Final Examination
Final Examination
Final Examination
1. The first official activity of the project team as it initiates the project planning phase is to ____.
2. A(n) ____ is a thing in the computer system that is capable of responding to messages.
b. model
c. tool
d. object
3. The objective of the ____ phase is to keep the system running productively during the years following
its initial installation.
a. support
b. design
c. planning
d. analysis
4. A(n) ____ is a good tool for monitoring the progress of a project as it moves along.
b. Gantt chart
d. context diagram
5. Which of the following is also referred to as the breakeven point?
b. Payback period
c. Critical path
Which of the following options show the correct methods of classes Class1, Class2, and Class3?
a.
b.
c.
d.
Figure 1
8. The first item to be reviewed during a structured walkthrough is the documentation that was
developed as part of the ____ phase of the systems development life cycle (SDLC).
a. design
b. planning
c. analysis
d. implementation
9. An occurrence at a specific time and place, which can be described and is worth remembering, is
called a(n) ____.
a. external agent
b. event
c. temporary effect
d. state of requirement
a. show the things involved in the user’s work that are important to the system
b. show the software classes in the problem domain layer of the system
11. Which of the following statements is correct about the UML Activity Diagram given in Figure 2?
Figure 2
12. Which of the following is NOT a step in identifying the “things” in a system?
b. Do a CRUD analysis.
a. ItemID
b. Pages
c. Age
d. Authors
Figure 3
14. Why is the Item object shown lower than the other three objects in Figure 4 below?
b. It does not matter where you place the objects. The sequence of messages are important
c. It shows when the object was first created in the execution of the use case
15. Which two models are the primary models in object-oriented detailed design?
Which of the following is NOT a defined area of knowledge that is required of systems
analysts?
a. business knowledge
b. technical knowledge
c. problem solving knowledge
d. people knowledge
c. problem solving knowledge
The two systems that are externally oriented, i.e. they focus on entities outside of the
organization
a. collaboration support and knowledge management systems
b. manufacturing and supply chain management systems
c. accounting/financial and human resource management systems
d. customer relationship and supply chain management systems
d. customer relationship and supply chain management systems
The most important role of systems analyst in business is ______
a. special programming skills
b. problem solving
c. knowing what data needs to be stored and used
d. technical understanding of information systems
b. problem solving
A type of information system that allows geographically distributed personnel to work
together on projects and tasks is called a(n) _______
a. business intelligence system
b. collaboration support system (CSS)
c. human resource management system (HRM)
d. knowledge management system (KMS)
b. collaboration support system (CSS)
A business intelligence system supports _______
a. strategic planning and executive decision making
b. customer service requirements
c. business process activities
d. just in time inventory decisions
a. strategic planning and executive decision making
A knowledge management system
a. supports the storage of and access to documents within an organization
b. indexes all the knowledge contained within an organization
c. is another term for a library system
d. requires a very large amount of online storage space
a. supports the storage of and access to documents within an organization
The term "_____" refers to a business professional who uses analysis and design
techniques to solve business problems using information technology
a. systems analyst
b. business analyst
c. computer programmer
d. database manager
a. systems analyst
The text identifies three primary areas of skills that are required of a system analyst.
Which of the following is NOT one of the three?
a. writing skills
b. technical skills
c. business skills
d. people skills
a. writing skills
A process in which an organization commits to using an integrated set of software
packages for key information systems is called ______
a. applications architecture planning
b. enterprise resource planning (ERP)
c. business process re-engineering
d. strategic planning
b. enterprise resource planning (ERP)
After investing resources in thoroughly understanding the business problem, the analyst
decides that the costs of solving the problem will likely outweigh the benefits. The
analyst should _____
a. resolve feasibility issues
b. suggest that the project be discontinued
c. move to the design activities
d. invest more in the project to increase the benefits
b. suggest that the project be discontinued
Such things as how to do project planning, or how to do cost/benefit analysis, or how to
conduct an interview is called ______
a. techniques
b. strategies
c. methodologies
d. a knowledge base
a. techniques
Which of the following is the analyst's approach to problem solving?
a. verify that the benefits of solving the problem outweigh the costs, then research and
understand the problem
b. verify that the benefits of solving the problem outweigh the costs, then define the
requirements for solving the problem
c. define the details of the chosen solution, then implement it
d. develop a set of possible solutions, then verify that the benefits of solving the problem
outweigh the costs
b. verify the benefits of solving the problem outweigh the costs, then define the
requirements for solving the problem
Understanding the way an organization performs its procedures is what kind of skill
area?
a. business skills
b. technical skills
c. organizational skills
d. people skills
a. business skills
A(n) _____ includes hardware, software, inputs, outputs, data, people, and procedures
a. information system
b. system
c. subsystem
d. functional decomposition
a. information system
The process of understanding and specifying in detail what the information system
should accomplish is called systems _____
a. specification
b. administration
c. analysis
d. design
c. analysis
_____ refers to the division of a system into processes or subsystems
a. data management
b. functional decomposition
c. system design
d. programming
b. functional decomposition
Support systems that allow employees to communicate with each other and with
customers and suppliers are called _____
a. decision support/knowledge based systems (DSS/KBS)
b. collaboration support systems (CSS)
c. office support systems (OSS)
d. transaction processing systems (TPS)
b. collaboration support systems (CSS)
Systems _____ means specifying in detail how the many components of the information
system should be physically implemented
a. specification
b. administration
c. design
d. analysis
c. design
One common element of all types of business information systems is that they all ____
a. use database technology
b. use client/server architecture
c. interact with investors
d. interact with customers
a. user database technology
An automation boundary is best described as the separation between the ____.
a. system and its environment
b. manual part of a system and its environment
c. automated part of a system and the manual part of a system
d. automated part of a system and its environment
SEMESTER 1, 2012
1. There are different types of questions that can be asked during an interview. Which type is
used in the sample question below?
A. Open question
B. Closed question
C. Opinion question
D. Threat question
2. Which of these data gathering methods involved obtaining first‐hand knowledge of activities
in actual workplace?
A. Interviews
B. Questionnaires
C. Observation
D. Analyzing business document
3. The stakeholders are those who have interests in the success of a new system. Suppose
there are three people, called P1, P2 and P3 respectively. P1 pays for and owns the system,
P2 uses the system on daily basis, and P3 ensures that the system operates in the computing
environment of the organization. Which of the following statement is correct?
A. P1 is a user stakeholder.
B. P1 is a client stakeholder.
C. P1 is a technical stakeholder.
D. P1 is both a client and a user stakeholder.
4. How many steps are in the systems development life cycle (SDLC)?
A. 4
B. 5
C. 6
D. 10
5. A critical path is ______________________________________________________.
A. A sequence of activities whose order and durations indirectly affect the completion date of a project.
B. A sequence of activities whose order and durations directly affect the completion date of a project.
C. A sequence of activities whose order must be performed in parallel.
D.A sequence of activities whose duration cannot last more than 40% of the time allotted to the project
6. Calculating an employee’s salary is represented on a data flow diagram as a_________.
A. Data flow
B. Source
C. Data store
D. Process
7.
In the Analysis phase, the development of the ____________ occurs, which is a clear statement of the g
oals and objectives of the project.
A. documentation
B. flowchart
C. program specification
D. design
8. ____________ spend most of their time in the beginning stages of the SDLC, talking with end‐
users, gathering information, documenting systems, and proposing solutions.
A. Systems analysts
B. Project managers
C. Network engineers
D. Database administrators
9. __________ manage the system development, assign staff, manage the budget and
reporting, and ensure that deadlines are met.
