1. Examples of company-wide applications, called legacy applications, include order processing systems, payroll systems, and company communications networks.
A) False
2. In a sequence diagram, vertical arrows represent messages from one object to another.
A) False
3. Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable business solution that fits the company’s long-term business strategy.
A) True
4. Security is especially important when data or processing is performed at a centralized facility, rather than at remote locations.
A) False
5. The Pareto chart, sometimes called a scatter diagram, is a problem-solving tool.
A) False
6. The strongest relationship among objects is called inheritance.
A) True
7. Due to the limited range of input and interaction among participants, few companies believe that a joint application development (JAD) group produces the best definition of a new system.
A) Fase
8. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.
A) True
9. Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
A) True
10. Cloud computing requires less bandwidth than traditional client/server networks.
A) False
11. Many firms feel that in-house IT resources and capabilities provide a competitive advantage because an in-house team can respond quickly when business problems or opportunities arise.
A) True
12. Qualitative risk analysis can involve a modeling process called what-if analysis, which allows a project manager to vary one or more element(s) in a model to measure the effect on other elements.
A) False
13. Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.
A) False
14. The skill set required to develop documentation usually is the same as that required to develop a system.
A) False
15. Using batch input, data entry is performed continuously.
A) False
16. A three-tier design includes a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.
A) True
17. In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.
A) False
18. Network administration includes hardware and software maintenance, support, and security. A) True
19. If modules are loosely coupled, one module is linked to internal logic contained in another module.
A) False
20. Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.
A) True
21. On lower-level diagrams with multiple processes, there should not be more than nine process symbols.
A) True
22. If team members lack experience with certain aspects of the required technology, temporary help might be obtained from IT consultants or part-time staff.
A) True
23. Interface design should call for attention to the interface, rather than facilitating design objectives.
A) False
24. The symbol for an entity is a circle.
A) False
25. Object-oriented methods provide an easy transition to O-O programming languages such as C++, Java, and Swift.
A) True
26. An in-house solution usually requires a greater initial investment but provides more flexibility for a company that must adapt quickly in a dynamic e-commerce environment.
A) True
27. ISO requires a specific development plan, which outlines a step-by-step process for transforming user requirements into a finished product.
A) True
28. A SWOT analysis examines a firm’s technical, human, and financial resources.
A) True
29. College course numbers usually are assigned using a block sequence code.
A) True
30. The main objective of training is to show users how the system can help them perform their jobs.
A) True
31. in a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart, each rectangular box, called a task box, has five sections that contain important information about a task.
A) True
32. The only disadvantage of the four-model approach is the added time and cost needed to develop a logical and physical model of the current system.
A) True
33. Centralized IT departments no longer produce reams of printed reports.
A) True
34. A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
A) False
35. The test environment for an information system contains copies of all programs, procedures, and test data files.
A) True
36. Business support systems ______.
A) provide job-related information support to users at all levels of a company
37. In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an information system.
A) Field
38. With a _____, users provide an example of the data requested.
A) query by example language
39. The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.
A) report footer
40. A class diagram includes the class _____, which represent the program logic. A) methods
41. The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
A) OSI (Open Systems Interconnection) model
42. A(n) _____ is a characteristic or feature that must be included in an information system to satisfy business needs and be acceptable to users.
A) system requirement
43. The inherent efficiency of high-volume processing on larger computers is called. A) economy of scale
44. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
A) product baseline
45. In an interview, _____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.
A) range-of-response questions
46. In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.
A) access point
47. Typical process description tools include_____.
A) decision trees
48. The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.
A) computer resources committee
49. A _____ measures the time a package takes to process a certain number of transactions. A) benchmark
50. A(n) _____ represents a person, a place, an event, or a transaction that is significant to the information system.
A) object
51. During the systems design phase, _____ are used to organize, access, and maintain data structures.
A) key fields
52. In _____, two programmers work on the same task on the same computer; one drives while the other navigates.
A) pair programming
53. To obtain answers to requirements questions, the analyst develops a _____ plan, which involves answers to five familiar questions: who, what, where, when, and how.
A) fact-finding
54. _____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
A) Maintenance activities
55. The first step in the creation of a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart is to.
A) identify all the project tasks
56. If processes must be performed in a specific sequence, the information should be documented in the.
A) process descriptions
57. Many hardware and software companies offer _____ for IT professionals, which verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.
A) certification
58. _____ determines how long it takes an information system to pay for itself through reduced costs and increased benefits.
A) Payback analysis
59. Project scheduling, an activity of a project manager, ____.
A) involves staffing, which includes selecting the project team and assigning specific tasks to team members
60. Using _____, a supplier can use radio frequency identification (RFID) tags on each crate, case, or shipping unit to create a digital shipping list.
A) EPOD (electronic proof of delivery)
61. _____ measures risk likelihood and impact.
A) Risk assessment
62. The black box concept is an example of _____, which means that all data and methods are self contained.
A) encapsulation
63. When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors.
A) request for quotation (RFQ)
64. Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specifications and software quality standards.
A) quality assurance
65. _____ usually focus on long-term challenges and goals, the importance of a firm’s stakeholders, and a commitment to the firm’s role as a corporate citizen.
A) Mission statements
66. Printed output is used in _____, which are output documents that are later entered back into the same or another information system.
A) turnaround documents
67. A _____ is a sequence of tasks that has no slack time.
A) critical path
68. A bank account object can have a specific attribute called a(n) _____ that can be active, inactive, closed, or frozen.
A) State
69. _____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
A) Cloud computing
70. Which is an example of a tangible benefit?
A) An online package tracking system that improves service and decreases the need for clerical staff 71. The line from the actor to the use case is called a(n)____.
A) association
72. In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.
A) system components
73. _____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.
A) Throughput
74. In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms.
A) control zone
75. _____ give team members of a project an opportunity to share information, discuss common problems, and explain new techniques.
A) Project status meetings
Other Links:
See other websites for quiz:
Check on QUIZLET
