prompting to respond to questions

C. are not well-informed

D. do not have time for interviews

4. The process of understanding and specifying in detail what the information system should
accomplish is called systems ____.

A. design

B. specification

C. analysis

D. administration

5. The most important role of a systems analyst in business is ____.

A. technical understanding of information systems


B. problem solving

C. knowing what data needs to be stored and used

D. special programming skills

6. A technique that seeks to alter the nature of the work done in a business function, with the
objective of radically improving performance, is called ____.

A. business process reengineering

B. strategic planning

C. information systems strategic planning

D. enterprise resource planning (ERP)

7. The last step of the analyst's approach to problem solving is ____.

A. Decide which solution is best, and make a recommendation

B. Monitor to make sure that you obtain the desired results

C. Verify that the benefits of solving the problem outweigh the costs

D. Implement the solution

8. Users are typically more involved in the project during which two phases?

A. Analysis and design

B. Planning and analysis

C. Design and implementation

D. Analysis and implementation

9. Which of the following describes the activities that the system must perform - that is, the business
uses to which the system will be applied?

A. Functional requirements
B. General requirements

C. User requirements

D. Technical requirements

10. The objective of a structured walkthrough is to ____.

A. fix problems in the system

B. inform the project leader of progress

C. find errors and problems

D. walkthrough a piece of work

11. The is a model for representing the essential elements for embezzlement to occur.

A. access controls.

B. fraud triangle.

C. security controls.

D. security triangle.

12. What is the purpose of the communication diagram?

A. To communicate to the actors.

B. To document the interactions between the classes in the program code.

C. To communicate to the analyst.

D. To describe the classes in a way that is helpful to the database design.

13. Examine the first-cut-sequence diagram shown in Figure 1 and indicate the label that represents
an input message.

A. I.

B. II.
C. III.

D. IV.

14. If the first-cut sequence diagram (Figure 1) is for the Create customer account use case, what will
be the expected entry in the rectangle marked “III”?

A. createNewCustomer(name, phones, email)

B. createCustomer(name, phones)

C. (newCustomerAccount, created.

D. (CustID, name, phones, email)

15. What is the primary objective of integrity control?

A. Protect and safeguard the assets of the organization.

B. Ensure that some appropriate and correct business transactions occur.

C. Ensure that transactions are recorded and processed when required.

D. Prevent invalid or erroneous data from entering the system.

16. Figure 2 shows that not all records/rows have the same number of columns. For example, the first
record/row for Mary Smith has 3 dependents (Dependent1, Dependent2, and Dependent3) while the
second record/row for Jose Pena has no dependents while the third record for Frank Collins has 2.
Which formal technique is applied to improve the database design?

A. Normalization.

B. First Normal Form.

C. Second Normal Form.

D. Third Normal Form.

17. The diagram shown above (Figure 3) represents

A. asymmetric key encryption.

B. encryption key.

C. encryption lock and key


D. symmetric key encryption..

18. The user-centred design approach considers: colours, shapes, textures, fonts, sounds, windows,
menus, and buttons as

A. physical aspects.

B. conceptual aspects.

C. usable aspects.

D. perceptual aspects.

19. Preventing invalid or erroneous data from entering an information system can be handled by
using:

A. Value limit controls.

B. Data validation controls.

C. Field combination controls.

D. All of the above.

20. Rich internet applications (RIA) refers to a:

A. type of web site that provides active user interaction along with rich multimedia.

B. type of web site that combines functionality of several other web sites.

C. type of application that provides a complete set of functions but only available via a web site.

D. type of application that offers iconic menu items in a user friendly environment.

You might also like