A. Project managers
B. Network engineers
C. Graphic designers
D. Systems analysts
10. All of the following are the types of events that are associated with inputs on the context
diagram EXCEPT:
A. external events
B. temporal events
C. national events
D. state events
11. Which of the following is a language syntax for specifying the logic of a process?
A. jargon
B. policy
C. structured English
D. decision table
12. The act of breaking a system into its component subsystems, processes, and sub processes
is known as __
A. control flow
B. data conservation
C. dissecting
D. decomposition
13. What do rounded rectangles represent in data flow diagrams?
A. processes
B. external agents
C. data stores
D. data flows
14. Which of the following is the best definition of a decision table?
A. table of rules that governs how a process is to be completed?
B. table presentation of the use‐case list
C. tabular presentation that specifies a set of conditions and their corresponding actions
D. table that documents processes and the locations where they are performed
15. What is a context diagram?
A. a diagram used to document the scope for a system
B. the most in depth data flow diagram
C. a model of the final design, ready for implementation
D. a flowchart depicting one small, specific process broken down to its lowest level
16. What is process modeling?
A. a technique used to organize and document a system's process
B. the number of entities that participate in a relationship
C. the act of breaking a system into sub components
D. a description of activities and services a system must provide
17. You will find all of the following in use cases EXCEPT:
A. actors
B. members
C. events
D. inputs
E. outputs
18. Which statement below is true about data flow diagrams (DFDs)?
A.a DFD is a tool that depicts the flow of data through a system and the work or
processing performed by that system
B. a DFD is known as a process model
C. a DFD is known as a conceptual model
D. A & B
E. A& C
19. The CRUD in a CRUD matrix stands for?
A. customer, receiver, user, data
B. create, relay, uploaded, delete
C. context diagram, requirements diagram, use‐case diagram, decomposition diagram
D. create, read, update, delete
E. check, resume, update, delete
20. When data is at "rest" it is most likely an:
A. system
B. external agent
C. data flow
D. data store
E. process
Semester 1 2017
B. Develop a set of possible solutions, then verify that the benefits of solving the problem outweigh
the costs.
C. Verify that the benefits of solving the problem outweigh the costs, then define the requirements
for solving the problem.
D. Implement the solution, then define the details of the chosen solution.
2. Usually, the longest phase for any information system is the ____ phase.
A. analysis
B. implementation
C. design
D. support
4. The process of understanding and specifying in detail what the information system should
accomplish is called systems ____.
A. design
B. specification
C. analysis
D. administration
6. A technique that seeks to alter the nature of the work done in a business function, with the
objective of radically improving performance, is called ____.
B. strategic planning
C. Verify that the benefits of solving the problem outweigh the costs
8. Users are typically more involved in the project during which two phases?
9. Which of the following describes the activities that the system must perform - that is, the business
uses to which the system will be applied?
A. Functional requirements
B. General requirements
C. User requirements
D. Technical requirements
11. The is a model for representing the essential elements for embezzlement to occur.
A. access controls.
B. fraud triangle.
C. security controls.
D. security triangle.
13. Examine the first-cut-sequence diagram shown in Figure 1 and indicate the label that represents
an input message.
A. I.
B. II.
C. III.
D. IV.
14. If the first-cut sequence diagram (Figure 1) is for the Create customer account use case, what will
be the expected entry in the rectangle marked “III”?
B. createCustomer(name, phones)
C. (newCustomerAccount, created.
16. Figure 2 shows that not all records/rows have the same number of columns. For example, the first
record/row for Mary Smith has 3 dependents (Dependent1, Dependent2, and Dependent3) while the
second record/row for Jose Pena has no dependents while the third record for Frank Collins has 2.
Which formal technique is applied to improve the database design?
A. Normalization.
B. encryption key.
18. The user-centred design approach considers: colours, shapes, textures, fonts, sounds, windows,
menus, and buttons as
A. physical aspects.
B. conceptual aspects.
C. usable aspects.
D. perceptual aspects.
19. Preventing invalid or erroneous data from entering an information system can be handled by
using:
A. type of web site that provides active user interaction along with rich multimedia.
B. type of web site that combines functionality of several other web sites.
C. type of application that provides a complete set of functions but only available via a web site.
D. type of application that offers iconic menu items in a user friendly environment.