Term
A request for quotation (RFQ) is less specific than a request for proposal (RFP).
• True • False |
|
Definition
|
|
Term
A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.
• Return on investment (ROI) • Present net value (PNV) • Request for quotation (RFQ) • Request for proposal (RFP) |
|
Definition
Request for Quotation ( RFQ ) |
|
|
Term
A _____ represents the work that one person can complete in one day.
• Person-work • Work-duration • Work-day • Person-day |
|
Definition
|
|
Term
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
• Cardinality • Scalability • Compatibility • Functionality |
|
Definition
|
|
Term
In a data dictionary, some data elements have _____ rules. For example, an employee’s salary must be within the range defined for the employee’s job classification.
• Range • Domain • Validity • Mastered |
|
Definition
|
|
Term
In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support.
• Evaluation team • Planning center • Planning center • Service desk |
|
Definition
|
|
Term
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.
• True • False |
|
Definition
|
|
Term
In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.
• Type • Domain • Valence • Pool |
|
Definition
|
|
Term
The inherent efficiency of high-volume processing on larger computers is called _____.
• Economy of scope • Economy of scale • Cardinality • Monopoly |
|
Definition
|
|
Term
In a state transition diagram, the states appear as rounded rectangles with the state names inside.
• True • False |
|
Definition
|
|
Term
_____ determines how long it takes an information system to spend for itself through reduced costs and increased benefits. • Acquisition process • Return on investment (ROI) • Net present value (NPV) • Payback analysis |
|
Definition
|
|
Term
Before publishing a form on the Internet or a company intranet, a systems analyst should protect it so users can change the layout or design but cannot fill it in.
• True • False |
|
Definition
|
|
Term
In a web-based design, the Internet serves as the _____ for the database management system.
• Middleware • Interface • Back end • Front end |
|
Definition
|
|
Term
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
• True • False |
|
Definition
|
|
Term
_____ are internal factors that shape corporate IT choices.
• Technology • Company Finances • User Requests • Strategic Plan |
|
Definition
Company Finances
User Requests
Strategic Plan |
|
|
Term
Typically, customers purchase licenses that give them the right to use the software under the terms of the license agreement.
• True • False |
|
Definition
|
|
Term
Generally, systems analysts review the work of other systems analysts, and programmers review the work of other programmers, as a form of peer review, in structured walk-throughs.
• True • False |
|
Definition
|
|
Term
In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships
• True • False |
|
Definition
|
|
Term
Identify the letters of the choices that best match the sentences or definitions.
• It typically starts with a systems request, followed by a preliminary investigation, which includes a feasibility study. • This might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system. • It is a system that provides the right products at the right place at the right time. • It is a technology that is expected to overshadow bar code technology in the future. • They provide automated responses to sales inquiries, online order processing, and inventory tracking. • With this application, a supplier can use radio frequency identification (RFID) tags on each crate, case, or shipping unit to create a digital shipping list. • When assessing this, a systems analyst must consider the interaction between time and costs. • Its end product is a report to management. • It shows formal reporting relationships of a group. • It is a summary of a project request and a specific recommendation. |
|
Definition
System Development System Request Just-in-time Electronic product code Customer relationship management components Electronic proof of delivery Schedule feasibility Preliminary Investigation Organization Chart Case of action |
|
|
Term
The selection structure is the completion of _____.
• One or more process steps based on the results of a test or condition • A specific condition that is repeated until a process changes • A process step that is repeated until a specific condition changes • Steps in a chronological order, one after another |
|
Definition
One or more process steps based on the results of a test or condition |
|
|
Term
The selection structure is the completion of _____.
• One or more process steps based on the results of a test or condition • A specific condition that is repeated until a process changes • A process step that is repeated until a specific condition changes • Steps in a chronological order, one after another |
|
Definition
One or more process steps based on the results of a test or condition |
|
|
Term
One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change.
• Rapid application development • Object-oriented analysis • Structured analysis • Agile |
|
Definition
|
|
Term
A business process describes a specific set of _____.
• Results • Events • Employees • Transactions |
|
Definition
Results
Events
Transactions |
|
|
Term
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.
• Fourth normal • Second normal form • Third normal form • Zeroth normal form |
|
Definition
|
|
Term
In a(n) _____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.
• Spontaneous • Open-ended • Unstructured • Informal |
|
Definition
|
|
Term
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.
• Random sample • Comprehensive Sample • Stratified sample • Systematic sample |
|
Definition
|
|
Term
The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client.
If they make use of the four-model approach, which of the following is a likely outcome?
• It will not be possible to get a clear picture of the current system functions before modifications are made • The requirements of the new system will always be different from the current information system. • Time taken to develop the model increases. • Costs need to develop a logical and physical model of the current system will be less. |
|
Definition
Time taken to develop the model increases |
|
|
Term
The line from the actor to the use case is called a(n) _____.
• Association • Aggregation • Lifeline • Observation |
|
Definition
|
|
Term
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.
• Multinational • GUI • Web-based • Cloud |
|
Definition
|
|
Term
_____, a human resource issue, is a possible cause of cost overruns in an organization. • Unrealistic estimates • Inadequate training • Inaccurate demand forecast • Poor monitoring of progress |
|
Definition
|
|
Term
_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.
• Flowcharts • Training plans • Acceptance tests • Simulations |
|
Definition
|
|
Term
In a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart, each rectangular box, called a task box, has five sections that contain important information about a task.
• True • False |
|
Definition
|
|
Term
Which of the following is true of web-based development?
• When companies acquire web-based software as a service rather than a product they purchase, they can limit in-house involvement to a minimum. • Web-based software treats the software as a product that is more dependent on desktop computing powers and resources. • Web-based systems can run on multiple hardware environments. • Web-based software usually requires middleware to communicate with existing software and legacy systems. |
|
Definition
When companies acquire web-based software as a service rather than a product they purchase, they can limit in-house involvement to a minimum.
Web-based systems can run on multiple hardware environments
Web-based software usually requires middleware to communicate with existing software and legacy systems. |
|
|
Term
_____ is the process of reviewing a program code to spot logic errors, which produce incorrect results.
• Direct cutover examination • Results walkthrough • Desk checking • Cohesion assurance |
|
Definition
|
|
Term
The term _____ generally refers to systems that divide processing between one or more networked clients and a central server.
• Glueware • Mission-critical • Fat client • Client/server |
|
Definition
|
|
Term
If team members lack experience with certain aspects of the required technology, temporary help might be obtained from IT consultants or part-time staff.
• True • False |
|
Definition
|
|
Term
Each _____ contains data about people, places, things, or events.
• File • Table • Nonkey field • Cardinality notation |
|
Definition
|
|
Term
Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.
• Test plan • Training plan • Top-down approach • Integrated approach |
|
Definition
|
|
Term
The characteristics of online processing systems are that _____.
• Users can access data randomly • Users interact with the information system • The system process transactions completely when and where they occur • The systems avoid a constant dialog between the user and the system. |
|
Definition
Users can access data randomly
Users interact with the information system
The system process transactions completely when and where they occur |
|
|
Term
Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.
• Evaluative model • Spiral model • Incremental model • Extreme model |
|
Definition
|
|
Term
The skill set required to develop documentation usually is the same as that required to develop a system.
• True • False |
|
Definition
|
|
Term
Many analysts follow _____, which means that they develop a physical model of the current system, a logical model of the current system, a logical model of the new system, and a physical model of the new system.
• The Gane and Sarson symbol • A four-model approach • A process description • The Zachman Framework |
|
Definition
|
|
Term
A(n) _____ represents a person, a place, an event, or a transaction that is significant to the information system.
• Model • Object • Class • Instance |
|
Definition
|
|
Term
_____ includes ongoing support and maintenance costs, as well as acquisition costs.
• RCT (Real cost of time) • JIT (Just-in-time costs) • CRC (Customer relationship costs) • TCO (Total cost of ownership) |
|
Definition
TCO (Total cost of ownership) |
|
|
Term
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.
• True • False |
|
Definition
|
|
Term
Creating a standard list of interview questions helps a systems analyst to keep on track and avoid unnecessary tangents.
• True • False |
|
Definition
|
|
Term
A _____ defines what must take place, not how it will be accomplished.
• Physical design • Quantitive design • Logical design • Qualitative design |
|
Definition
|
|
Term
Emily is functioning with her customer, Anna, on the design of a new database. She describes to Anna that key fields are utilized to access, coordinate, and preserve the data records. Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.
• Primary key • Secondary key • Super key • Foreign key |
|
Definition
|
|
Term
In a data flow diagram (DFD), a process symbol can have only one outgoing data flow.
• True • False |
|
Definition
|
|
Term
Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.
• True • False |
|
Definition
|
|
Term
_____ combine data from different item attributes, or characteristics, to build a code.
• Significant digit code • Sequence codes • Derivation codes • Category codes |
|
Definition
|
|
Term
_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.
• Multipath design • System architecture • System file checker • Legacy data |
|
Definition
|
|
Term
Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track. • Relative path • Critical path • Dynamic path • Absolute path |
|
Definition
|
|
Term
Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.
• Outsource hosting provider (OHP) • Internet business services (IBS) • Fixed outsourcing services (FOS) • Application service provider (ASP) |
|
Definition
Internet business services (IBS) |
|
|
Term
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
• Candidate key • Secondary key • Combination key • Foreign key |
|
Definition
|
|
Term
A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.
• True • False |
|
Definition
|
|
Term
Which of the following are the advantages of using a distributed database management system (DDBMS)?
• The system is less likely to experience a catastrophic failure when data is stored in various locations. • The data stored closer to users can reduce network traffic. • The data is stored in various locations thereby making it is easy to maintain controls and standards. • The system is scalable, so new data sites can be added without reworking the system design. |
|
Definition
The system is less likely to experience a catastrophic failure when data is stored in various locations.
The data stored closer to users can reduce network traffic. The system is scalable, so new data sites can be added without reworking the system design. |
|
|
Term
Each activity within the systems analysis phase has an end product and one or more milestones.
• True • False |
|
Definition
|
|
Term
An object has certain _____, which are characteristics that describe the object, such as the make, model, and color of a car.
• Attributes • Elements • Keys • Indices |
|
Definition
|
|
Term
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.
• True • False |
|
Definition
|
|
Term
When structured English is used, which of the following rules must be conformed to?
• Avoid standard terms used in the data dictionary. • Use a limited vocabulary. • Use indentation for readability. • Use only the three building blocks of sequence, selection, and iteration. |
|
Definition
Use a limited vocabulary.
Use indentation for readability.
Use only the three building blocks of sequence, selection, and iteration. |
|
|
Term
A _____ might involve maximums for one or more resources, such as time, dollars, or people.
• Milestone • Constraint • Successor task • Task ID |
|
Definition
|
|
Term
To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.
• Compatibility • Scalability • Applicability • Reliability |
|
Definition
|
|
Term
In a data flow diagram (DFD), a data flow must have a process symbol on at least one end.
• True • False |
|
Definition
|
|
Term
Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.
• True • False |
|
Definition
|
|
Term
Structured analysis is a traditional systems development technique that uses a series of phases, called the _____, to plan, analyze, design, implement, and support an information system.
• object-oriented (O-O) analysis • enterprise resource planning system (ERP) • transaction processing (TP) system • systems development life cycle (SDLC) |
|
Definition
systems development life cycle (SDLC) |
|
|
Term
A _____ describes the information that a system must provide.
• Data model • Process model • Business model • Network model |
|
Definition
|
|
Term
EBCDIC and ASCII both require _____ bits for storage of each character. • Sixteen • Twelve • Six • Eight |
|
Definition
|
|
Term
A class can belong to a more general category called a _____.
• Subclass • Register • Catalog • Superclass |
|
Definition
|
|
Term
Product-oriented firms manufacture _____.
• Routers • Computers • Microchips • Retail services |
|
Definition
Routers
Computers
Microchips |
|
|
Term
A combination key can also be called a _____.
• Concatenated key • Composite key • Foreign key • Multivalued key |
|
Definition
Composite Key
Multivalued key |
|
|