IS5803 Post Course Asst Week-8

1. Examples of company-wide applications, called legacy applications, include order processing  systems, payroll systems, and company communications networks

A) False 

2. In a sequence diagram, vertical arrows represent messages from one object to another.

A) False 

3. Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable  business solution that fits the company’s long-term business strategy

A) True 

4. Security is especially important when data or processing is performed at a centralized facility,  rather than at remote locations

A) False 

5. The Pareto chart, sometimes called a scatter diagram, is a problem-solving tool.

A) False 

6. The strongest relationship among objects is called inheritance

A) True 

7. Due to the limited range of input and interaction among participants, few companies believe that a  joint application development (JAD) group produces the best definition of a new system

A) Fase 

8. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are  language grammar errors. 

A) True 

9. Web-based systems are popular because they offer ease of access, cost-effectiveness, and  worldwide connectivity.

A) True 

10. Cloud computing requires less bandwidth than traditional client/server networks.

A) False 

11. Many firms feel that in-house IT resources and capabilities provide a competitive advantage  because an in-house team can respond quickly when business problems or opportunities arise

A) True 

12. Qualitative risk analysis can involve a modeling process called what-if analysis, which allows a  project manager to vary one or more element(s) in a model to measure the effect on other elements

A) False 

13. Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an  object does something

A) False 

14. The skill set required to develop documentation usually is the same as that required to develop a  system. 

A) False 

15. Using batch input, data entry is performed continuously. 

A) False 

16. A three-tier design includes a middle layer between the client and server that processes the client  requests and translates them into data access commands that can be understood and carried out by  the server. 

A) True 

17. In a secluded engineering attack, an intruder uses social interaction to gain access to a computer  system

A) False

18. Network administration includes hardware and software maintenance, support, and security. A) True 

19. If modules are loosely coupled, one module is linked to internal logic contained in another  module

A) False 

20. Because use cases depict a system through the eyes of a user, common business language can be  used to describe the transactions. 

A) True 

21. On lower-level diagrams with multiple processes, there should not be more than nine process  symbols

A) True 

22. If team members lack experience with certain aspects of the required technology, temporary help  might be obtained from IT consultants or part-time staff

A) True 

23. Interface design should call for attention to the interface, rather than facilitating design  objectives

A) False 

24. The symbol for an entity is a circle

A) False 

25. Object-oriented methods provide an easy transition to O-O programming languages such as  C++, Java, and Swift.  

A) True 

26. An in-house solution usually requires a greater initial investment but provides more flexibility for  a company that must adapt quickly in a dynamic e-commerce environment.

A) True 

27. ISO requires a specific development plan, which outlines a step-by-step process for transforming  user requirements into a finished product

A) True 

28. A SWOT analysis examines a firm’s technical, human, and financial resources.

A) True 

29. College course numbers usually are assigned using a block sequence code.

A) True 

30. The main objective of training is to show users how the system can help them perform their jobs.

A) True 

31. in a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart, each  rectangular box, called a task box, has five sections that contain important information about a task

A) True 

32. The only disadvantage of the four-model approach is the added time and cost needed to develop a  logical and physical model of the current system. 

A) True 

33. Centralized IT departments no longer produce reams of printed reports

A) True 

34. A repeating group is a set of one or more fields that can occur only once in a single record, with  each occurrence having the same value

A) False 

35. The test environment for an information system contains copies of all programs, procedures, and  test data files.

A) True 

36. Business support systems ______. 

A) provide job-related information support to users at all levels of a company 

37. In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an  information system. 

A) Field 

38. With a _____, users provide an example of the data requested

A) query by example language 

39. The _____, which appears at the end of a report, can include grand totals for numeric fields and  other end-of-report information. 

A) report footer 

40. A class diagram includes the class _____, which represent the program logic. A) methods 

41. The _____ describes how data actually moves from an application on one computer to an  application on another networked computer. 

A) OSI (Open Systems Interconnection) model 

42. A(n) _____ is a characteristic or feature that must be included in an information system to satisfy  business needs and be acceptable to users

A) system requirement 

43. The inherent efficiency of high-volume processing on larger computers is called. A) economy of scale 

44. The _____ describes a system at the beginning of system operation and includes the results of  performance and acceptance tests for the operational system.

A) product baseline 

45. In an interview, _____ are questions that ask a person to evaluate something by providing limited  answers to specific responses or on a numeric scale

A) range-of-response questions 

46. In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star  topology, except it provides network services to wireless clients instead of wired clients

A) access point 

47. Typical process description tools include_____. 

A) decision trees 

48. The objective of a _____ is to use the combined judgement and experience of several analysts to  evaluate systems projects. 

A) computer resources committee 

49. A _____ measures the time a package takes to process a certain number of transactions. A) benchmark 

50. A(n) _____ represents a person, a place, an event, or a transaction that is significant to the  information system

A) object 

51. During the systems design phase, _____ are used to organize, access, and maintain data  structures.  

A) key fields 

52. In _____, two programmers work on the same task on the same computer; one drives while the  other navigates

A) pair programming

53. To obtain answers to requirements questions, the analyst develops a _____ plan, which involves  answers to five familiar questions: who, what, where, when, and how. 

A) fact-finding 

54. _____ include changing programs, procedures, or documentation to ensure correct system  performance; adapting the system to changing requirements; and making the system operate more  efficiently. 

A) Maintenance activities 

55. The first step in the creation of a Program Evaluation Review Technique (PERT)/Critical Path  Method (CPM) chart is to. 

A) identify all the project tasks 

56. If processes must be performed in a specific sequence, the information should be documented in  the. 

A) process descriptions 

57. Many hardware and software companies offer _____ for IT professionals, which verifies that an  individual demonstrated a certain level of knowledge and skill on a standardized test. 

A) certification 

58. _____ determines how long it takes an information system to pay for itself through reduced costs  and increased benefits. 

A) Payback analysis 

59. Project scheduling, an activity of a project manager, ____. 

A) involves staffing, which includes selecting the project team and assigning specific tasks to team  members 

60. Using _____, a supplier can use radio frequency identification (RFID) tags on each crate, case, or  shipping unit to create a digital shipping list.

A) EPOD (electronic proof of delivery) 

61. _____ measures risk likelihood and impact

A) Risk assessment 

62. The black box concept is an example of _____, which means that all data and methods are self contained. 

A) encapsulation 

63. When companies use a _____, they already know the specific products or service they want and  need to obtain price estimates or bids from vendors

A) request for quotation (RFQ) 

64. Many large IT departments use a(n) _____ team that reviews and tests all applications and  systems changes to verify specifications and software quality standards. 

A) quality assurance 

65. _____ usually focus on long-term challenges and goals, the importance of a firm’s stakeholders,  and a commitment to the firm’s role as a corporate citizen. 

A) Mission statements 

66. Printed output is used in _____, which are output documents that are later entered back into the  same or another information system. 

A) turnaround documents 

67. A _____ is a sequence of tasks that has no slack time. 

A) critical path 

68. A bank account object can have a specific attribute called a(n) _____ that can be active, inactive,  closed, or frozen. 

A) State

69. _____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool  of configurable computing resources that can be rapidly provisioned and released with minimal  management effort or service provider interaction

A) Cloud computing 

70. Which is an example of a tangible benefit? 

A) An online package tracking system that improves service and decreases the need for clerical staff 71. The line from the actor to the use case is called a(n)____. 

A) association 

72. In a typical system design specification, the _____ section contains the complete design for a new  system, including the user interface, outputs, inputs, files, databases, and network specifications

A) system components 

73. _____ measures actual system performance under specific circumstances and is affected by  network loads and hardware efficiency. 

A) Throughput 

74. In a source document, the _____ contains codes, identification information, numbers, and dates  that are used for storing completed forms

A) control zone 

75. _____ give team members of a project an opportunity to share information, discuss common  problems, and explain new techniques

A) Project status meetings

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *