Cts 285 with 300 answers

 Question 1 1 out of 1 points   

 System requirements serve as benchmarks to measure the overall acceptability of a finished system.

 

 

 

   Question 2 1 out of 1 points   

 New business support systems that produced valuable information, in addition to performing manual tasks, were called management information systems (MIS) because managers were the primary users.

 

 

 

   Question 3 1 out of 1 points   

 A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.

 

 

 

   Question 4 1 out of 1 points   

 ____ is a typical example of a system requirement for the input category.

 

 

 

   Question 5 1 out of 1 points   

 ____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

 

 

 

   Question 6 1 out of 1 points   

 Examples of tangible benefits include all of the following except a(n) ____.

 

 

 

   Question 7 1 out of 1 points   

 In a sequence diagram, the interaction proceeds from left to right along horizontal arrows, while a vertical timeline represents messages from one object to another.

 

 

 

   Question 8 1 out of 1 points   

 Internal factors that affect IT systems projects include all of the following except ____.

 

 

 

   Question 9 1 out of 1 points   

 A vertical system is a system, such as an inventory or payroll application, that can be adapted for use in many different companies.

 

 

 

   Question 10 1 out of 1 points   

 ____ is a typical example of a system requirement for the output category.

 

Selected Answer:    The contact management system must generate a daily reminder list for all sales reps 

Correct Answer:    The contact management system must generate a daily reminder list for all sales reps 

 

   Question 11 1 out of 1 points   

 When evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

 

 

 

   Question 12 1 out of 1 points   

 Supporters of neutral locations for interviews believe that it ____.

 

 

 

   Question 13 1 out of 1 points   

 A horizontal system is designed to meet the unique requirements of a specific business or industry, such as a Web-based retailer, a medical practice, or a video chain.

 

 

 

   Question 14 1 out of 1 points   

 All of the following are common reasons for systems requests except ____.

 

 

 

   Question 15 1 out of 1 points   

 The main objective of all RAD approaches is to extend development time and expense by excluding users from every phase of systems development.

 

 

 

   Question 16 1 out of 1 points   

 Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

 

 

 

   Question 17 1 out of 1 points   

 Product-oriented companies primarily offer information or services or sell goods produced by others.

 

 

 

   Question 18 1 out of 1 points   

 A systems request might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system.

 

 

   Question 19 1 out of 1 points   

 Knowledge management systems are called expert systems because they ____.

 

 

 

   Question 20 1 out of 1 points   

 When preparing a checklist of specific tasks to observe and questions to ask, a systems analyst should consider ____.

 

 

 

   Question 21 1 out of 1 points   

 A systems request form should not ____.

 

 

   Question 22 1 out of 1 points   

 In an information system, information consists of basic facts that are the system’s raw material.

 

 

 

   Question 23 1 out of 1 points   

 In a typical company organizational model, middle managers ____.

 

 

   Question 24 1 out of 1 points   

 Each activity within the systems analysis phase has an end product and one or more milestones.

 

 

   Question 25 1 out of 1 points   

 Performance limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

 

 

 

   Question 26 1 out of 1 points   

 ____ is a typical example of a system requirement for the performance category.

 

 

   Question 27 1 out of 1 points   

 In launching a new information system, the greatest risk occurs when a company ____.

 

 

 

   Question 28 1 out of 1 points   

  

 

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

 

 

 

   Question 29 1 out of 1 points   

 When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

 

 

 

   Question 30 1 out of 1 points   

 In many large companies, applications called enterprise resource planning (ERP) systems provide cost-effective support for users and managers throughout the company.

 

 

   Question 31 1 out of 1 points   

 In an information system, data is information that has been transformed into output that is valuable to users.

 

 

   Question 32 1 out of 1 points   

  

 

Of the measures of feasibility in the accompanying figure, ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”

 

 

   Question 33 1 out of 1 points   

 A mission-critical system is one that is unimportant to a company’s operations.

 

 

 

   Question 34 1 out of 1 points   

 To evaluate ____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.

 

 

 

   Question 35 1 out of 1 points   

 Greater user involvement in the system development process usually results in poorer communication, slower development times, and less satisfied users.

 

 

 

   Question 36 1 out of 1 points   

 Examples of intangible benefits include all of the following except a(n) ____.

 

 

 

   Question 37 1 out of 1 points   

 The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

 

 

 

   Question 38 1 out of 1 points   

 In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

 

 

 

   Question 39 1 out of 1 points   

 Creating an FDD is different from drawing an organization chart — systems analysts start at the bottom and work their way up.

 

Selected Answer: False

Correct Answer: False

 

   Question 40 1 out of 1 points   

 Systems requests seldom are aimed at improving service to customers or users within a company.

 

 

 

   Question 41 1 out of 1 points   

 The primary advantage of RAD is that ____.

 

 

 

   Question 42 1 out of 1 points   

 TP systems are inefficient because they process a set of transaction-related commands individually rather than as a group.

 

 

   Question 43 1 out of 1 points   

 While RAD typically focuses only on fact-finding and requirements determination, JAD provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation.

 

 

   Question 44 1 out of 1 points   

 ____ is a traditional, time-tested, easy to understand systems development technique that uses a set of process models to describe a system graphically.

 

 

 

   Question 45 1 out of 1 points   

 A risk of RAD is that a system might work well in the short term, but the corporate and long-term objectives for the system might not be met.

 

 

   Question 46 1 out of 1 points   

 ____ is an example of a discretionary project.

 

 

 

   Question 47 1 out of 1 points   

 A(n) ____ describes the logic that programmers use to write code modules.

 

   Question 48 0 out of 1 points   

 In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

 

 

 

   Question 49 1 out of 1 points   

 IBM claims that its WebSphere strategy is best for Web-based application development, while Microsoft counters with a broad vision called .NET that redefines that company’s approach to Web-based application development.

 

 

 

   Question 50 1 out of 1 points   

 Hardware-based security controls include passwords, various levels of user access, and coding data.

 

 

   Question 51 1 out of 1 points   

 A business process describes a specific set of transactions, events, tasks, and results.

 

 

 

   Question 52 1 out of 1 points   

 A ____, or requirements model, describes the information that a system must provide.

 

 

 

   Question 53 1 out of 1 points   

 Compared with traditional methods, the entire RAD process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.

 

 

 

   Question 54 1 out of 1 points   

 As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.

 

 

 

   Question 55 1 out of 1 points   

 Today, systems development is much more team-oriented than in the past.

 

 

 

   Question 56 1 out of 1 points   

 Business support systems ____.

 

 

   Question 57 1 out of 1 points   

 When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

 

 

   Question 58 1 out of 1 points   

 System requirements fall into five general categories: outputs, inputs, processes, performance, and controls.

 

 

 

   Question 59 1 out of 1 points   

 A SWOT analysis contributes to the strategic planning process by identifying ____ resources.

 

 

 

   Question 60 1 out of 1 points   

 Although the business-to-business (B2B) sector is more familiar to retail customers, the volume of business-to-consumer (B2C) transactions is many times greater.

 

 

   Question 61 1 out of 1 points   

 IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

 

 

 

   Question 62 1 out of 1 points   

 Transaction processing (TP) systems ____.

 

 

 

   Question 63 1 out of 1 points   

 Traditionally, a company either developed its own information systems, called in-house applications, or purchased systems called software packages from outside vendors.

 

 

   Question 64 1 out of 1 points   

 User productivity systems ____.

 

 

   Question 65 1 out of 1 points   

 System analysts use modeling and fact-finding interactively — first they build fact-finding results into models, then they study the models to determine whether additional fact-finding is needed.

 

 

   Question 66 1 out of 1 points   

 In a typical company organizational model, top managers ____.

 

 

   Question 67 1 out of 1 points   

 Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

 

 

 

   Question 68 1 out of 1 points   

 When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

 

 

   Question 69 1 out of 1 points   

 Compared with traditional methods, when properly used, JAD can result in all of the following except ____.

 

   Question 70 1 out of 1 points   

 In an interview, ____ limit or restrict the response.

 

 

 

   Question 71 1 out of 1 points   

 Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.

 

 

 

   Question 72 1 out of 1 points   

 A company’s mission statement is unrelated to its major goals, shorter-term objectives, and day-to-day business operations.

 

 

 

   Question 73 1 out of 1 points   

 Strategic planning looks beyond day-to-day activities and focuses on a horizon that is 3, 5, or even 10 years in the future.

 

 

   Question 74 1 out of 1 points   

 ____ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.

 

 

 

   Question 75 1 out of 1 points   

  

 

Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

 

 

   Question 76 1 out of 1 points   

 ____ is a typical example of a system requirement for the process category.

 

 

 

   Question 77 1 out of 1 points   

 Internal and external factors affect every business decision that a company makes, and IT systems are no exception.

 

 

   Question 78 1 out of 1 points   

 Because it is linked to a specific development methodology, systems developers use JAD whenever group input and interaction is not desired.

 

 

 

   Question 79 1 out of 1 points   

 External factors that affect IT systems projects include all of the following except ____.

 

 

 

   Question 80 1 out of 1 points   

 The purpose of a JIT (just-in-time) system is to provide the right product at the right place at the right time.

 

 

   Question 81 1 out of 1 points   

 Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product.

 

 

 

   Question 82 1 out of 1 points   

 ____ is a typical example of a system requirement for the control category.

 

 

 

   Question 83 1 out of 1 points   

 Management leadership and information technology are unconnected, and no significant changes have occurred in either area.

 

 

   Question 84 1 out of 1 points   

  

 

Of the measures of feasibility in the accompanying figure, ____ considers points such as “Does the proposed platform have sufficient capacity for future needs?” and “Will the hardware and software environment be reliable?”

 

 

   Question 85 1 out of 1 points   

 ____ software controls the flow of data, provides data security, and manages network operations.

 

 

 

   Question 86 1 out of 1 points   

 Of the measures of feasibility in the accompanying figure, issues that relate to ____ include “Has management established a firm timetable for the project?” and “Will a project manager be appointed?”

 

 

 

   Question 87 1 out of 1 points   

 When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

 

 

   Question 88 1 out of 1 points   

 Because of the limited range of input and interaction among participants, few companies believe that a JAD group produces the best definition of a new system.

 

 

 

   Question 89 1 out of 1 points   

 Application software manages hardware components, which can include a single workstation or a global network with many thousands of clients.

 

 

 

   Question 90 1 out of 1 points   

 System software consists of programs that support day-to-day business functions and provide users with the information they require.

 

 

 

   Question 91 1 out of 1 points   

 The success or failure of an information system usually is unrelated to whether users are satisfied with the system’s output and operations.

 

 

 

   Question 92 1 out of 1 points   

 In an interview, ____ encourage spontaneous and unstructured responses.

 

 

 

   Question 93 1 out of 1 points   

 A system must have effective controls to ensure that data is secure and accurate.

 

 

 

   Question 94 1 out of 1 points   

 UML provides various graphical tools, such as use case diagrams and sequence diagrams.

 

 

 

   Question 95 1 out of 1 points   

 Service-oriented companies manufacture and sell products such as computers, routers, or microchips.

 

 

 

   Question 96 1 out of 1 points   

 Systems development typically starts with a ____.

 

 

 

   Question 97 1 out of 1 points   

 A strong business case suggests that a company should pursue other options, above the alternative, because it would be in the firm’s best interest to do so.

 

 

 

   Question 98 1 out of 1 points   

 Much of the time a systems analyst spends talking with people is spent conducting ____, which is/are the most common fact-finding technique.

 

 

   Question 99 1 out of 1 points   

 Data entry controls should be excessive without being effective.

 

 

 

   Question 100 1 out of 1 points   

 RAD relies heavily on prototyping and user involvement.

 

 

 

 Question 1 1 out of 1 points   

 When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

 

 

 

   Question 2 1 out of 1 points   

 The Software & Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of ____ is redefining the way that companies develop and deploy their information systems.

 

 

 

   Question 3 1 out of 1 points   

 In a DFD, the Gane and Sarson symbol for an entity is a ____.

 

 

 

   Question 4 1 out of 1 points   

 Another term for IBS is managed hosting, because the operation is managed by the outside firm, or host.

 

 

 

   Question 5 1 out of 1 points   

 A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

 

 

 

   Question 6 1 out of 1 points   

 All of the following are true of Web-based development except ____.

 

 

 

   Question 7 1 out of 1 points   

 An object treats data and processes separately.

 

 

 

   Question 8 1 out of 1 points   

 In a DFD, the Gane and Sarson symbol for a process is a ____.

 

 

 

   Question 9 1 out of 1 points   

 A gray hole process is a process that has ____.

 

 

 

   Question 10 1 out of 1 points   

 All of the following are true of a traditional systems development environment except ____.

 

 

   Question 11 1 out of 1 points   

 When DFDs are drawn, each of the following conventions should be followed except ____.

 

 

 

   Question 12 1 out of 1 points   

 Which of the following is NOT an attribute of a car?

 

 

 

   Question 13 1 out of 1 points   

 Two Web-based development environments are IBM’s WebSphere and Microsoft’s .NET.

 

 

 

 

   Question 14 1 out of 1 points   

 Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

 

 

 

   Question 15 1 out of 1 points   

 Building an application in a Web-based environment might involve different risks and benefits, compared to a traditional environment.

 

 

 

 

   Question 16 1 out of 1 points   

 Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

 

 

   Question 17 1 out of 1 points   

 ____ is a widely used method of visualizing and documenting an information system.

 

 

 

   Question 18 1 out of 1 points   

 A logical model describes how a system will be constructed.

 

 

 

 

   Question 19 1 out of 1 points   

 In a DFD, a process symbol can have only one outgoing data flow.

 

 

 

 

   Question 20 1 out of 1 points   

 In a DFD, a data flow must have a process symbol on at least one end.

 

 

 

 

   Question 21 1 out of 1 points   

 Typically, customers purchase licenses that give them the right to use the software under the terms of the license agreement.

 

 

 

 

   Question 22 1 out of 1 points   

 When companies use a ____, they already know the specific products or service they want and need to obtain price quotations or bids from vendors.

 

 

 

   Question 23 1 out of 1 points   

 Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.

 

 

 

 

   Question 24 1 out of 1 points   

 A gas pump is an example of a black box.

 

 

 

 

   Question 25 1 out of 1 points   

 An IBS (Internet business services) solution is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.

 

 

 

 

   Question 26 1 out of 1 points   

 Your car performs a(n) ____ called operate wipers when you send a message by moving the proper control.

 

 

 

   Question 27 1 out of 1 points   

 A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.

 

 

 

 

   Question 28 1 out of 1 points   

 A black hole process is a process that has ____.

 

 

 

   Question 29 1 out of 1 points   

 In a use case, an external entity is called a(n) ____.

 

 

 

   Question 30 1 out of 1 points   

 Leveling ____.

 

 

 

   Question 31 1 out of 1 points   

 In a DFD, the Gane and Sarson symbol for a data store is a ____.

 

 

 

   Question 32 1 out of 1 points   

 Several years ago, Gartner, a leading IT research and consulting firm, accurately forecast the enormous growth of offshore outsourcing.

 

 

 

 

   Question 33 1 out of 1 points   

 A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects.

 

 

 

 

   Question 34 1 out of 1 points   

 An auto parts store inventory ____ might include part number, description, supplier code, minimum and maximum stock levels, cost, and list price.

 

 

 

   Question 35 1 out of 1 points   

 All of the following are true of Web-based development except ____.

 

Correct Answer:    Web-based software treats the software as a service that is more dependent on desktop computing powers and resources 

 

   Question 36 1 out of 1 points   

 Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable, business solution that fits the company’s long-term business strategy.

 

 

 

 

   Question 37 0 out of 1 points   

 Many valuable reports can be obtained from a data dictionary, including a(n) ____.

 

 

 

   Question 38 1 out of 1 points   

 In a DFD, the Gane and Sarson symbol for a data flow is a ____.

 

 

 

   Question 39 1 out of 1 points   

 Microsoft’s ____ is one of the major Web-based development environments.

 

 

   Question 40 1 out of 1 points   

 A data flow in a DFD represents one or more data items.

 

 

 

 

   Question 41 1 out of 1 points   

 The number of attributes needed to describe an object depends on the business requirements of the information system and its users.

 

 

 

   Question 42 1 out of 1 points   

 An object’s ____ are the tasks or functions the object performs.

 

 

 

   Question 43 1 out of 1 points   

 A major advantage of outsourcing is that it eliminates employee concerns about job security.

 

 

 

 

   Question 44 1 out of 1 points   

 The UML symbol for a use case is a(n) ____ with a label that describes the action or event.

 

 

   Question 45 1 out of 1 points   

 Using Gane and Sarson symbols, a DFD represents processes as circles.

 

 

 

 

   Question 46 1 out of 1 points   

 A black box does not want or need outside interference.

 

 

 

   Question 47 1 out of 1 points   

 The Software & Information Industry Association (SIIA) believes that the acquisition of software as a service rather than a product will have a major impact on the software industry.

 

 

 

   Question 48 1 out of 1 points   

 Two data stores can be connected by a data flow without an intervening process.

 

 

 

 

   Question 49 1 out of 1 points   

 Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

 

 

 

 

   Question 50 1 out of 1 points   

 A class can belong to a more general category called a subclass.

 

 

 

   Question 51 1 out of 1 points   

 The concept that a message gives different meanings to different objects is called encapsulation.

 

 

C

   Question 52 1 out of 1 points   

 Oracle Corporation offers a service called ____, which provides E-business applications on a fixed fee basis.

 

 

   Question 53 1 out of 1 points   

 Balancing ____.

 

 

   Question 54 1 out of 1 points   

 In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

 

 

   Question 55 1 out of 1 points   

 The UML represents an object as a(n) ____ with the object name at the top, followed by the object’s attributes and methods.

 

 

   Question 56 1 out of 1 points   

 When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

 

 

   Question 57 1 out of 1 points   

 All relationships have equal weight; none is stronger than any other.

 

 

 

 

   Question 58 0 out of 1 points   

 A method is like a blueprint, or template, for all the objects within a class.

 

 

 

 

   Question 59 1 out of 1 points   

 A DFD shows the structure and detailed contents of a data flow.

 

 

 

 

   Question 60 1 out of 1 points   

 In a traditional systems development environment, security issues usually are less complex than with Web-based systems, because the system operates on a private telecommunications network, rather than the Internet.

 

 

 

 

   Question 61 1 out of 1 points   

 System analysts define an object’s attributes during the systems design process.

 

 

 

 

   Question 62 1 out of 1 points   

 An ASP provides a license to use the software, and nothing more.

 

 

 

 

   Question 63 1 out of 1 points   

 A(n) ____ defines specific tasks that an object can perform.

 

 

   Question 64 0 out of 1 points   

 The same message to two different objects produces the same results.

 

 

 

   Question 65 1 out of 1 points   

 A software package developed to handle information requirements for a specific type of business is called a horizontal application.

 

 

 

 

   Question 66 1 out of 1 points   

 Spontaneous generation, black holes, and gray holes are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.

 

 

 

 

   Question 67 1 out of 1 points   

 A use case ____ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.

 

 

   Question 68 1 out of 1 points   

 Data flows are shown in a context diagram because data stores are external to the system.

 

 

 

   Question 69 1 out of 1 points   

 A software package that can be used by many different types of organizations is called a vertical application.

 

 

 

 

   Question 70 1 out of 1 points   

 Internet-based development treats the Web as just a communications channel, rather than as a platform.

 

 

 

 

   Question 71 1 out of 1 points   

 A DFD does not show the external entities that provide data to the system or receive output from the system.

 

 

C

 

   Question 72 1 out of 1 points   

 The ____ uses a set of symbols to represent graphically the various components and relationships within a system.

 

 

 

   Question 73 1 out of 1 points   

 Late in the systems design phase, you build a logical model that describes how a system will be constructed.

 

 

 

 

   Question 74 1 out of 1 points   

 The main reason for offshore outsourcing is the same as domestic outsourcing: lower bottom-line costs.

 

 

 

   Question 75 1 out of 1 points   

 By limiting access to internal processes, an object prevents its internal code from being altered by another object or process.

 

 

C

 

   Question 76 1 out of 1 points   

 Systems analysts call an entity that supplies data to the system a sink, and an entity that receives data from the system a source.

 

 

Correct Answer:

 

   Question 77 1 out of 1 points   

 Typically, companies choose in-house software development for all of the following reasons except to ____.

 

 

 

   Question 78 1 out of 1 points   

 Which of the following is not a path that development can follow?

 

 

   Question 79 1 out of 1 points   

 DFD symbols are referenced by using all ____ letters for the symbol name.

 

Correct Answer:    capital 

 

   Question 80 1 out of 1 points   

 The data dictionary usually records and describes a default value, which is the ____.

 

Correct Answer:    v

   Question 81 1 out of 1 points   

 Leveling also is called ____.

 

 

 

   Question 82 1 out of 1 points   

 The line from the actor to a use case is called a(n) ____.

 

 

 

   Question 83 1 out of 1 points   

 If objects are similar to adjectives that describe the characteristics of an object, attributes are similar to nouns.

 

 

 

 

   Question 84 1 out of 1 points   

 Customer objects can perform specific tasks, such as placing an order, or paying a bill.

 

 

 

 

   Question 85 1 out of 1 points   

 A DFD does not show the detailed contents of a data store — the specific structure and data elements are defined in the data dictionary.

 

 

 

 

   Question 86 1 out of 1 points   

 A use case ____ is a visual summary of several related use cases within a system or subsystem.

 

 

 

   Question 87 0 out of 1 points   

 Advantages of purchasing a software package over developing software in-house include all of the following except ____.

 

 

 

   Question 88 1 out of 1 points   

 Inheritance enables an object to derive one or more of its attributes from a(n) ____.

 

 

 

   Question 89 0 out of 1 points   

 Buyers can customize a software package by ____.

 

 

   Question 90 1 out of 1 points   

 Your red Mustang is a(n) ____ of the CAR class.

 

C

 

   Question 91 1 out of 1 points   

 Objects can have a specific attribute called a(n) ____, which describes the object’s current status.

 

 

 

   Question 92 1 out of 1 points   

 A physical model shows what the system must do, regardless of how it will be implemented.

 

 

 

   Question 93 1 out of 1 points   

 In a DFD, processes contain the business logic, also called business rules, that transform the data and produce the required results.

 

 

C

 

   Question 94 1 out of 1 points   

 Outsourcing can refer to ____.

 

 

   Question 95 1 out of 1 points   

 A data flow diagram (DFD) shows how the system transforms input data into useful information.

 

 

 

 

   Question 96 1 out of 1 points   

 When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____.

 

 

 

   Question 97 1 out of 1 points   

 Some objects might have a few attributes; others might have dozens.

 

 

 

   Question 98 1 out of 1 points   

 A set of DFDs provides a logical model that shows how the system works, not what the system does.

 

 

 

 

   Question 99 0 out of 1 points   

 A spontaneous generation process is a process that has ____.

 

 

 

   Question 100 1 out of 1 points   

 An object has certain ____.

 

Correct Answer:  

 

Question 1 1 out of 1 points   

 Problems found with 1NF (first normal form) design that do not exist in 2NF (second normal form) include all of the following except ____.

 

 

   Question 2 1 out of 1 points   

 When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.

 

 

   Question 3 1 out of 1 points   

 An existence check is a data validation check that ____.

 

C

 

   Question 4 1 out of 1 points   

 Exception reports are useful when the user needs to know the details, but does not want information only on records that might require action.

 

 

C

 

   Question 5 0 out of 1 points   

 In a typical file processing environment, ____ problems can occur if updates are not applied in every file.

 

 

   Question 6 1 out of 1 points   

 In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.

 

 

 

 

   Question 7 1 out of 1 points   

 A combination check is a data validation check that ____.

 

Correct Answer:    is performed on two or more fields to ensure that they are consistent or reasonable when considered together 

 

   Question 8 1 out of 1 points   

 In a detail report, each line of output printed is called a detail line.

 

 

 

 

   Question 9 1 out of 1 points   

 Web pages are stored on a Web server, which is a computer that receives requests and makes Web pages available to users.

 

 

 

 

   Question 10 1 out of 1 points   

 Online processing systems typically have all of the following characteristics except ____.

 

   Question 11 1 out of 1 points   

 A ____ is a text document written in HTML.

 

 

 

   Question 12 0 out of 1 points   

 A table is in first normal form (1NF) if it contains a repeating group.

 

 

Correct Answer:

 

   Question 13 1 out of 1 points   

 Relational databases are poorly suited to client/server computing because they are so powerless and rigid.

 

 

Correct Answer: 

 

   Question 14 1 out of 1 points   

 ____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

 

Correct Answer:  

 

   Question 15 1 out of 1 points   

 Today, client/server architecture is the dominant form of systems design, using Internet protocols and traditional network models.

 

 

Correct Answer:

 

   Question 16 1 out of 1 points   

 A disadvantage of server-based processing is that character-based terminals typically are used, which provide a limited interface for users.

 

 

Correct Answer: 

 

   Question 17 1 out of 1 points   

 In a file-oriented information system, a security file ____.

 

Correct Answer:    is created and saved for backup and recovery purposes 

 

   Question 18 1 out of 1 points   

 In the OSI (open system interconnection) model, the application layer ____.

 

Correct Answer:    

 

   Question 19 1 out of 1 points   

 To design data entry screens that are easy to learn and use, employ all of the following guidelines except ____.

 

Correct Answer: 

 

   Question 20 1 out of 1 points   

 Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.

 

 

Correct Answer: False

 

   Question 21 1 out of 1 points   

 A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.

 

 

Correct Answer: 

 

   Question 22 1 out of 1 points   

 A batch processing system has all of the following characteristics except ____.

 

Correct Answer:    the information system is available whenever necessary to support business operations 

 

   Question 23 1 out of 1 points   

 In contrast to a centralized system, a client/server design separates applications and data.

 

 

Correct Answer: 

 

   Question 24 1 out of 1 points   

 Impact printers can use multi-part forms to produce more than one copy, which is an advantage to firms that require several copies of the same report.

 

 

Correct Answer:

 

   Question 25 1 out of 1 points   

 In a client/server design, a database server ____.

 

Correct Answer:    processes individual SQL commands 

 

   Question 26 1 out of 1 points   

 In a Web-based database design, the Internet serves as the front end, or interface, for the database management system.

 

 

Correct Answer:

 

   Question 27 1 out of 1 points   

 In the OSI (open system interconnection) model, the presentation layer ____.

 

Correct Answer:    assures that data is uniformly structured and formatted for network transmission 

 

   Question 28 1 out of 1 points   

 Podcasts are especially important for legal reasons, or where it is necessary to display a signature, date stamp, or other visual features of a document.

 

 

Correct Answer:

 

   Question 29 1 out of 1 points   

 In a file-oriented information system, a transaction file ____.

 

Correct Answer:    

 

   Question 30 1 out of 1 points   

 A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

 

Correct Answer:  

 

   Question 31 1 out of 1 points   

 For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate.

 summary report 

 

   Question 32 1 out of 1 points   

 In a file-oriented information system, a history file contains reference data used by the information system.

 

 

Correct Answer: 

 

   Question 33 1 out of 1 points   

 An entity is a person, place, thing, or event for which data is collected and maintained.

 

 

Correct Answer:

 

   Question 34 1 out of 1 points   

 A client is a computer that supplies data, processing services, or other support to one or more computers, called servers.

 

 

Correct Answer: 

   Question 35 1 out of 1 points   

 The Internet has had little impact on system architecture.

 

 

 

   Question 36 1 out of 1 points   

 In e-commerce, data mining works best when a goal is to reduce clicks to close, which means average page views to accomplish a purchase or obtain desired information.

 

 

Correct Answer: 

 

   Question 37 1 out of 1 points   

 According to a usability expert at IBM, a computer user has the right to ____.

 

Correct Answer:    

 

   Question 38 1 out of 1 points   

 A reasonableness check is a data validation check that ____.

 

Correct Answer:   

 

   Question 39 1 out of 1 points   

 A range check is a data validation check that ____.

 

Correct Answer:    

 

   Question 40 1 out of 1 points   

 A system design where the server performs all the processing is described as ____.

 

Correct Answer:  

 

   Question 41 1 out of 1 points   

 In a typical LAN, clients share data stored on a local server that supports a group of users or a department.

 

 

 

   Question 42 1 out of 1 points   

 Intranets and extranets are called Web-centric because they use different protocols, or data transmission standards, than the Internet.

 

 

Correct Answer:

   Question 43 1 out of 1 points   

 In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.

 

Correct Answer:

 

   Question 44 1 out of 1 points   

 One problem in a file processing environment is ____, which means that data common to two or more information systems is stored in several places.

 

Correct Answer:    

 

   Question 45 1 out of 1 points   

 Interface design should call attention to the interface, rather than facilitating design objectives.

 

 

Correct Answer:

 

   Question 46 1 out of 1 points   

 In today’s interconnected world, output from one system often becomes input into another system.

 

 

Correct Answer: 

 

   Question 47 1 out of 1 points   

 When using Microsoft Office, documents, spreadsheets, and databases can be stored in Unicode-compatible form by using the font called ____.

 

Correct Answer:  

 

   Question 48 1 out of 1 points   

 Good interface design is based partly on ____, which focuses on how an interface can be made attractive and easy to use.

 

Correct Answer:    aesthetics 

 

   Question 49 1 out of 1 points   

 A subschema is a view of a database used by one or more systems or users.

 

 

Correct Answer: 

 

   Question 50 1 out of 1 points   

 Good user interface design is based partly on ____, which describes how people work, learn, and interact with computers.

 

Correct Answer:    

 

   Question 51 1 out of 1 points   

 ____ describes how instances of one entity relate to instances of another entity.

 

Correct Answer:   

 

   Question 52 1 out of 1 points   

 ____ protects privacy rights and shields an organization’s proprietary data from theft or unauthorized access.

 

Correct Answer:    

 

   Question 53 1 out of 1 points   

 ____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

 

Correct Answer:    

 

   Question 54 1 out of 1 points   

 Centering headings over maximum field widths is ideal when many of the actual values are shorter than the maximum width.

 

 

Correct Answer:

 

   Question 55 1 out of 1 points   

 Middleware provides a transparent interface that enables system designers to integrate dissimilar software and hardware.

 

 

Correct Answer: 

 

   Question 56 1 out of 1 points   

 The speed of laser printers is rated in ____, which can be used to estimate the time required to print a report.

 

Correct Answer:    

 

   Question 57 0 out of 1 points   

 As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.

 

 

Correct Answer:

 

   Question 58 1 out of 1 points   

 A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

 

 

Correct Answer:

 

   Question 59 1 out of 1 points   

 On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms.

 

Correct Answer:    

 

   Question 60 1 out of 1 points   

 Compared to file server designs, client/server systems ____.

 

Correct Answer:    reduce network loads and improve response times 

 

   Question 61 1 out of 1 points   

 A report footer, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.

 

 

Correct Answer:

 

   Question 62 1 out of 1 points   

 In a typical client/server system, the client stores the data and provides data access and database management functions.

 

 

   Question 63 1 out of 1 points   

 Apart from backup and recovery procedures necessary to sustain business operations ____ laws and regulations apply to company data.

 

Correct Answer:    

 

   Question 64 1 out of 1 points   

 When considering physical design, a systems analyst must determine how a new application will communicate with existing legacy systems.

 

 

Correct Answer:

 

   Question 65 1 out of 1 points   

 After a report design is approved, the design should be documented in a ____, which contains information about the fields, data types and lengths, report frequency and distribution, and other comments.

 

Correct Answer:   

 

   Question 66 1 out of 1 points   

 A fat client, also called a thick client, design locates all or most of the processing logic at the server.

 

 

Correct Answer:

 

   Question 67 1 out of 1 points   

 Visio is an example of a CASE tool that can help users plan, analyze, design, and implement an information system.

 

 

Correct Answer: 

   Question 68 1 out of 1 points   

 A(n) ____ produces one or more lines of output for each record processed.

 

Correct Answer:    d

 

   Question 69 1 out of 1 points   

 In a file-oriented information system, a work file ____.

 

Correct Answer:    

 

   Question 70 1 out of 1 points   

 The type of output and the technology needed usually is decided during the systems analysis phase, based on user requirements.

 

 

   Question 71 1 out of 1 points   

 A database system stores and manages data in separate files using a method called file processing.

 

 

Correct Answer:

 

   Question 72 1 out of 1 points   

 When designing a report, a sample report, which is a ____, or prototype, should be prepared for users to review.

 

Correct Answer: 

   Question 73 1 out of 1 points   

 A(n) ____ displays only those records that meet a specific condition or conditions.

 

Correct Answer:

   Question 74 1 out of 1 points   

 In the OSI (open system interconnection) model, the session layer ____.

 

Correct Answer:    defines control structures that manage the communications link between computers 

 

   Question 75 0 out of 1 points   

 Either a page header or a page footer, which appears at the bottom of a page, is used to display the name of the report and a page number.

 

 

Correct Answer:

 

   Question 76 1 out of 1 points   

 A fat client design is ____ to develop than a thin client design, because the architecture resembles traditional file-server designs where all processing is performed at the client.

 

Correct Answer:  

 

   Question 77 1 out of 1 points   

 A three-tier design includes a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.

 

 

Correct Answer: 

   Question 78 1 out of 1 points   

 The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

 

Correct Answer:

 

   Question 79 1 out of 1 points   

 When a system produces multiple reports, each report should have completely different design elements.

 

 

Correct Answer:

 

   Question 80 1 out of 1 points   

 In a report, a group header can be printed after the last detail line in a group and a group footer above the first detail line.

 

 

Correct Answer:

 

   Question 81 1 out of 1 points   

 In a file-oriented information system, a master file ____.

 

Correct Answer:    stores relatively permanent data about an entity 

 

   Question 82 1 out of 1 points   

 A report header, which appears at the beginning of a report, identifies the report, and contains the report title, date, and other necessary information.

 

 

Correct Answer: 

 

   Question 83 1 out of 1 points   

 In a client/server design, tasks are divided between servers, which are workstations that users interact with, and clients, which are computers that supply data, processing, and services to the server workstations.

 

 

   Question 84 1 out of 1 points   

 When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.

 

Correct Answer:    

 

   Question 85 1 out of 1 points   

 An extranet is a private, company-owned network to provide Web-based access to users.

 

 

Correct Answer:

 

   Question 86 1 out of 1 points   

 Specific DBMS (database management system) advantages include all of the following except ____.

 

Correct Answer:   

 

   Question 87 1 out of 1 points   

 Although stand-alone PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, stand-alone computing was inefficient and expensive.

 

 

Correct Answer: 

 

   Question 88 0 out of 1 points   

 Physical storage refers to information as seen through a user’s eyes, regardless of how or where the information actually is organized or stored.

 

 

Correct Answer: 

 

   Question 89 1 out of 1 points   

 Using a DDBMS (distributed database management system) offers all of the following advantages except ____.

 

Correct Answer:    t

   Question 90 1 out of 1 points   

 File sharing designs are efficient only if the number of networked users is ____.

 

Correct Answer:    

   Question 91 1 out of 1 points   

 Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.

 

Correct Answer:  

 

   Question 92 1 out of 1 points   

 HTML uses formatting codes called ____, which specify how the text and visual elements on a Web page will be displayed in a Web browser.

 

Correct Answer:   

 

   Question 93 1 out of 1 points   

 A Web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.

 

 

Correct Answer:

   Question 94 1 out of 1 points   

 A dialog box allows a user to enter information about a task that the system will perform.

 

 

Correct Answer:

 

   Question 95 1 out of 1 points   

 In a client/server interaction, the client submits a request for information from the server, which carries out the operations and responds to the client.

 

 

   Question 96 1 out of 1 points   

 Every information system involves ____.

 

Correct Answer:    

 

   Question 97 1 out of 1 points   

 Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems.

 

 

Correct Answer: 

 

   Question 98 1 out of 1 points   

 User-selected Help always offers assistance for the task in progress.

 

 

 

   Question 99 1 out of 1 points   

 In most organizations, the IT department is responsible for output control and security measures.

 

 

Correct Answer: 

 

   Question 100 1 out of 1 points   

 In older systems, often the user interface mainly consisted of process-control screens that allowed a user to send commands to the system.

 

 

Correct Answer: