System Analysis and Design 9
thEdition
Chapters 1-12 Review
Chapter 1
1. Structured analysis is called a ____ approach since it is based on an overall plan. A: managed
B: foundation C: basic D: predictive
2. One of the two main sectors of E-commerce is ____. A: business-to-consumer
B: brick-and-mortar C: consumer-to-business D: dot-com
3. Software consists of system software and ____. A: application software
B: network operating system C: linear software
D: data software
4. The term ____ refers to the combination of hardware and software products and services that companies use to manage, access, communicate, and share information.
A: practical technology B: electronic technology C: information technology D: systems technology
5. ____ tests system concepts and examine input, output, and user interfaces before final decisions are made.
A: CASE tools B: Prototyping C: Investigative design D: Group typing 6. Google is an example of ____. A: an Internet-dependent company B: a brick-and-mortar company C: a B2B company D: an Internet-independent company
7. The programs that control the hardware and produce the desired information or results are referred to as ____.
A: data B: people C: processes D: software
8. ____ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.
A: Certification B: Validation
C: Documentation D: Authentication
9. The ____ are logical rules that identify data patterns and relationships. A: linear rules
B: system rules C: inference rules D: productivity rules
10. A graphical representation of one or more tasks that a company performs is considered ____. A: a business model
B: a business process C: a business profile D: an analytic profile
11. Data that has been transformed into output that is valuable to users is ____. A: mission
B: information C: operations D: processes
12. The IT group provides technical support that includes all of the following EXCEPT ____. A: Web support
B: application development C: user systems requests D: database administration
13. The newest development in data acquisition is called ____ technology, which uses high-frequency radio waves to track physical objects.
A: RID B: RAD C: RFID D: FID
14. A ____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.
A: business model B: business process C: business system D: business profile
15. A set of related components that produce specific results is a ____. A: system
B: compound C: strategy D: package
16. A development system that focuses on team-based fact-finding is ____. A: RAD
B: JAD
C: either a. or b. D: neither a. nor b.
17. When first introduced, management information systems (MIS) was a category of systems which served ____.
A: managers
B: administrative staff C: operational personnel D: maintenance staff
18. The ____ is NOT an example of an internal user of a company's information system. A: customers who track their orders on a company's Web site
B: company's technicians C: company's sales staff
D: company's corporate officers
19. The correct definition of an in-house application is ____. A: an information system developed by outside vendors
B: an information system developed by the company that uses the information system C: a software package
D: an information system that is Internet-based
20. Structured analysis uses a set of process models to describe a system ____. A: in words
B: in numbers C: dynamically D: graphically
21. A way in which businesses use information is ________. A: to deliver quality products and services
B: to make sound decisions
C: to maintain customer loyalty D: all of these choices
22. The combination of information technology, people, and data to support business requirements is called a(n) ________.
A: active data system B: information system C: electronic system D: communal system
23. In an information system, the system's raw material is ________. A: data
B: critical quota C: people D: matter
24. The ________ component is NOT a key part of an information system. A: Internet access
B: processes C: software D: people
25. An inventory or payroll application is an example of a ________. A: data system
B: vertical system C: legacy system
26. The building blocks of an information system, representing actual day-to-day business operations are called ________.
A: business models B: processes
C: hardware D: data
27. The process used by systems analysts to represent company operations and information needs is called ________.
A: user targeted modeling B: business action modeling
C: business process modeling D: product modeling
28. BPMN refers to ________.
A: business process modeling notation B: business profile modeling notation C: none of these choices
D: business process modeling names
29. Computer-to-computer data transfer between companies, usually over private telecommunications lines is referred to as ________.
A: electronic data interchange B: B2C
C: Internet module exchange D: transaction processing
30. The ________ systems are also referred to as expert systems. A: business support
B: user productivity C: TP
D: knowledge management
31. ________ refers to information systems that support company-wide operations and data management requirements.
A: EDI
B: WebSphere strategy C: E-commerce
D: Enterprise computing
32. The most popular options for developing information systems are structured analysis, object-oriented analysis, and ________.
A: data flow analysis B: network methods C: modeling
D: agile methods
33. The systems planning phase usually begins with a formal request to the IT department, called a ________.
A: systems order B: client complaint C: planning request D: systems request
34. A development method that Microsoft calls ________ documents the experience of its own software development teams.
A: Rational Unified Process
B: Microsoft Application Development C: Microsoft Solutions Framework
D: Microsoft Xtreme Programming
Chapter 2 Review
1. An evaluation of the resources needed for users to be trained on a new system is part of ____ feasibility.
A: economic B: technical C: operational D: schedule
2. The first step in evaluating feasibility is ____. A: setting priorities
B: identifying systems requests that are not feasible or necessary C: conducting a preliminary investigation
D: building a prototype
3. The first step in a preliminary investigation is generally to ____. A: evaluate feasibility
B: perform fact-finding
C: understand the problem or opportunity D: estimate project development time and cost 4. An organizational chart does NOT show ____. A: formal reporting relationships
B: an overview of the way each department functions C: the informal alignment of a group
D: the names of employees and their positions
5. Many companies use ____ request forms that can be filled out and submitted electronically. A: printed
B: faxed C: online D: offline
6. A company's ____ are broken down into one-year, three-year, and five-year categories. A: objectives
B: goals
C: requirements D: inventory
7. The coding of data to keep it safe from unauthorized users is called ____. A: prototyping
C: password access D: key access
8. EDI refers to ____.
A: external development interchange B: electronic data interchange C: external data interchange D: none of the above
9. A risk is an event that can affect a project ____. A: negatively
B: positively C: both a. and b. D: neither a. nor b.
10. Chapter 2 explained four types of project feasibility tests that a systems request must pass and did NOT include ____ feasibility.
A: technical B: marketing C: economic D: schedule
11. An examination of the reliability of the hardware and software environment for a new system is part of ____ feasibility.
A: economic B: technical C: operational D: schedule
12. A project where management has a yes/no choice to implement is called a ____ project. A: nondiscretionary
B: discretionary C: resource D: non-resource
13. A popular technique for investigating causes and effects is called a(n) ____. A: Ishikawa diagram
B: arrowhead diagram C: Moore diagram
D: Problem/Solution diagram
14. A fact-finding method during the preliminary investigation includes all of the following EXCEPT ____.
A: observing the current system in operation B: conducting a survey of users
C: reviewing current system documentation D: figuring out the costs of the solution
15. ____ feasibility means that a project can be implemented in an acceptable time frame. A: Technical
C: Schedule D: Operational
16. A SWOT analysis does NOT include an examination of ____. A: weaknesses
B: options C: strengths D: threats
17. Vital objectives that must be achieved for the enterprise to fulfill its mission are considered ____.
A: the SDLC
B: critical success factors C: critical business issues D: CASE tools
18. Hardware-based security controls that can identify a person by a retina scan or by mapping a facial pattern are referred to as ____.
A: biological devices B: encrypted devices
C: strategic scanning devices D: biometric devices
19. The purpose of a(n) ____ system is to provide the right product in the right place at the right time.
A: EDI B: CRM C: CASE D: JIT
20. Microsoft Project is a tool that is often used by ____. A: end users
B: project managers
C: customer service personnel D: top managers
21. A systems request form should not ____. A: have complex instructions
B: be easy to understand
C: include enough space for all required information D: indicate what supporting documents are needed
22. A(n: ____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.
A: condition B: constraint C: impediment D: obstacle
23. To avoid the problem of project creep, ____. A: define project scope as vaguely as possible B: leave project scope undefined
C: define project scope as clearly as possible D: expand the focus beyond the problem at hand
24. ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”
A: schedule feasibility B: technical feasibility C: economic feasibility D: operational feasibility
25. ____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.
A: Mission statement
B: Customer relationship management (CRM) C: Feasibility study
D: Total cost of ownership (TCO:
26. A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs.
A: economic B: schedule C: operational D: technical
27. ____ is an example of a discretionary project. A: Creating a new report for a user
B: Adding a report required by a new federal law
C: Including annual updates to payroll and tax percentages D: All of the above
28. When setting priorities for systems requests, the highest priority goes to projects that provide the ____.
A: least benefit, at the highest cost, in the longest period of time B: least benefit, at the lowest cost, in the longest period of time C: greatest benefit, at the highest cost, in the shortest period of time
D: greatest benefit, at the lowest cost, in the shortest period of time
29. Projects where management has a choice in implementing them are called ____ projects. A: discretionary
B: nondiscretionary C: appended
D: concatenated
30. A systems analyst conducts a(n: ____ investigation to study the systems request and recommend specific action.
A: preliminary B: appendix C: systems D: transitional
Chapter 3 Review
1. The project ____ handles administrative responsibilities for the development team and negotiates with users you might have conflicting requirements.
B: supporter C: coordinator D: leader
2. PERT/CPM is considered to be a ____ technique. A: side-to-side
B: parallel task C: bottom-up D: top-down
3. Analyzing risks is a two-step process that includes both ____ analysis. A: qualitative and quantitative
B: profit and loss
C: timing and critical path D: identification and response
4. Project ____ includes identifying project tasks and estimating completion time and costs. A: planning
B: scheduling
C: monitoring and controlling D: reporting
5. With PERT/CPM, the ____ is the amount of time it will take to complete a task. A: time assignment
B: time duration C: time length D: time pattern
6. A ____ walk-through is a review of a project team member's work by other members of the team.
A: status B: structured C: open D: private
7. Project ____ involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that may delay a project.
A: planning B: scheduling
C: monitoring and controlling D: reporting
8. With PERT/CPM, tasks that must be completed one after the other, like a relay race, are called ____ tasks.
A: dependent B: independent C: fast
9. Walk-throughs that take place throughout the SDLC are also called all of the following EXCEPT ____. A: code reviews B: design reviews C: testing reviews D: timing review
10. Project ____ requires guiding, supervising, and coordinating the project team's workload. A: planning
B: scheduling
C: monitoring and controlling D: reporting
11. Task patterns can involve ____ tasks. A: dependent
B: multiple successor C: multiple predecessor D: all of the above
12. Project managers can use ____ software to help plan, estimate, schedule, monitor, and report on a project.
A: change control B: project management C: project resource D: path management
13. Project ____ tasks include regular progress reports to management, users, and the project team itself.
A: planning B: scheduling
C: monitoring and controlling D: reporting
14. When several tasks can start at the same time, each is called a ____ task. A: concurrent
B: successor C: predecessor D: dependent
15. When software is ____ it is free, and supported by a large group of users and developers. A: free-source
B: open-source C: private-source D: share-source
16. A(n) ____, or activity, is any work that has a beginning and an end and requires the use of company resources such as people, time, or money.
A: event B: task
C: habit D: plan
17. Often, two or more concurrent tasks, depend on a single prior task, which is called a ____. A: concurrent
B: successor C: predecessor D: dependent
18. The most popular project management software is ____. A: ACT
B: Microsoft Office Project 2007 C: Open Workbench
D: Project Solution
19. A(n) ____, or milestone, is a recognizable reference point that can be used to monitor progress and manage the project.
A: plan B: habit C: event D: task
20. In the situation where concurrent tasks depend on a predecessor task, each concurrent task is called a ____ task.
A: dependent B: successor C: predecessor D: dependent
21. A ____ path includes all tasks that are vital to the project schedule. A: vital
B: baseline C: critical D: foundational
22. A(n: ____ chart displays complex task patterns and relationships. A: Gantt
B: index C: PERT/CPM D: task
23. In developing time and cost estimates, project managers must consider _____. A: project size and scope
B: IT resources
C: prior experience with similar projects or systems D: all of the above
24. A project manager’s scheduling function _____.
A: involves guiding, supervising, and coordinating the project team’s workload
B: includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target
C: involves staffing, which includes selecting the project team and assigning specific tasks to team members
D: includes identifying and arranging project tasks and estimating completion times and costs 25. A task is any work that requires the use of company resources including all of the following EXCEPT ____.
A: controlling capital B: people
C: time D: money
26. A risk management plan includes a review of all of the following EXCEPT ____. A: employees
B: project scope C: stakeholders D: budget
27. Project scheduling involves all of the following EXCEPT ____. A: defining project constraints
B: staffing the project team
C: arranging for necessary resources
D: assigning specific tasks to team members
28. Microsoft’s risk management model includes all of the following EXCEPT ____. A: category, which specifies the risk type
B: probability, which indicates the degree of adverse effect should the risk occur, on a scale of 1 to 10
C: mitigation plan, which identifies plans to control or limit the risk
D: trigger, which identifies a condition that would initiate the contingency plan 29. A project manager’s planning _____.
A: involves guiding, supervising, and coordinating the project team’s workload
B: includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target
C: consists of staffing, which includes selecting the project team and assigning specific tasks to team members
D: includes identifying project tasks and estimating completion times and costs 30. All of the following are versions of Microsoft Office Project 2007 EXCEPT ____. A: Standard
B: Enterprise C: Professional D: Server
Chapter 4 Review
1. The sales tracking system must produce a daily fast-moving-item report, listing all products that exceed the forecasted sales volume grouped by style, color, size, and reorder status is an example of a(n) ____ requirement.
A: output B: input C: processes D: performance
2. Response time must not exceed four seconds is an example of a(n) ____ requirement. A: control
B: input C: process D: performance
3. ____ questions encourage spontaneous and unstructured responses. A: Open-ended
B: Closed-ended C: Range-of-response D: Leading
4. A ____ is a document containing a number of standard questions that can be sent to many individuals.
A: questionnaire B: survey C: both a. and b. D: neither a. nor b.
5. If you want to ensure that the sample is balanced geographically, you could use a ____ sample to select five customers from each of four zip codes.
A: random B: systematic C: stratified D: structured
6. In ____ brainstorming, each participant speaks when it is his or her turn, or passes. A: unstructured
B: structured C: random D: systematic
7. A ____, such as Microsoft Outlook or Lotus Organizer, can help manage those tasks and provide a personal calendar and a to-do list, with priorities and the capability to check off completed items.
A: PDA B: DPA C: PIM D: PMI
8. Chapter 4 describes ____, which involves fact-finding to describe the current system and identification of the requirements for the new system, such as outputs, inputs, processes, performance, and security.
A: output design
B: requirements modeling C: requirements design D: output modeling
9. ____ refer to the logical rules that are applied to transform the data into meaningful information. A: Outputs
B: Inputs C: Processes D: Performance
10. ____ analysis identifies the data flowing into a process, the business rules that transform the data, and the resulting output data flow.
A: Structured B: Data C: Enterprise D: Process
11. ____ skills are especially valuable to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively. A: Data processing
B: Personal C: Analytical D: Interpersonal
12. ____ methods represent a recent trend that stresses intense interaction between system developers and users.
A: Co-op B: Object C: Flow D: Agile
13. The end product of ____ is the new information system. A: JAD
B: RAD
C: both a. and b. D: neither a. nor b.
14. During the ____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs.
A: software design B: software rollout C: user design D: user rollout
15. A functional decomposition diagram (FDD: is a top-down representation of a function or process. FDDs also are called ____ charts.
A: structure B: pie C: flow D: modeling
16. A ____ diagram visually represents the interaction between users and the information system. A: data case
B: requirements case C: use case
17. A ____ requirement is a characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users.
A: management B: system C: program D: data
18. The department head must enter overtime hours on a separate screen is an example of a(n) ____ requirement.
A: output B: input C: processes D: performance
19. All transactions must have audit trails is an example of a(n) ____ requirement. A: control
B: input C: process D: performance
20. Your primary responsibility during an interview is to listen carefully to the answers, concentrate on what is said and notice any nonverbal communication that takes place. This process is called ____ listening.
A: closed B: tracked C: open D: engaged
21. A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____.
A: flowchart B: histogram C: agile method D: Venn diagram
22. A(n) ____ is a top-down representation of a function or a process. A: UML
B: TCO C: FDD D: REJ
23. All of the following are categories of system requirements EXCEPT ____. A: outputs
B: dynamics C: performance D: controls
24. The term ____ refers to a system’s ability to handle increased business volume and transactions in the future.
A: scalability B: reliability C: compatibility D: applicability
25. Microsoft has developed a method for measuring a system’s total costs and benefits, called ____, which is a framework to help IT professionals analyze and optimize IT investments. A: TCO
B: REJ C: FDD D: UML
26. ____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.
A: Analytical skills B: Artistic skills C: Interpersonal skills D: Confrontational skills
27. ____ is a typical example of a system requirement for the output category.
A: Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs
B: The contact management system must generate a daily reminder list for all sales reps C: The student records system must allow record access by either the student name or the student number
D: The system must support 25 users simultaneously
28. One of the main activities in the systems analysis phase is ____ modeling, which involves fact-finding to describe the current system and identification requirements for the new system.
A: objective B: requirements C: goal-based D: user-based
29. Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.
A: UML B: TCO C: FDD D: REJ
30. A(n) ____ diagram shows the timing of interactions between objects as they occur. A: timing
B: ordering C: orientation D: sequence
Chapter 5 Review
1. Whether to use a decision table or a decision tree often is a matter of ____.
A: personal preferenceB: data requirements C: cycle times
D: number of domains
2. A set of DFDs provides a ____ model that shows what the system does, not how it does it. A: control
C: logical D: physical
3. The symbol for an entity is a ____, which may be shaded to make it look three dimensional. A: circle
B: triangle C: rectangle D: square
4. ____ maintains consistency among a set of DFDs by ensuring that input and output data flows align properly.
A: Diverging B: Balancing C: Looping D: Decomposing
5. The data ____ serves as a central storehouse of documentation for an information system. A: dictionary
B: store C: diagram D: partition
6. ____ English is a subset of standard English that describes logical processes clearly and accurately.
A: Logical B: Structured C: Simple D: Dictionary
7. A ____ model describes how the system will be constructed. A: physical
B: dictionary C: structured D: logical
8. A ____ process is a process that has input, but produces no output. A: blue box
B: black box C: gray hole D: black hole
9. When you explode a DFD, the higher-level diagram is called the parent diagram, and the lower-level diagram is referred to as the ____ diagram.
A: subset B: child C: pet
D: subordinate
10. ____ refers to whether the data element contains numeric, alphabetic, or character values. A: Domain
B: Type C: Category D: Rules
11. Iteration also is called ____. A: looping
B: sequencing C: partitioning D: decomposing
12. In DFDs, a process symbol can be referred to as a ____, because the inputs, outputs, and general functions of the process are known, but the underlying details and logic of the process are hidden.
A: blue box B: black box C: gray hole D: black hole
13. To draw a context diagram, you start by placing a single process symbol ____. A: in the center of the page
B: at the top of the page C: at the bottom of the page D: anywhere on the page
14. Data elements are combined into ____, also called data structures. A: domains
B: records C: skeletons D: iterations
15. Modular design is based on combinations of three logical structures that does NOT include ____.
A: sequence B: source C: selection D: iteration
16. The only disadvantage of the four-model approach is the added ____ needed to develop a logical and physical model of the current system.
A: time B: cost
C: both a. and b. D: neither a. nor b.
17. DFDs use four basic symbols that represent all EXCEPT the following ____. A: data flows
B: data stores C: entities D: attributes
18. DFD entities also are called ____, because they are data origins or final destinations. A: pseudocode
B: terminators C: originators D: sink holes
19. ____ also is called exploding, partitioning, or decomposing. A: Balancing
B: Leveling C: Processing D: Sequencing
20. A ____ documents the details of a functional primitive, and represents a specific set of processing steps and business logic.
A: diagram description B: physical model C: data structure D: process description
Chapter 6 Review
1. A ____ is a command that tells an object to perform a certain method. A: note
B: tag C: action D: message
2. O-O methodology is popular because it integrates easily with object-oriented programming languages such as ____.
A: Java B: Smalltalk C: Perl
D: all of the above
3. Objects within a class can be grouped into ____, which are more specific categories within a class.
A: sub-states B: mini-states C: subclasses D: mini-classes
4. The line from the actor to the use case is called a(n) ____, because it links a particular actor to a use case.
A: association B: partition C: instance D: relationship
5.Just as structured analysis uses DFDs to model data and processes, systems analysts use the ____ to describe object-oriented systems.
A: UML B: Java C: FTP D: OOD
6. The ____ shows what is included in the system (inside the rectangle) and what is not included in the system (outside the rectangle).
A: system diagram B: system boundary C: system border D: system template
7. When you identify use cases, try to group all the related transactions into ____. A: a single use case
B: several use cases C: either a. or b. D: neither a. nor b.
8. All possible states must be documented in the____ diagram. A: state transition
B: use case C: object-model D: logical-model
9. Like a DFD, a class diagram is a(n) ____ model, which evolves into a physical model and finally becomes a functioning information system.
A: static B: logical C: random D: object
10. The end product of object-oriented analysis is an object ____. A: diagram
B: model C: box D: use case
11. A ____ is identified by a dashed line and represents the time during which the object above it is able to interact with the other objects in the use case.
A: lifeline B: timeline C: interaction line D: safe line
12. If objects are similar to nouns, attributes are similar to ____. A: adjectives
B: verbs C: adverbs D: punctuation
13. A(n) ____ diagram resembles a horizontal flowchart that shows the actions and events as they occur. A: activity B: action C: movement D: process
14. The concept that a message gives different meanings to different objects is called ____. A: multi-use
B: state versatility C: action flexibility D: polymorphism
15. All objects within a class share common ____. A: attributes
B: methods C: both a. and b. D: neither a. nor b.
16. A class can belong to a more general category called a ____. A: pseudoclass
B: superclass C: subclass D: case
17. When the outcome of one use case is incorporated by another use case, we say that the second case ____ the first case.
A: uses
B: incorporates C: needs D: pairs with
18. A ____ represents the steps in a specific business function or process. A: task flow
B: task case C: use flow D: use case
19. In a class diagram, each class appears as a(n) ____, with the class name at the top, followed by the class's attributes and methods.
A: rounded rectangle B: rectangle
C: oval D: circle
20. A use case diagram is a visual summary of several related use cases within a ____. A: system
B: subsystem C: either a. or b. D: neither a. nor b.
21. ____ is a widely used method of visualizing and documenting an information system. A: UML
B: Java C: UNIX D: DFD
22. Objects can have a specific attribute called a(n) ____, which describes the object’s current status.
A: state B: cycle C: instance D: status
23. A(n) ____ is a group of similar objects. A: aggregate
B: concatenation C: class
D: packet
24. Sequence diagrams include symbols that represent all of the following EXCEPT ____. A: classes
B: indices C: lifelines D: messages
25. The number of ____ needed to describe an object depends on the business requirements of the information system and its users.
A: attributes B: packets C: indices D: keys
26. When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____.
A: triangle B: circle
C: rectangle D: square
27. Inheritance enables an object to derive one or more of its attributes from a(n) ____. A: user
B: precedent C: antecedent D: parent
28. ____ enables an object to derive one or more of its attributes from another object. A: Concatenation
B: Encapsulation C: Inheritance D: Polymorphism
29. An object has certain ____, which are characteristics that describe the object. A: keys
B: attributes C: indices
Chapter 7 Review
1. Another term for IBS is ____, because system operations are managed by the outside firm, or host.
A: managed hosting B: direct hosting C: outside hosting D: enterprise hosting
2. The choice between developing versus purchasing software often is called a ____ decision. A: make or buy
B: build or buy C: either a. or b. D: neither a. nor b.
3. A software package that can be used by many different types of organizations is called a(n) ____ application.
A: vertical B: horizontal C: limited D: unlimited
4. ____ was NOT listed as a reason that companies would develop software in-house versus buying it from an outside source.
A: Meet constraints of existing systems B: Develop internal resources and capabilities C: Lower costs
D: Satisfy unique business requirements
5. Some user applications have powerful screen and report ____ that allow users to design their own data entry forms and reports.
A: generators B: creators C: templates D: files
6. The ____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur.
A: ROI B: NPV C: EPS D: IRR
7. When you use an ____, you already know the specific product or service you want and you need to obtain price quotations or bids.
A: RFP B: RFQ C: NPV D: TCO
8. The goal of systems design is to build a system that is ____. A: effective
B: reliable C: maintainable D: all of the above
9. ____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.
A: SAS B: SaaS C: SSA D: SSaa
10. Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.
A: hubs B: portals C: channels D: middleware
11. The outsourcing of a basic business process is often called ____. A: BPO
B: BOP C: ISB D: IBS
12. A ____ model has a variable fee based on the number of users or workstations that have access to the application.
A: managed B: subscription C: service
D: cloud computing
13. The ____ makes, builds, and develops in-house software. A: company's IT department
B: company's ASP C: company's IBS D: all of the above
14. An accounting package is a good example of a(n) ____ application because it can be utilized by many different businesses, or separate divisions that exist in large, diversified companies. A: vertical
B: horizontal C: limited D: unlimited
15. The following is NOT one of the three ways the chapter listed as a way to customize a software package: ____.
A: You can merge two existing packages into one solution
C: You can purchase the package and make your own modifications, if this is permissible under the terms of the software license.
D: You can negotiate directly with the software vendor to make enhancements to meet your needs by paying for the changes.
16. Read-only properties means that users can ____. A: view the data
B: change the data C: either a. or b. D: neither a. nor b.
17. The Systems Analyst's Toolkit explains how to use three main cost analysis tools that do NOT include ____.
A: payback analysis B: ROI
C: NPV D: EPS
18. Another valuable resource is the Internet bulletin board system that contains thousands of forums, called ____, that cover every imaginable topic.
A: gatherings B: newsgroups C: social groups D: feeds
19. The two major Web-based development environments are IBM's WebSphere and Microsoft's ____.
A: .NET B: JavaScript C: Office D: Access
20. ____ development treats the Web as the platform, rather than just a communication channel. A: Internet-based
B: Traditional C: both a. and b. D: neither a. nor b.
21. Although the traditional model of software acquisition still accounts for more software acquisition, a new model called ____ is changing the picture dramatically.
A: Hardware as a Help B: Software as a Service C: Processing as a Product D: Storage as a Solution
22. A ____ measures the time a package takes to process a certain number of transactions. A: newsgroup
B: parameter C: benchmark D: default
23. A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.
A: application B: configuration C: interface D: interpolation
24. ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.
A: Prototyping B: Outsourcing C: Coding
D: Benchmarking
25. IBM’s ____ is one of the major Web-based development environments. A: WebSphere
B: .NET C: NetSphere D: .WEB
26. A(n: ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.
A: method B: administrative
C: transaction D: interpolated
27. In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment.
A: 2GL B: 3GL C: 4GL D: 5GL
28. In addition to configuring software, an IT staff can create a user ____, which includes screens, commands, controls, and features that enable users to interact more effectively with the
application. A: montage B: index C: interface D: package
29. Guidelines to follow when determining data entry and storage considerations include all of the following except ____.
A: data should be entered into the system where and when it occurs B: data should be verified when it is entered
C: data duplication should be encouraged
30. Reports that trace the entry of and changes to critical data values are called ____ and are essential in every system.
A: audit trails
B: protective pathways C: backtracks
D: value tracks
Chapter 8 Review
1. A ____ check tests data items to verify that they fall between a specified minimum and maximum value.
A: process-control B: toggle button C: data validation
D: range
2. Web-based logs, called ____, are journals written from a particular point of view. A: wogs
B: jogs C: blogs D: logs
3. ____ interaction describes the relationship between computers and people who use them to perform business-related tasks.
A: Human-computer B: Person-computer C: Human-PC D: Person-PC
4. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered.
A: output reporting B: output listing C: output control D: output checking
5. ____ includes the necessary measures to ensure that input data is correct, complete, and secure.
A: Output control B: Input control C: either a. or b. D: neither a. nor b.
6. When designing a report, you should prepare a sample report, which is called a ____, for users to review.
A: mock-up B: prototype C: either a. or b. D: neither a. nor b.
7. An option button, or ____ button, represents one choice in a set of options. A: television
C: stereo D: radio
8. A ____ report produces one or more lines of output for each record processed. A: summary
B: highlights C: control D: detail
9. A ____ check identifies values that are questionable, but not necessarily wrong. A: reasonableness
B: process-control C: data validation D: range
10. A ____ is a specially formatted digital audio file that can be downloaded by Internet users from a variety of content providers.
A: songcast B: podcast C: listencast D: voicecast
11. A ____ interface uses icons, graphical objects, and pointing devices. A: green screen
B: Web 1.0
C: human-computer D: graphical user
12. Output ____ protects privacy rights and shields the organization's proprietary data from theft or unauthorized access.
A: reporting B: prototyping C: security D: safety
13. Once data is entered, the company should store source documents in a safe location for some specified length of time according to their ____ policy.
A: records retention B: records safety C: records filing D: records scanning
14. After a report design is approved, you should document the design by creating a report ____ form, which contains information about the fields, data types and lengths, and report frequency. A: system
B: analysis C: design D: prototype
15. The main part of the form, called the ____ zone, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.
A: body B: heading C: footer
16. Each line of output printed is called a ____ line. A: detail
B: information C: data
D: control
17. A ____ check is used for data items that must have certain values. A: process-control
B: reasonableness C: validity
D: range
18. An automated facsimile or ____ system allows a customer to request a fax using e-mail, via the company Web site, or by telephone.
A: fax fast B: fax mail C: fax now D: faxback
19. A ____ check improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.
A: data resources B: data dependency C: data validation D: data quality
20. A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled.
A: disk B: diskless C: either a. or b. D: neither a. nor b.
21. Sensitive data can be coded, in a process called ____, so only users with decoding software can read it.
A: filtering B: context safety C: spam
D: encryption
22. A popular security solution is the use of a network based application, often called a ____, that controls access to and from workstation interfaces.
A: port cop B: port protector C: workstation cop D: workstation protector
23. A ____ report displays only those records that meet a specific condition or conditions. A: exception
B: error C: end D: estimation
24. Good form ____ makes the form easy to complete and provides enough space, both vertically and horizontally, for users to enter the data.
A: layout B: processing C: data entry D: output
25. ____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.
A: COF B: COL C: COS D: COM
26. Using ____ input, data entry usually is performed on a specified time schedule, such as daily, weekly, monthly, or longer.
A: batch B: intermittent C: sequence D: combination
27. Every page should include a page ____, which appears at the top of the page and includes the column headings that identify the data.
A: footer B: header C: control D: signature
28. The ____ zone usually contains the company name or logo and the title and number of the form.
A: control B: heading C: footer D: body
29. Although the vast majority of reports are designed graphically, some systems still produce one or more character-based reports that use a character set with ____ spacing.
A: fixed B: variable C: either a. or b. D: neither a. nor b.
30. When the value of a control field changes, a control ____ occurs. A: break
B: miss C: mistake D: error
31. A ____ check is performed on two or more fields to ensure that they are consistent or reasonable when considered together.
A: dual B: two-time C: combination D: readiness
32. ____ design focuses on user needs for screen and printed forms of output. A: Output
C: both a. and b. D: neither a. nor b.
33. A ____ describes how users interact with a computer system, and consists of all the hardware, software, screens, menus, functions, output, and features that affect two-way communications between the user and the computer.
A: user scope map B: user interface C: user path D: user process
34. A ____ document is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction.
A: report B: sequence C: source D: output
35. In addition to built-in design tools, popular software packages such as ____ Reports offer powerful features that help designers deal with professional-level design issues across the enterprise.
A: Crystal B: Diamond C: Gold D: Platinum
36. The ____ zone contains codes, identification information, numbers, and dates that are used for storing completed forms.
A: footer B: control C: body D: heading
37. Database programs such as Microsoft Access include a variety of report design tools,
including a ____, which is a menu-driven feature that designers can use to create reports quickly and easily.
A: Data Wizard B: Data Generator C: Report Wizard D: Report Generator
38. A ____ box can display messages or provide a place for a user to enter data. A: option
B: text C: graphics D: storyboard
39. In a user-centered system, the distinction blurs between ____ and the interface itself. A: input
B: output C: both a. and b. D: neither a. nor b.
40. A sales manager might want to know total sales for each sales representative, but not want a detail report listing every sale made by them. In that case, a ____ report is appropriate.
B: highlights C: error
D: regression analysis
41. A control break usually causes specific actions, such as printing subtotals for a group of records. That type of detail report is called a ____ report.
A: control output B: control series C: control break D: control error
42. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered.
A: output reporting B: output listing C: output control D: output checking
43. Data ____ is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks.
A: entry B: checking C: layout D: switching
44. Batch ____ are totals used to verify batch input. A: controls
B: zones C: buttons D: tags
45. Data ____ policies and procedures protect data from loss or damage, which is a vital goal in every organization.
A: control B: process C: security D: integrity
46. Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives.
A: aesthetics
B: interface technology C: ergonomics
D: output security
47. When designing data entry screens, provide an on-screen instruction to let users know the date format, and provide an example if the user must enter ____.
A: verifiers B: clones C: separators D: masks
48. A key physical design element is the ____, which describes how users interact with a computer system.
A: HCI B: PCI C: UI D: PI
49. In a well-designed detail report, a field called a(n) ____ field controls the output. A: break
B: indexed C: dominant D: control
51. In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system.
A: physical B: process C: input D: command
52. In a source document, if totals are included on a form, they appear in the ____ zone. A: calculated
B: control C: totals D: heading
53. Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.
A: storyboard
B: turnaround document C: faxback
D: output control
54. A combination check is a data validation check that ____.
A: tests data items to verify that they fall between a specified minimum and maximum value B: identifies values that are questionable, but not necessarily wrong
C: is performed on two or more fields to ensure that they are consistent or reasonable when considered together
D: is used for mandatory data items
55. In a data entry screen, a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked.
A: command button B: option button C: toggle button D: radio button
Chapter 9 Review
1. A ____ is a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values.
A: loop
B: repeating group C: variety group D: combination field
2. ____, which record details of all accesses and changes to the file or database, can be used to recover changes made since the last backup.
A: Primary table files B: Audit log files
C: Backup encryption files D: Data warehouse records
3. A ____ file is created for archiving purposes. A: work
B: table C: security D: history
4. During the system design phase, you use ____ to organize, access, and maintain data structures.
A: key files B: key records C: key fields D: key tables
5. ____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.
A: Cardinality B: ERD
C: The primary key D: Normalization
6. ____ codes distinguish items by using a series of subgroups of digits. A: Significant digit
B: Action C: Derivation D: Cipher
7. A(n) ____ date is the total number of days from some specific base date. A: arithmetic
B: control C: absolute D: variable
8. Data ____ problems can occur if updates are not applied in every file. A: structure
B: security C: integrity D: redundancy
9. Because intranets and extranets use the same protocols as the Internet, they are called ____. A: protocol-centric
B: client/server focused C: middleware focused D: Web-centric
10. A(n) ____ relationship exists when exactly one of the second entity occurs for each instance of the first entity.
A: one-to-one B: one-to-many C: many-to-many D: none of the above
11. Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.
A: mnemonic B: harmonic C: rhyming D: alphabetic
12. EBCDIC and ASCII require eight bits, or ____ byte(s), for each character. A: one
B: two C: three D: four
13. A ____ language controls database operations, including storing, retrieving, updating, and deleting data.
A: data manipulation B: data query
C: data information D: data communication
14. A ____ key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
A: primary B: secondary C: foreign D: referential
15. A table is ____ if it does not contain a repeating group. A: first normal form
B: second normal form C: concatenated D: considered invalid
16. Data ____ software looks for meaningful patterns and relationships among data. A: process
B: validation C: mart D: mining
17. ____ fields are special fields within data records to provide additional control or security information. A: Primary B: Audit C: Check D: Limit
18. The inherent efficiency of high-volume processing on larger computers is called ____. A: flexible data sharing
B: data independence C: controlled redundancy D: economy of scale
19. A record, also called a ____, is a set of related fields that describes one instance of an entity. A: tuple
B: couple C: table
D: label
20. A DBMS is usually managed by a person called a ____. A: database administrator
B: file administrator C: system administrator D: security administrator
21. Any field that could serve as a primary key is called a ____ key. A: candidate
B: summary C: potential D: primary
22. A ____ specifies the fields and identifies the primary key in a particular table or file. A: output design
B: market basket design C: table design
D: diagram design
23. A ____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
A: data warehouse B: data storehouse C: database
D: database set
24. In the event of a file catastrophe, ____ procedures can be used to restore the file or database to its current state at the time of the last backup.
A: recovery B: reinstatement C: back-up D: security
25. A ____ file stores records that contain day-to-day business and operational data. A: master
B: table C: transaction D: work
26. A(n) ____ is a person, place, thing, or event for which data is collected and maintained. A: table
B: entity C: field D: record
27. A ____ relationship exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.
A: one-to-one B: one-to-many C: many-to-many D: none of the above
28. ____ codes combine data from different item attributes, or characteristics, to build the code. A: Significant digit
C: Derivation D: Cipher
29. A ____ format uses only 16 bits to represent the number 12,345 in binary form. A: integer
B: binary storage C: long integer D: character-based
30. A ____ consists of linked tables that form one overall data structure. A: database structure
B: database system C: open structure D: open system
31. A ____ is a text document written in HTML. A: Web browser
B: Web page C: Web site D: Web server
32. Without referential integrity, you might have a sales order called a(n) ____, because it has no related customer.
A: orphan B: loop C: gap D: error
33. A ____ is a set of numbers or letters that represent a data item. A: key
B: state C: code D: unit
34. ____ storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored.
A: Logical B: Physical C: either a. or b. D: neither a. nor b.
35. A ____ is a view of the database used by one or more systems or users. A: schema
B: subschema C: class D: subclass
36. A nonkey field is any field that is NOT a ____. A: primary key
B: candidate key C: both a. and b. D: neither a. nor b.
37. Field X is ____ on field Y if the value of field X depends on the value of field Y. A: functionally independent
C: either a. or b. D: neither a. nor b.
38. Different privileges, also called ____, can be associated with different users of a computer system.
A: passwords B: user IDs C: filters D: permissions
39. A(n) ____ is a graphical model of an information system that depicts the relationships among system entities.
A: SQL B: OCE C: ODBC D: ERD
40. With a(n) ____ language, the user provides an example of the data requested. A: SQL
B: IDE C: QBE
D: interpolated
41. One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
A: scalability B: compatibility C: cardinality D: functionality
42. When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.
A: client B: table C: password D: buffer
Chapter 10
1. A form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high powe
A: Bluetooth B: USB C: RFID D: Mbps
2. In the ____ section in a typical system design specification, startup processing, initial data
entry or acquisition, user training requirements, and software test plans are specified. A: System Environment
B: Executive Summary C: System Components
3. The ____ technology is compatible with earlier 802.11 versions A: BSS
B: ESS C: ISS D: MIMO
4. A ____, such as that illustrated in the accompanying figure, has a central networking device
that manages the network A: hierarchical network B: star network
C: bus network D: ring network
5. In the OSI (open system interconnection: model, the application layer ____.
A: defines specific methods of transmitting data over the physical layer B: provides network services requested by a local workstation
C: defines control structures that manage the communications link between computers D: contains physical components that carry data
6. The maximum speed for wireless network standards is measured in ____. A: Bps
B: Gbps C: Mbps D: Tbps
7. To increase bandwidth, the IEEE created two ____ to its initial standard to offer considerable improvement in transmission speed.
A: amendments B: options C: LANs
D: versions
8. The ____ section in a typical system design specification describes the constraints, or
conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.
A: Time and Cost Estimates B: System Environment C: Executive Summary D: System Components
9. During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an
information system that handles daily sales transactions and maintains the online inventory file. A: POS
B: batch C: topological D: portal
10. All of the following use access points except ____. A: BSS
B: ESS C: ISS
D: none of the above
11. When using the ____ configuration, a central wireless device called an access point is used to serve all wireless clients
A: Basic Service Set B: Extended Service Set C: Independent Service Set D: Dependent Service Set
12. An ____ Service Set is made up of two or more Basic Service Set networks. A: Distributed
B: Extended C: Dependent D: Independent
13. In addition to Wi-Fi, another form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high power.
A: Bluetooth B: Redtooth C: Blueconnect D: Redconnect
14. ____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security.
A: Network architecture B: System architecture C: Open architecture D: Data architecture
15. A specific hardware and software environment is also called a ____. A: platform
B: master C: setting D: foundation