Systems Analysis and Design 9th Edition Review

February 24, 2018 | Author: Loretta Lynn Altmayer | Category: Use Case, Business Process, Input/Output, Software Development, Systems Engineering
Share Embed Donate


Short Description

CIS1321 Introduction to Systems Analysis and Design Review This course introduces computer science and non-majors to ...

Description

System Analysis and Design 9th Edition Chapters 1-12 Review Chapter 1 1. Structured analysis is called a ____ approach since it is based on an overall plan. A: managed B: foundation C: basic D: predictive 2. One of the two main sectors of E-commerce is ____. A: business-to-consumer B: brick-and-mortar C: consumer-to-business D: dot-com 3. Software consists of system software and ____. A: application software B: network operating system C: linear software D: data software 4. The term ____ refers to the combination of hardware and software products and services that companies use to manage, access, communicate, and share information. A: practical technology B: electronic technology C: information technology D: systems technology 5. ____ tests system concepts and examine input, output, and user interfaces before final decisions are made. A: CASE tools B: Prototyping C: Investigative design D: Group typing 6. Google is an example of ____. A: an Internet-dependent company B: a brick-and-mortar company C: a B2B company D: an Internet-independent company 7. The programs that control the hardware and produce the desired information or results are referred to as ____. A: data B: people C: processes D: software 8. ____ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test. A: Certification B: Validation

C: Documentation D: Authentication 9. The ____ are logical rules that identify data patterns and relationships. A: linear rules B: system rules C: inference rules D: productivity rules 10. A graphical representation of one or more tasks that a company performs is considered ____. A: a business model B: a business process C: a business profile D: an analytic profile 11. Data that has been transformed into output that is valuable to users is ____. A: mission B: information C: operations D: processes 12. The IT group provides technical support that includes all of the following EXCEPT ____. A: Web support B: application development C: user systems requests D: database administration 13. The newest development in data acquisition is called ____ technology, which uses highfrequency radio waves to track physical objects. A: RID B: RAD C: RFID D: FID 14. A ____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction. A: business model B: business process C: business system D: business profile 15. A set of related components that produce specific results is a ____. A: system B: compound C: strategy D: package 16. A development system that focuses on team-based fact-finding is ____. A: RAD B: JAD C: either a. or b. D: neither a. nor b. 17. When first introduced, management information systems (MIS) was a category of systems which served ____.

A: managers B: administrative staff C: operational personnel D: maintenance staff 18. The ____ is NOT an example of an internal user of a company's information system. A: customers who track their orders on a company's Web site B: company's technicians C: company's sales staff D: company's corporate officers 19. The correct definition of an in-house application is ____. A: an information system developed by outside vendors B: an information system developed by the company that uses the information system C: a software package D: an information system that is Internet-based 20. Structured analysis uses a set of process models to describe a system ____. A: in words B: in numbers C: dynamically D: graphically 21. A way in which businesses use information is ________. A: to deliver quality products and services B: to make sound decisions C: to maintain customer loyalty D: all of these choices 22. The combination of information technology, people, and data to support business requirements is called a(n) ________. A: active data system B: information system C: electronic system D: communal system 23. In an information system, the system's raw material is ________. A: data B: critical quota C: people D: matter 24. The ________ component is NOT a key part of an information system. A: Internet access B: processes C: software D: people 25. An inventory or payroll application is an example of a ________. A: data system B: vertical system C: legacy system D: horizontal system

26. The building blocks of an information system, representing actual day-to-day business operations are called ________. A: business models B: processes C: hardware D: data 27. The process used by systems analysts to represent company operations and information needs is called ________. A: user targeted modeling B: business action modeling C: business process modeling D: product modeling 28. BPMN refers to ________. A: business process modeling notation B: business profile modeling notation C: none of these choices D: business process modeling names 29. Computer-to-computer data transfer between companies, usually over private telecommunications lines is referred to as ________. A: electronic data interchange B: B2C C: Internet module exchange D: transaction processing 30. The ________ systems are also referred to as expert systems. A: business support B: user productivity C: TP D: knowledge management 31. ________ refers to information systems that support company-wide operations and data management requirements. A: EDI B: WebSphere strategy C: E-commerce D: Enterprise computing 32. The most popular options for developing information systems are structured analysis, objectoriented analysis, and ________. A: data flow analysis B: network methods C: modeling D: agile methods 33. The systems planning phase usually begins with a formal request to the IT department, called a ________. A: systems order B: client complaint C: planning request D: systems request

34. A development method that Microsoft calls ________ documents the experience of its own software development teams. A: Rational Unified Process B: Microsoft Application Development C: Microsoft Solutions Framework D: Microsoft Xtreme Programming

Chapter 2 Review 1. An evaluation of the resources needed for users to be trained on a new system is part of ____ feasibility. A: economic B: technical C: operational D: schedule 2. The first step in evaluating feasibility is ____. A: setting priorities B: identifying systems requests that are not feasible or necessary C: conducting a preliminary investigation D: building a prototype 3. The first step in a preliminary investigation is generally to ____. A: evaluate feasibility B: perform fact-finding C: understand the problem or opportunity D: estimate project development time and cost 4. An organizational chart does NOT show ____. A: formal reporting relationships B: an overview of the way each department functions C: the informal alignment of a group D: the names of employees and their positions 5. Many companies use ____ request forms that can be filled out and submitted electronically. A: printed B: faxed C: online D: offline 6. A company's ____ are broken down into one-year, three-year, and five-year categories. A: objectives B: goals C: requirements D: inventory 7. The coding of data to keep it safe from unauthorized users is called ____. A: prototyping B: encryption

C: password access D: key access 8. EDI refers to ____. A: external development interchange B: electronic data interchange C: external data interchange D: none of the above 9. A risk is an event that can affect a project ____. A: negatively B: positively C: both a. and b. D: neither a. nor b. 10. Chapter 2 explained four types of project feasibility tests that a systems request must pass and did NOT include ____ feasibility. A: technical B: marketing C: economic D: schedule 11. An examination of the reliability of the hardware and software environment for a new system is part of ____ feasibility. A: economic B: technical C: operational D: schedule 12. A project where management has a yes/no choice to implement is called a ____ project. A: nondiscretionary B: discretionary C: resource D: non-resource 13. A popular technique for investigating causes and effects is called a(n) ____. A: Ishikawa diagram B: arrowhead diagram C: Moore diagram D: Problem/Solution diagram 14. A fact-finding method during the preliminary investigation includes all of the following EXCEPT ____. A: observing the current system in operation B: conducting a survey of users C: reviewing current system documentation D: figuring out the costs of the solution 15. ____ feasibility means that a project can be implemented in an acceptable time frame. A: Technical B: Time

C: Schedule D: Operational 16. A SWOT analysis does NOT include an examination of ____. A: weaknesses B: options C: strengths D: threats 17. Vital objectives that must be achieved for the enterprise to fulfill its mission are considered ____. A: the SDLC B: critical success factors C: critical business issues D: CASE tools 18. Hardware-based security controls that can identify a person by a retina scan or by mapping a facial pattern are referred to as ____. A: biological devices B: encrypted devices C: strategic scanning devices D: biometric devices 19. The purpose of a(n) ____ system is to provide the right product in the right place at the right time. A: EDI B: CRM C: CASE D: JIT 20. Microsoft Project is a tool that is often used by ____. A: end users B: project managers C: customer service personnel D: top managers 21. A systems request form should not ____. A: have complex instructions B: be easy to understand C: include enough space for all required information D: indicate what supporting documents are needed 22. A(n: ____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve. A: condition B: constraint C: impediment D: obstacle 23. To avoid the problem of project creep, ____. A: define project scope as vaguely as possible B: leave project scope undefined

C: define project scope as clearly as possible D: expand the focus beyond the problem at hand 24. ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?” A: schedule feasibility B: technical feasibility C: economic feasibility D: operational feasibility 25. ____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking. A: Mission statement B: Customer relationship management (CRM) C: Feasibility study D: Total cost of ownership (TCO: 26. A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs. A: economic B: schedule C: operational D: technical 27. ____ is an example of a discretionary project. A: Creating a new report for a user B: Adding a report required by a new federal law C: Including annual updates to payroll and tax percentages D: All of the above 28. When setting priorities for systems requests, the highest priority goes to projects that provide the ____. A: least benefit, at the highest cost, in the longest period of time B: least benefit, at the lowest cost, in the longest period of time C: greatest benefit, at the highest cost, in the shortest period of time D: greatest benefit, at the lowest cost, in the shortest period of time 29. Projects where management has a choice in implementing them are called ____ projects. A: discretionary B: nondiscretionary C: appended D: concatenated 30. A systems analyst conducts a(n: ____ investigation to study the systems request and recommend specific action. A: preliminary B: appendix C: systems D: transitional

Chapter 3 Review 1. The project ____ handles administrative responsibilities for the development team and negotiates with users you might have conflicting requirements. A: expediter

B: supporter C: coordinator D: leader 2. PERT/CPM is considered to be a ____ technique. A: side-to-side B: parallel task C: bottom-up D: top-down 3. Analyzing risks is a two-step process that includes both ____ analysis. A: qualitative and quantitative B: profit and loss C: timing and critical path D: identification and response 4. Project ____ includes identifying project tasks and estimating completion time and costs. A: planning B: scheduling C: monitoring and controlling D: reporting 5. With PERT/CPM, the ____ is the amount of time it will take to complete a task. A: time assignment B: time duration C: time length D: time pattern 6. A ____ walk-through is a review of a project team member's work by other members of the team. A: status B: structured C: open D: private 7. Project ____ involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that may delay a project. A: planning B: scheduling C: monitoring and controlling D: reporting 8. With PERT/CPM, tasks that must be completed one after the other, like a relay race, are called ____ tasks. A: dependent B: independent C: fast D: tiered

9. Walk-throughs that take place throughout the SDLC are also called all of the following EXCEPT ____. A: code reviews B: design reviews C: testing reviews D: timing review 10. Project ____ requires guiding, supervising, and coordinating the project team's workload. A: planning B: scheduling C: monitoring and controlling D: reporting 11. Task patterns can involve ____ tasks. A: dependent B: multiple successor C: multiple predecessor D: all of the above 12. Project managers can use ____ software to help plan, estimate, schedule, monitor, and report on a project. A: change control B: project management C: project resource D: path management 13. Project ____ tasks include regular progress reports to management, users, and the project team itself. A: planning B: scheduling C: monitoring and controlling D: reporting 14. When several tasks can start at the same time, each is called a ____ task. A: concurrent B: successor C: predecessor D: dependent 15. When software is ____ it is free, and supported by a large group of users and developers. A: free-source B: open-source C: private-source D: share-source 16. A(n) ____, or activity, is any work that has a beginning and an end and requires the use of company resources such as people, time, or money. A: event B: task

C: habit D: plan 17. Often, two or more concurrent tasks, depend on a single prior task, which is called a ____. A: concurrent B: successor C: predecessor D: dependent 18. The most popular project management software is ____. A: ACT B: Microsoft Office Project 2007 C: Open Workbench D: Project Solution 19. A(n) ____, or milestone, is a recognizable reference point that can be used to monitor progress and manage the project. A: plan B: habit C: event D: task 20. In the situation where concurrent tasks depend on a predecessor task, each concurrent task is called a ____ task. A: dependent B: successor C: predecessor D: dependent 21. A ____ path includes all tasks that are vital to the project schedule. A: vital B: baseline C: critical D: foundational 22. A(n: ____ chart displays complex task patterns and relationships. A: Gantt B: index C: PERT/CPM D: task 23. In developing time and cost estimates, project managers must consider _____. A: project size and scope B: IT resources C: prior experience with similar projects or systems D: all of the above 24. A project manager’s scheduling function _____. A: involves guiding, supervising, and coordinating the project team’s workload B: includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target C: involves staffing, which includes selecting the project team and assigning specific tasks to team members

D: includes identifying and arranging project tasks and estimating completion times and costs 25. A task is any work that requires the use of company resources including all of the following EXCEPT ____. A: controlling capital B: people C: time D: money 26. A risk management plan includes a review of all of the following EXCEPT ____. A: employees B: project scope C: stakeholders D: budget 27. Project scheduling involves all of the following EXCEPT ____. A: defining project constraints B: staffing the project team C: arranging for necessary resources D: assigning specific tasks to team members 28. Microsoft’s risk management model includes all of the following EXCEPT ____. A: category, which specifies the risk type B: probability, which indicates the degree of adverse effect should the risk occur, on a scale of 1 to 10 C: mitigation plan, which identifies plans to control or limit the risk D: trigger, which identifies a condition that would initiate the contingency plan 29. A project manager’s planning _____. A: involves guiding, supervising, and coordinating the project team’s workload B: includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target C: consists of staffing, which includes selecting the project team and assigning specific tasks to team members D: includes identifying project tasks and estimating completion times and costs 30. All of the following are versions of Microsoft Office Project 2007 EXCEPT ____. A: Standard B: Enterprise C: Professional D: Server

Chapter 4 Review 1. The sales tracking system must produce a daily fast-moving-item report, listing all products that exceed the forecasted sales volume grouped by style, color, size, and reorder status is an example of a(n) ____ requirement. A: output B: input C: processes D: performance

2. Response time must not exceed four seconds is an example of a(n) ____ requirement. A: control B: input C: process D: performance 3. ____ questions encourage spontaneous and unstructured responses. A: Open-ended B: Closed-ended C: Range-of-response D: Leading 4. A ____ is a document containing a number of standard questions that can be sent to many individuals. A: questionnaire B: survey C: both a. and b. D: neither a. nor b. 5. If you want to ensure that the sample is balanced geographically, you could use a ____ sample to select five customers from each of four zip codes. A: random B: systematic C: stratified D: structured 6. In ____ brainstorming, each participant speaks when it is his or her turn, or passes. A: unstructured B: structured C: random D: systematic 7. A ____, such as Microsoft Outlook or Lotus Organizer, can help manage those tasks and provide a personal calendar and a to-do list, with priorities and the capability to check off completed items. A: PDA B: DPA C: PIM D: PMI

8. Chapter 4 describes ____, which involves fact-finding to describe the current system and identification of the requirements for the new system, such as outputs, inputs, processes, performance, and security. A: output design B: requirements modeling C: requirements design D: output modeling 9. ____ refer to the logical rules that are applied to transform the data into meaningful information. A: Outputs

B: Inputs C: Processes D: Performance 10. ____ analysis identifies the data flowing into a process, the business rules that transform the data, and the resulting output data flow. A: Structured B: Data C: Enterprise D: Process 11. ____ skills are especially valuable to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively. A: Data processing B: Personal C: Analytical D: Interpersonal 12. ____ methods represent a recent trend that stresses intense interaction between system developers and users. A: Co-op B: Object C: Flow D: Agile 13. The end product of ____ is the new information system. A: JAD B: RAD C: both a. and b. D: neither a. nor b. 14. During the ____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs. A: software design B: software rollout C: user design D: user rollout 15. A functional decomposition diagram (FDD: is a top-down representation of a function or process. FDDs also are called ____ charts. A: structure B: pie C: flow D: modeling 16. A ____ diagram visually represents the interaction between users and the information system. A: data case B: requirements case C: use case D: design case

17. A ____ requirement is a characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users. A: management B: system C: program D: data 18. The department head must enter overtime hours on a separate screen is an example of a(n) ____ requirement. A: output B: input C: processes D: performance 19. All transactions must have audit trails is an example of a(n) ____ requirement. A: control B: input C: process D: performance 20. Your primary responsibility during an interview is to listen carefully to the answers, concentrate on what is said and notice any nonverbal communication that takes place. This process is called ____ listening. A: closed B: tracked C: open D: engaged 21. A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____. A: flowchart B: histogram C: agile method D: Venn diagram 22. A(n) ____ is a top-down representation of a function or a process. A: UML B: TCO C: FDD D: REJ 23. All of the following are categories of system requirements EXCEPT ____. A: outputs B: dynamics C: performance D: controls 24. The term ____ refers to a system’s ability to handle increased business volume and transactions in the future. A: scalability B: reliability C: compatibility D: applicability

25. Microsoft has developed a method for measuring a system’s total costs and benefits, called ____, which is a framework to help IT professionals analyze and optimize IT investments. A: TCO B: REJ C: FDD D: UML 26. ____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution. A: Analytical skills B: Artistic skills C: Interpersonal skills D: Confrontational skills 27. ____ is a typical example of a system requirement for the output category. A: Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs B: The contact management system must generate a daily reminder list for all sales reps C: The student records system must allow record access by either the student name or the student number D: The system must support 25 users simultaneously 28. One of the main activities in the systems analysis phase is ____ modeling, which involves factfinding to describe the current system and identification requirements for the new system. A: objective B: requirements C: goal-based D: user-based 29. Using a(n) ____, an analyst can show business functions and break them down into lowerlevel functions and processes. A: UML B: TCO C: FDD D: REJ 30. A(n) ____ diagram shows the timing of interactions between objects as they occur. A: timing B: ordering C: orientation D: sequence

Chapter 5 Review 1. Whether to use a decision table or a decision tree often is a matter of ____. A: personal preference B: data requirements C: cycle times D: number of domains 2. A set of DFDs provides a ____ model that shows what the system does, not how it does it. A: control B: data

C: logical D: physical 3. The symbol for an entity is a ____, which may be shaded to make it look three dimensional. A: circle B: triangle C: rectangle D: square 4. ____ maintains consistency among a set of DFDs by ensuring that input and output data flows align properly. A: Diverging B: Balancing C: Looping D: Decomposing 5. The data ____ serves as a central storehouse of documentation for an information system. A: dictionary B: store C: diagram D: partition 6. ____ English is a subset of standard English that describes logical processes clearly and accurately. A: Logical B: Structured C: Simple D: Dictionary

7. A ____ model describes how the system will be constructed. A: physical B: dictionary C: structured D: logical 8. A ____ process is a process that has input, but produces no output. A: blue box B: black box C: gray hole D: black hole 9. When you explode a DFD, the higher-level diagram is called the parent diagram, and the lowerlevel diagram is referred to as the ____ diagram. A: subset B: child C: pet D: subordinate 10. ____ refers to whether the data element contains numeric, alphabetic, or character values. A: Domain

B: Type C: Category D: Rules 11. Iteration also is called ____. A: looping B: sequencing C: partitioning D: decomposing 12. In DFDs, a process symbol can be referred to as a ____, because the inputs, outputs, and general functions of the process are known, but the underlying details and logic of the process are hidden. A: blue box B: black box C: gray hole D: black hole 13. To draw a context diagram, you start by placing a single process symbol ____. A: in the center of the page B: at the top of the page C: at the bottom of the page D: anywhere on the page 14. Data elements are combined into ____, also called data structures. A: domains B: records C: skeletons D: iterations 15. Modular design is based on combinations of three logical structures that does NOT include ____. A: sequence B: source C: selection D: iteration 16. The only disadvantage of the four-model approach is the added ____ needed to develop a logical and physical model of the current system. A: time B: cost C: both a. and b. D: neither a. nor b. 17. DFDs use four basic symbols that represent all EXCEPT the following ____. A: data flows B: data stores C: entities D: attributes

18. DFD entities also are called ____, because they are data origins or final destinations. A: pseudocode B: terminators C: originators D: sink holes 19. ____ also is called exploding, partitioning, or decomposing. A: Balancing B: Leveling C: Processing D: Sequencing 20. A ____ documents the details of a functional primitive, and represents a specific set of processing steps and business logic. A: diagram description B: physical model C: data structure D: process description

Chapter 6 Review 1. A ____ is a command that tells an object to perform a certain method. A: note B: tag C: action D: message 2. O-O methodology is popular because it integrates easily with object-oriented programming languages such as ____. A: Java B: Smalltalk C: Perl D: all of the above 3. Objects within a class can be grouped into ____, which are more specific categories within a class. A: sub-states B: mini-states C: subclasses D: mini-classes 4. The line from the actor to the use case is called a(n) ____, because it links a particular actor to a use case. A: association B: partition C: instance D: relationship 5. Just as structured analysis uses DFDs to model data and processes, systems analysts use the ____ to describe object-oriented systems.

A: UML B: Java C: FTP D: OOD 6. The ____ shows what is included in the system (inside the rectangle) and what is not included in the system (outside the rectangle). A: system diagram B: system boundary C: system border D: system template 7. When you identify use cases, try to group all the related transactions into ____. A: a single use case B: several use cases C: either a. or b. D: neither a. nor b. 8. All possible states must be documented in the____ diagram. A: state transition B: use case C: object-model D: logical-model 9. Like a DFD, a class diagram is a(n) ____ model, which evolves into a physical model and finally becomes a functioning information system. A: static B: logical C: random D: object 10. The end product of object-oriented analysis is an object ____. A: diagram B: model C: box D: use case 11. A ____ is identified by a dashed line and represents the time during which the object above it is able to interact with the other objects in the use case. A: lifeline B: timeline C: interaction line D: safe line 12. If objects are similar to nouns, attributes are similar to ____. A: adjectives B: verbs C: adverbs D: punctuation

13. A(n) ____ diagram resembles a horizontal flowchart that shows the actions and events as they occur. A: activity B: action C: movement D: process 14. The concept that a message gives different meanings to different objects is called ____. A: multi-use B: state versatility C: action flexibility D: polymorphism 15. All objects within a class share common ____. A: attributes B: methods C: both a. and b. D: neither a. nor b. 16. A class can belong to a more general category called a ____. A: pseudoclass B: superclass C: subclass D: case 17. When the outcome of one use case is incorporated by another use case, we say that the second case ____ the first case. A: uses B: incorporates C: needs D: pairs with 18. A ____ represents the steps in a specific business function or process. A: task flow B: task case C: use flow D: use case 19. In a class diagram, each class appears as a(n) ____, with the class name at the top, followed by the class's attributes and methods. A: rounded rectangle B: rectangle C: oval D: circle 20. A use case diagram is a visual summary of several related use cases within a ____. A: system B: subsystem C: either a. or b. D: neither a. nor b.

21. ____ is a widely used method of visualizing and documenting an information system. A: UML B: Java C: UNIX D: DFD 22. Objects can have a specific attribute called a(n) ____, which describes the object’s current status. A: state B: cycle C: instance D: status 23. A(n) ____ is a group of similar objects. A: aggregate B: concatenation C: class D: packet 24. Sequence diagrams include symbols that represent all of the following EXCEPT ____. A: classes B: indices C: lifelines D: messages 25. The number of ____ needed to describe an object depends on the business requirements of the information system and its users. A: attributes B: packets C: indices D: keys 26. When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____. A: triangle B: circle C: rectangle D: square 27. Inheritance enables an object to derive one or more of its attributes from a(n) ____. A: user B: precedent C: antecedent D: parent 28. ____ enables an object to derive one or more of its attributes from another object. A: Concatenation B: Encapsulation C: Inheritance D: Polymorphism 29. An object has certain ____, which are characteristics that describe the object. A: keys B: attributes C: indices D: packets

Chapter 7 Review 1. Another term for IBS is ____, because system operations are managed by the outside firm, or host. A: managed hosting B: direct hosting C: outside hosting D: enterprise hosting 2. The choice between developing versus purchasing software often is called a ____ decision. A: make or buy B: build or buy C: either a. or b. D: neither a. nor b. 3. A software package that can be used by many different types of organizations is called a(n) ____ application. A: vertical B: horizontal C: limited D: unlimited 4. ____ was NOT listed as a reason that companies would develop software in-house versus buying it from an outside source. A: Meet constraints of existing systems B: Develop internal resources and capabilities C: Lower costs D: Satisfy unique business requirements 5. Some user applications have powerful screen and report ____ that allow users to design their own data entry forms and reports. A: generators B: creators C: templates D: files 6. The ____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur. A: ROI B: NPV C: EPS D: IRR 7. When you use an ____, you already know the specific product or service you want and you need to obtain price quotations or bids. A: RFP B: RFQ C: NPV D: TCO

8. The goal of systems design is to build a system that is ____. A: effective B: reliable C: maintainable D: all of the above 9. ____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet. A: SAS B: SaaS C: SSA D: SSaa 10. Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems. A: hubs B: portals C: channels D: middleware 11. The outsourcing of a basic business process is often called ____. A: BPO B: BOP C: ISB D: IBS 12. A ____ model has a variable fee based on the number of users or workstations that have access to the application. A: managed B: subscription C: service D: cloud computing 13. The ____ makes, builds, and develops in-house software. A: company's IT department B: company's ASP C: company's IBS D: all of the above 14. An accounting package is a good example of a(n) ____ application because it can be utilized by many different businesses, or separate divisions that exist in large, diversified companies. A: vertical B: horizontal C: limited D: unlimited 15. The following is NOT one of the three ways the chapter listed as a way to customize a software package: ____. A: You can merge two existing packages into one solution B: You can purchase a basic package that vendors will customize to suit your needs.

C: You can purchase the package and make your own modifications, if this is permissible under the terms of the software license. D: You can negotiate directly with the software vendor to make enhancements to meet your needs by paying for the changes. 16. Read-only properties means that users can ____. A: view the data B: change the data C: either a. or b. D: neither a. nor b. 17. The Systems Analyst's Toolkit explains how to use three main cost analysis tools that do NOT include ____. A: payback analysis B: ROI C: NPV D: EPS 18. Another valuable resource is the Internet bulletin board system that contains thousands of forums, called ____, that cover every imaginable topic. A: gatherings B: newsgroups C: social groups D: feeds 19. The two major Web-based development environments are IBM's WebSphere and Microsoft's ____. A: .NET B: JavaScript C: Office D: Access 20. ____ development treats the Web as the platform, rather than just a communication channel. A: Internet-based B: Traditional C: both a. and b. D: neither a. nor b. 21. Although the traditional model of software acquisition still accounts for more software acquisition, a new model called ____ is changing the picture dramatically. A: Hardware as a Help B: Software as a Service C: Processing as a Product D: Storage as a Solution 22. A ____ measures the time a package takes to process a certain number of transactions. A: newsgroup B: parameter C: benchmark D: default

23. A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. A: application B: configuration C: interface D: interpolation 24. ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.

A: Prototyping B: Outsourcing C: Coding D: Benchmarking 25. IBM’s ____ is one of the major Web-based development environments. A: WebSphere B: .NET C: NetSphere D: .WEB 26. A(n: ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application. A: method B: administrative C: transaction D: interpolated 27. In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment. A: 2GL B: 3GL C: 4GL D: 5GL 28. In addition to configuring software, an IT staff can create a user ____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application. A: montage B: index C: interface D: package 29. Guidelines to follow when determining data entry and storage considerations include all of the following except ____. A: data should be entered into the system where and when it occurs B: data should be verified when it is entered C: data duplication should be encouraged D: data should be entered into a system only once

30. Reports that trace the entry of and changes to critical data values are called ____ and are essential in every system. A: audit trails B: protective pathways C: backtracks D: value tracks

Chapter 8 Review 1. A ____ check tests data items to verify that they fall between a specified minimum and maximum value. A: process-control B: toggle button C: data validation D: range 2. Web-based logs, called ____, are journals written from a particular point of view. A: wogs B: jogs C: blogs D: logs 3. ____ interaction describes the relationship between computers and people who use them to perform business-related tasks. A: Human-computer B: Person-computer C: Human-PC D: Person-PC 4. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered. A: output reporting B: output listing C: output control D: output checking 5. ____ includes the necessary measures to ensure that input data is correct, complete, and secure. A: Output control B: Input control C: either a. or b. D: neither a. nor b. 6. When designing a report, you should prepare a sample report, which is called a ____, for users to review. A: mock-up B: prototype C: either a. or b. D: neither a. nor b. 7. An option button, or ____ button, represents one choice in a set of options. A: television B: DVD player

C: stereo D: radio 8. A ____ report produces one or more lines of output for each record processed. A: summary B: highlights C: control D: detail 9. A ____ check identifies values that are questionable, but not necessarily wrong. A: reasonableness B: process-control C: data validation D: range 10. A ____ is a specially formatted digital audio file that can be downloaded by Internet users from a variety of content providers. A: songcast B: podcast C: listencast D: voicecast 11. A ____ interface uses icons, graphical objects, and pointing devices. A: green screen B: Web 1.0 C: human-computer D: graphical user 12. Output ____ protects privacy rights and shields the organization's proprietary data from theft or unauthorized access. A: reporting B: prototyping C: security D: safety 13. Once data is entered, the company should store source documents in a safe location for some specified length of time according to their ____ policy. A: records retention B: records safety C: records filing D: records scanning 14. After a report design is approved, you should document the design by creating a report ____ form, which contains information about the fields, data types and lengths, and report frequency. A: system B: analysis C: design D: prototype 15. The main part of the form, called the ____ zone, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. A: body B: heading C: footer D: authorization

16. Each line of output printed is called a ____ line. A: detail B: information C: data D: control 17. A ____ check is used for data items that must have certain values. A: process-control B: reasonableness C: validity D: range 18. An automated facsimile or ____ system allows a customer to request a fax using e-mail, via the company Web site, or by telephone. A: fax fast B: fax mail C: fax now D: faxback 19. A ____ check improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. A: data resources B: data dependency C: data validation D: data quality 20. A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled. A: disk B: diskless C: either a. or b. D: neither a. nor b. 21. Sensitive data can be coded, in a process called ____, so only users with decoding software can read it. A: filtering B: context safety C: spam D: encryption 22. A popular security solution is the use of a network based application, often called a ____, that controls access to and from workstation interfaces. A: port cop B: port protector C: workstation cop D: workstation protector 23. A ____ report displays only those records that meet a specific condition or conditions. A: exception B: error C: end D: estimation 24. Good form ____ makes the form easy to complete and provides enough space, both vertically and horizontally, for users to enter the data.

A: layout B: processing C: data entry D: output 25. ____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving. A: COF B: COL C: COS D: COM 26. Using ____ input, data entry usually is performed on a specified time schedule, such as daily, weekly, monthly, or longer. A: batch B: intermittent C: sequence D: combination 27. Every page should include a page ____, which appears at the top of the page and includes the column headings that identify the data. A: footer B: header C: control D: signature 28. The ____ zone usually contains the company name or logo and the title and number of the form. A: control B: heading C: footer D: body 29. Although the vast majority of reports are designed graphically, some systems still produce one or more character-based reports that use a character set with ____ spacing. A: fixed B: variable C: either a. or b. D: neither a. nor b. 30. When the value of a control field changes, a control ____ occurs. A: break B: miss C: mistake D: error 31. A ____ check is performed on two or more fields to ensure that they are consistent or reasonable when considered together. A: dual B: two-time C: combination D: readiness 32. ____ design focuses on user needs for screen and printed forms of output. A: Output B: User interface

C: both a. and b. D: neither a. nor b. 33. A ____ describes how users interact with a computer system, and consists of all the hardware, software, screens, menus, functions, output, and features that affect two-way communications between the user and the computer. A: user scope map B: user interface C: user path D: user process 34. A ____ document is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction. A: report B: sequence C: source D: output 35. In addition to built-in design tools, popular software packages such as ____ Reports offer powerful features that help designers deal with professional-level design issues across the enterprise. A: Crystal B: Diamond C: Gold D: Platinum 36. The ____ zone contains codes, identification information, numbers, and dates that are used for storing completed forms. A: footer B: control C: body D: heading 37. Database programs such as Microsoft Access include a variety of report design tools, including a ____, which is a menu-driven feature that designers can use to create reports quickly and easily. A: Data Wizard B: Data Generator C: Report Wizard D: Report Generator 38. A ____ box can display messages or provide a place for a user to enter data. A: option B: text C: graphics D: storyboard 39. In a user-centered system, the distinction blurs between ____ and the interface itself. A: input B: output C: both a. and b. D: neither a. nor b. 40. A sales manager might want to know total sales for each sales representative, but not want a detail report listing every sale made by them. In that case, a ____ report is appropriate. A: summary

B: highlights C: error D: regression analysis 41. A control break usually causes specific actions, such as printing subtotals for a group of records. That type of detail report is called a ____ report. A: control output B: control series C: control break D: control error 42. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered. A: output reporting B: output listing C: output control D: output checking 43. Data ____ is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks. A: entry B: checking C: layout D: switching 44. Batch ____ are totals used to verify batch input. A: controls B: zones C: buttons D: tags 45. Data ____ policies and procedures protect data from loss or damage, which is a vital goal in every organization. A: control B: process C: security D: integrity 46. Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives. A: aesthetics B: interface technology C: ergonomics D: output security 47. When designing data entry screens, provide an on-screen instruction to let users know the date format, and provide an example if the user must enter ____. A: verifiers B: clones C: separators D: masks 48. A key physical design element is the ____, which describes how users interact with a computer system.

A: HCI B: PCI C: UI D: PI 49. In a well-designed detail report, a field called a(n) ____ field controls the output. A: break B: indexed C: dominant D: control 51. In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system. A: physical B: process C: input D: command 52. In a source document, if totals are included on a form, they appear in the ____ zone. A: calculated B: control C: totals D: heading 53. Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design. A: storyboard B: turnaround document C: faxback D: output control 54. A combination check is a data validation check that ____. A: tests data items to verify that they fall between a specified minimum and maximum value B: identifies values that are questionable, but not necessarily wrong C: is performed on two or more fields to ensure that they are consistent or reasonable when considered together D: is used for mandatory data items 55. In a data entry screen, a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked. A: command button B: option button C: toggle button D: radio button

Chapter 9 Review 1. A ____ is a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values. A: loop B: repeating group C: variety group D: combination field 2. ____, which record details of all accesses and changes to the file or database, can be used to recover changes made since the last backup.

A: Primary table files B: Audit log files C: Backup encryption files D: Data warehouse records 3. A ____ file is created for archiving purposes. A: work B: table C: security D: history 4. During the system design phase, you use ____ to organize, access, and maintain data structures. A: key files B: key records C: key fields D: key tables 5. ____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity. A: Cardinality B: ERD C: The primary key D: Normalization 6. ____ codes distinguish items by using a series of subgroups of digits. A: Significant digit B: Action C: Derivation D: Cipher 7. A(n) ____ date is the total number of days from some specific base date. A: arithmetic B: control C: absolute D: variable 8. Data ____ problems can occur if updates are not applied in every file. A: structure B: security C: integrity D: redundancy 9. Because intranets and extranets use the same protocols as the Internet, they are called ____. A: protocol-centric B: client/server focused C: middleware focused D: Web-centric 10. A(n) ____ relationship exists when exactly one of the second entity occurs for each instance of the first entity. A: one-to-one B: one-to-many C: many-to-many D: none of the above

11. Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember. A: mnemonic B: harmonic C: rhyming D: alphabetic 12. EBCDIC and ASCII require eight bits, or ____ byte(s), for each character. A: one B: two C: three D: four 13. A ____ language controls database operations, including storing, retrieving, updating, and deleting data. A: data manipulation B: data query C: data information D: data communication 14. A ____ key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables. A: primary B: secondary C: foreign D: referential 15. A table is ____ if it does not contain a repeating group. A: first normal form B: second normal form C: concatenated D: considered invalid 16. Data ____ software looks for meaningful patterns and relationships among data. A: process B: validation C: mart D: mining 17. ____ fields are special fields within data records to provide additional control or security information. A: Primary B: Audit C: Check D: Limit 18. The inherent efficiency of high-volume processing on larger computers is called ____. A: flexible data sharing B: data independence C: controlled redundancy D: economy of scale 19. A record, also called a ____, is a set of related fields that describes one instance of an entity. A: tuple B: couple C: table

D: label 20. A DBMS is usually managed by a person called a ____. A: database administrator B: file administrator C: system administrator D: security administrator 21. Any field that could serve as a primary key is called a ____ key. A: candidate B: summary C: potential D: primary 22. A ____ specifies the fields and identifies the primary key in a particular table or file. A: output design B: market basket design C: table design D: diagram design 23. A ____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company. A: data warehouse B: data storehouse C: database D: database set 24. In the event of a file catastrophe, ____ procedures can be used to restore the file or database to its current state at the time of the last backup. A: recovery B: reinstatement C: back-up D: security 25. A ____ file stores records that contain day-to-day business and operational data. A: master B: table C: transaction D: work 26. A(n) ____ is a person, place, thing, or event for which data is collected and maintained. A: table B: entity C: field D: record 27. A ____ relationship exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity. A: one-to-one B: one-to-many C: many-to-many D: none of the above 28. ____ codes combine data from different item attributes, or characteristics, to build the code. A: Significant digit B: Action

C: Derivation D: Cipher 29. A ____ format uses only 16 bits to represent the number 12,345 in binary form. A: integer B: binary storage C: long integer D: character-based 30. A ____ consists of linked tables that form one overall data structure. A: database structure B: database system C: open structure D: open system 31. A ____ is a text document written in HTML. A: Web browser B: Web page C: Web site D: Web server 32. Without referential integrity, you might have a sales order called a(n) ____, because it has no related customer. A: orphan B: loop C: gap D: error 33. A ____ is a set of numbers or letters that represent a data item. A: key B: state C: code D: unit 34. ____ storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored. A: Logical B: Physical C: either a. or b. D: neither a. nor b. 35. A ____ is a view of the database used by one or more systems or users. A: schema B: subschema C: class D: subclass 36. A nonkey field is any field that is NOT a ____. A: primary key B: candidate key C: both a. and b. D: neither a. nor b. 37. Field X is ____ on field Y if the value of field X depends on the value of field Y. A: functionally independent B: functionally dependent

C: either a. or b. D: neither a. nor b. 38. Different privileges, also called ____, can be associated with different users of a computer system. A: passwords B: user IDs C: filters D: permissions 39. A(n) ____ is a graphical model of an information system that depicts the relationships among system entities. A: SQL B: OCE C: ODBC D: ERD 40. With a(n) ____ language, the user provides an example of the data requested. A: SQL B: IDE C: QBE D: interpolated 41. One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities. A: scalability B: compatibility C: cardinality D: functionality 42. When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory. A: client B: table C: password D: buffer

Chapter 10 1. A form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high powe A: Bluetooth B: USB C: RFID D: Mbps 2. In the ____ section in a typical system design specification, startup processing, initial data entry or acquisition, user training requirements, and software test plans are specified. A: System Environment B: Executive Summary C: System Components D: Implementation Requirement

3. The ____ technology is compatible with earlier 802.11 versions A: BSS B: ESS C: ISS D: MIMO 4. A ____, such as that illustrated in the accompanying figure, has a central networking device that manages the network A: hierarchical network B: star network C: bus network D: ring network

5. In the OSI (open system interconnection: model, the application layer ____. A: defines specific methods of transmitting data over the physical layer B: provides network services requested by a local workstation C: defines control structures that manage the communications link between computers D: contains physical components that carry data 6. The maximum speed for wireless network standards is measured in ____. A: Bps B: Gbps C: Mbps D: Tbps 7. To increase bandwidth, the IEEE created two ____ to its initial standard to offer considerable improvement in transmission speed. A: amendments B: options C: LANs

D: versions 8. The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security. A: Time and Cost Estimates B: System Environment C: Executive Summary D: System Components 9. During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an information system that handles daily sales transactions and maintains the online inventory file. A: POS B: batch C: topological D: portal 10. All of the following use access points except ____. A: BSS B: ESS C: ISS D: none of the above 11. When using the ____ configuration, a central wireless device called an access point is used to serve all wireless clients A: Basic Service Set B: Extended Service Set C: Independent Service Set D: Dependent Service Set 12. An ____ Service Set is made up of two or more Basic Service Set networks. A: Distributed B: Extended C: Dependent D: Independent 13. In addition to Wi-Fi, another form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high power. A: Bluetooth B: Redtooth C: Blueconnect D: Redconnect 14. ____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security. A: Network architecture B: System architecture C: Open architecture D: Data architecture 15. A specific hardware and software environment is also called a ____. A: platform B: master C: setting D: foundation

16. Scalability is also called ____. A: extensibility B: switchability C: sharing D: n-tier 17. IBM uses the term ____ to describe Internet-based solutions that allow sellers and buyers to automate procurement processes and achieve substantial benefits. A: e-marketplaces B: e-resources C: e-salesforce D: e-networking 18. A ____ is a computer that supplies data, processing services, or other support to one or more computers. A: server B: client C: either a. or b. D: neither a. nor b. 19. In addition to centralized data processing, early systems performed all data input and output at a central location, often called a data processing ____. A: marketplace B: portal C: center D: hub 20. As technology became available, companies resolved the problems of stand-alone computing by joining clients into a ____ that allows sharing of data and hardware resources. A: cloud network B: peer-to-peer network C: Web-centric network D: local area network 21. In a ____ design, also called a file sharing architecture, an individual LAN client has a copy of the application program installed locally, while the data is stored on a central file server. A: file server B: data server C: independent server D: peer-to-peer server 22. The ____ stores the data and provides data access and database management functions. A: client B: server C: either a. or b. D: neither a. nor b. 23. A ____ client design locates all or most of the processing logic at the server. A: fat B: thin C: tall D: short

24. You can think of the middle layer in an n-tier design as a(n) ____, because it provides the application logic, or business logic, required by the system. A: functional server B: application server C: data server D: file server 25. Just as processing can be done at various places in a client/server design, data can be stored in more than one location using a distributed ____. A: database centric B: database access C: database gateway D: database management 26. In the past, a device known as a ____ was used to connect star networks, but a switch offers advanced technology and much better performance. A: portal B: peer network C: gateway D: hub 27. A ____ local area network is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location. A: cordless B: metropolitan C: peer-based D: wireless 28. The Basic Service Set (BSS) in also called the ____ mode. A: dependent B: independent C: structured D: infrastructure

Chapter 11 Review 1. In a structure chart, a____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invokeD: A: method B: condition C: class D: attribute 2. During ____ testing, programmers must test programs that interact with other programs and files individually, before they are integrated into the system. A: unit B: integrated C: link D: outcome

3. Many organizations require a more formal type of desk checking called a(n) ____ review. A: design B: integrated C: code D: interpolated 4. The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking. A: unit B: integration C: user D: system 5. ____ is the process of reviewing the program code to spot logic errors, which produce incorrect results. A: Logic review B: Code review C: Results walkthrough D: Desk checking 6. ____ describes the relationships and interdependence among modules. A: Resolution B: Modularity C: Coupling D: Dynamism 7. In ____ programming, two programmers work on the same task on the same computer. A: parallel B: duo C: double D: driver 8. To achieve better, faster, and less expensive methods of software development, ____ designed a Capability Maturity Model (CMM)®, which improves quality, reduces development time, and cuts costs. A: ISO (International Organization for Standardization) B: SEI (Software Engineering Institute) C: ODBC (Open Database Connectivity) D: CAIT (Center for the Application of Information Technologies) 9. The ____ changeover method allows the new system to be implemented in stages, or modules. A: phased operation B: parallel operation C: pilot operation D: direct cutover 10. A class diagram includes the class ____, which represent the program logiC: A: attributes B: events C: methods D: characters

11. O-O analysis makes it easier to translate an object model directly into an object-oriented programming language. This process is called object-oriented ____. A: changeover B: development C: tracking D: cycling 12. ____ measures a module's scope and processing characteristics. A: Stimulation B: Cohesion C: Code review D: Integration 13. A ____ evaluation assesses the overall quality of the information system. A: pre-implementation B: post-implementation C: pilot-implementation D: testing-implementation 14. A control couple shows a message, also called a ____ flag, which one module sends to another. A: cycle B: data C: status D: cutover 15. The ____ cutover approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. A: direct B: parallel C: pilot D: phased 16. Typically, a higher-level module, called a ____ module, directs lower-level modules. A: control B: terminal C: iteration D: method 17. The environment for the actual system operation is called the ____ environment. A: operational B: production C: either a. or b. D: neither a. nor v. 18. ____ can be used to model business logic for an information system. A: Decision tables B: Decision trees C: either a. or b. D: neither a. nor b. 19. Defect tracking software documents and tracks replacement code, called ____. A: stubs B: units

C: flags D: patches 20. A module consists of related program code organized into ____ units that are easy to understand and maintain. A: small B: large C: either a. or b. D: neither a. nor b. 21. Testing two or more programs that depend on each other is called integration testing, or ____ testing. A: stub B: desk C: loop D: link 22. More recently, the Software Engineering Institute established a new model, called Capability Maturity Model ____, that integrates software and systems development into a much larger framework called process improvement. A: International B: Cohesion C: Process D: Integration 23. Objects contain both data and program logic, called ____. A: methods B: conditions C: attributes D: tests 24. During systems implementation, the ____ serves as a blueprint for constructing the new system. A: system design specification B: RFQ C: RFP D: system structure chart 25. A condition line indicates that a control module determines which ____ modules will be invoked, depending on a specific condition. A: parent B: peer C: subordinate D: pilot 26. The ____ operation changeover method requires that both the old and the new information systems operate fully for a specified perioD: A: direct B: parallel C: pilot D: phased 27. A successful information system requires ____ for users, managers, and IT staff members so people understand the system and know how to use it effectively. A: tracking

B: flowcharting C: code reviews D: training 28. Structured application development usually involves a ____ approach, which proceeds from a general design to a detailed structure. A: bottom-up B: top-down C: parallel process D: parent-child 29. Compiling the program using a CASE tool or a language compiler detects syntax errors, which are ____ errors. A: cycle B: math data C: testing D: language grammar 30. The main objective of ____ is to avoid problems or to detect them as soon as possible. A: systems implementation B: quality assurance C: status flags D: partitioning

Chapter 12 Review 1. A____ is an unauthorized attempt to increase permission levels. A: privilege escalation attack B: denial-of-service attack C: Trojan horse D: identity management invasion 2. ____ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem. A: Bandwidth B: Turnaround time C: Throughput D: Response time 3. Risk ____ develops safeguards that reduce risks and their impact. A: assessment B: management C: identification D: control 4. The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints. A: functional baseline B: operational baseline C: allocated baseline D: product baseline 5. ____ shifts the risk to another asset or party, such as an insurance company, in risk control. A: Acceptance B: Avoidance

C: Mitigation D: Transference 6. The release methodology offers all of the following advantages except ____. A: all changes are tested together before a new system version is released B: costs are reduced because only one set of system tests is needed C: documentation changes are coordinated and become effective simultaneously D: new features or upgrades are available more often 7. ____ prevents unauthorized users from creating, modifying, or deleting information. A: Availability B: Integrity C: Confidentiality D: Risk management 8. Depending on the system, bandwidth might be measured in any of the following except ____. A: Kbps (kilobits per second. B: Mbps (megabits per second. C: Dbps (decibits per second. D: Gbps (gigabits per second. 9. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____. A: 1.0 B: 1.1 C: 2.0 D: 2.1 10.____ means that nothing is done, in risk control. A: Acceptance B: Avoidance C: Mitigation D: Transference 11. The ____ triangle has three main elements of system security: confidentiality, integrity, and availability. A: CPA B: CIA C: CSI D: CIS 12. ____ includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action. A: Error analysis B: Fault analysis C: Error management D: Fault management 13. When a____ methodology is used, all noncritical changes are held until they can be implemented at the same time. A: in-house development B: version control C: maintenance release D: bug fix 14. The maintenance team includes a system administrator and one or more ____.

A: systems analysts B: programmers C: both a. and b. D: neither a. nor b. 15. ____ include items such as supplies, equipment rental, and software leases. A: Maintenance costs B: Operational costs C: Connection costs D: User costs 16. ____ refers to copying data in prescribed intervals, or continuously. A: Security B: Classifying C: Backup D: Recovery 17. ____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency. A: Bandwidth B: Throughput C: Response time D: Answer time 18. A ____ is a formal reference point that measures system characteristics at a specific time. A: baseline B: foundation C: bottom line D: core 19. A____ programmer concentrates on operating system software and utilities. A: systems B: security C: applications D: database 20. ____ maintenance reduces the possibility of future system failure. A: Corrective B: Adaptive C: Perfective D: Preventive 21. If significant changes take place in the existing system, the IT department might develop a ____ that could include online support, a special Web site, and formal training sessions. A: user training package B: management training package C: buyer training package D: seller training package 22. ____ protects information from unauthorized disclosure and safeguards privacy. A: Confidentiality B: Availability C: Integrity D: Flexibility

23. To measure system performance, many firms use ____ testing, which uses a set of standard tests to evaluate system performance and capacity. A: foundation B: benchmark C: comparison D: baseline 24. In a typical system, the initial release version of the system is ____. A: 0.0 B: 0.1 C: 1.0 D: 10.0 25. A ____ manages computer and network systems. A: system supervisor B: system administrator C: system analyst D: system programmer 26. ____ activities include changing programs, procedures, or documentation to ensure correct system performance. A: Maintenance B: Operational C: Connection D: Analyst 27. A ____ network is a dedicated connection, similar to a leased telephone line. A: private B: public C: virtual D: protected 28. Bandwidth requirements are made in ____. A: bits per millisecond B: bits per second C: packets per millisecond D: packets per second 29. The ____ baseline documents the system at the end of the design phase. A: functional B: allocated C: product D: formal 30. A(n) ____ programmer focuses on creating and supporting large-scale database systems. A: systems B: security C: applications D: database

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF