Systems Analysis and Design Fifth Edition

Report
Systems Analysis and Design
Fifth Edition
1. The Software and Information Industry Association and
many software industry leaders, including Microsoft,
believe that the concept of __________ is redefining the
way that companies develop and deploy their information
systems.
• hardware as a help
• software as a service
• processing as a product
• storage as a solution
2. Outsourcing can refer to
__________.
• relatively minor programming tasks
• the rental of software from a service
provider
• the handling of a company’s entire IT
function
• all of the above
3. When determining outsourcing fees, a
__________ uses a set fee based on a specified
level of service and user support.
• fixed fee model
• usage model
• subscription fee model
• transaction model
4. When determining outsourcing fees, a
__________ has a variable fee based on the
number of users or workstations that have access
to the application.
• fixed fee model
• usage model
• subscription fee model
• transaction model
5. Typically, companies choose in-house software
development for all of the following reasons except
__________.
• to minimize changes in business
procedures and policies
• to meet constraints of existing systems
and existing technology
• to develop internal resources and
capabilities
• to obtain input from other companies who
have already implemented the software
6. Advantages of purchasing a software package
over developing software in-house include all of
the following except __________.
• satisfaction of unique business
requirements
• lower costs and less time to implement
• proven reliability and performance
benchmarks
• less technical development staff
7. Buyers can customize a software package by
__________.
• negotiating directly with the software
vendor to make enhancements to meet
the buyer’s needs by paying for the
changes
• purchasing a basic package that vendors
will customize to suit the buyer’s needs
• purchasing the software and making their
own modifications, if this is permissible
under the terms of the software license
• all of the above
8. Some data files should be totally hidden from
view, while others should have __________ so
users can view, but not change, the data.
• no-access properties
• read-only properties
• full-access properties
• write-only properties
9. A __________ is a document that describes a
company, lists the services or products needed,
and specifies the features required.
• request for quotation (RFQ)
• net present value (NPV)
• request for proposal (RFP)
• return on investment (ROI)
10. When companies use a __________, they
already know the specific products or services they
want and need to obtain price quotations or bids
from vendors.
• request for quotation (RFQ)
• net present value (NPV)
• request for proposal (RFP)
• return on investment (ROI)
11. A __________ measures the time a package
takes to process a certain number of transactions.
• newsgroup
• parameter
• benchmark
• default
12. When planning a slide presentation to
management at the end of the systems analysis
phase, systems analysts should keep all of the
following suggestions in mind except __________.
• summarize the primary viable alternatives
• ignore time for discussion and questions
and answers
• explain why the evaluation and selection
team chose the recommended alternatives
• obtain a final decision or agree on a
timetable for the next step in the process
13. The physical design is developed during the
__________ phase of the SDLC.
• systems design
• systems analysis
• systems operation and support
• systems planning
14. A __________ is a value that the user enters
whenever a query is run, which provides flexibility,
enables users to access information easily, and
costs less.
• newsgroup
• parameter
• benchmark
• default
15. A __________ is a value that a system
displays automatically.
• newsgroup
• parameter
• benchmark
• default
16. Guidelines to follow when determining data
entry and storage considerations include all of the
following except __________.
• data should be verified when it is entered,
to catch errors immediately
• data should be verified when it is entered
• data duplication should be encouraged
• data should be entered into a system only
once
For the multiple choice questions 17 through 19 you must
use the Picture above.
17. __________, like that illustrated in the
accompanying figure, produces an early, rapidly
constructed working version of a proposed system.
• Prototyping
• Outsourcing
• Coding
• Benchmarking
18. Prototyping, like that illustrated in the
accompanying figure, includes all of the following
benefits except __________.
• users and systems analysts can avoid
misunderstandings
• managers can evaluate a working model more
effectively than a paper specification
• system requirements, such as reliability and
maintainability, can be rated adequately
• systems analysts can develop testing and
training procedures before the finished solution
is available
19. Potential problems of prototyping, like that
illustrated in the accompanying figure, include all
of the following except __________.
• the rapid pace of development can create quality
problems
• some system requirements, such as reliability
and maintainability, cannot be tested adequately
• prototypes become unwieldy and difficult to
manage in very complex systems
• prototyping increase the risk and potential
financial exposure that occur when a finished
system fails to support business needs
20. Sequence codes __________.
• use blocks of numbers for different
classifications
• are numbers or letters assigned in a
specific order
• use alphabet letters to distinguish one item
from another based on a category
• combine data from different item
attributes, or characteristics, to build the
code
21. Significant digit codes __________.
• are numbers or letters assigned in a
specific order
• indicate what action is to be taken with an
associated item
• use blocks of numbers for different
classifications
• distinguish items by using a series of
subgroups of digits
22. Derivation codes __________.
• use blocks of numbers for different
classifications
• combine data from different item
attributes, or characteristics, to build the
code
• are numbers or letters assigned in a
specific order
• use alphabet letters to distinguish one item
from another based on a category
23. Cipher codes __________.
• use blocks of numbers for different
classifications
• distinguish items by using a series of
subgroups of digits
• use a keyword to encode a number
• indicate what action is to be taken with an
associated item
24. Self-checking codes __________.
• use a check digit to verify the validity of a
numeric code
• combine data from different item
attributes, or characteristics, to build the
code
• use blocks of numbers for different
classifications
• distinguish items by using a series of
subgroups of digits
25. When developing a code, all of the
following suggestions should be kept in mind
except __________.
• avoid confusing codes
• keep codes concise
• make codes unique
• keep codes variable
True/False
1. Mission-critical IT systems should be outsourced only
if the result is a cost-effective, reliable, business solution
that fits the company’s long-term business strategy. (6)
T
2. A major advantage of outsourcing is that it eliminates
employee concerns about job security. (7)
F
True/False
3. A software package that can be used by many
different types of organizations is called a vertical
application. (8)
F
4. A software package developed to handle information
requirements for a specific type of business is called a
horizontal application. (9) F
5. By designing a system in-house, companies can
develop and train an IT staff that understands the
organization’s business functions and information
support needs. (10) T
True/False
6. Compared to software developed in-house, a
software package almost always is more expensive,
particularly in terms of initial investment. (11) F
7. Companies that use commercial software
packages always must increase the number of
programmers and systems analysts on the IT staff.
(12)
F
True/False
8. Software vendors regularly upgrade software
packages by adding improvements and enhancements
to create a new version or release. (13) T
9. Empowerment makes an IT department less
productive because it must spend more time
responding to the daily concerns of users and less
time on high-impact systems development projects
that support strategic business goals. (14) F
10. The decision to develop software in-house will
require less participation from the systems analyst
than outsourcing or choosing a commercial package.
(15) F
True/False
11. The primary objective of an evaluation and T
selection team is to eliminate system alternatives
12.
Return
on work,
investment
(ROI)
is a percentage
that
will not
rank the
system
alternatives rate
that that
compares
total
net benefits
(thealternatives
return) received
will work,the
and
present
the viable
to
from
a project tofor
thea total
(the)16)
investment) of the
management
final costs
decision.
T
project. (17)
13. The net percent value (NPV) of a project is the
total value of the benefits minus the total value of the
costs, with both costs and benefits adjusted to reflect
the point at which they occur. (18) T
14. A request for quotation (RFQ) is less specific than
an RFP (request for proposal). (19) F
True/False
15. A systems analyst must understand the logical
design of a system before beginning the physical
design of any one component. (29) T
16. A system is reliable if it adequately handles errors,
such as input errors, processing errors, hardware
failures, or human mistakes. (30) T
17. Automated methods of data entry should be
avoided whenever possible. (34) F
True/False
18. Although every project has budget and financial
constraints, decisions that achieve short-term savings
but might mean higher costs later should be avoided.
(38) T
19. Allowing users to experiment with a prototype and
provide feedback on how well it meets their needs can
increase development costs, but the expense will be
offset by lower costs in subsequent SDLC phases. (39)
T
20. Category codes are alphabetic abbreviations. (44)
F
Systems Analysis and Design
Fifth Edition
Multiple Choice – Chapter 7
1. According to a usability expert at IBM, a
computer user has the right to __________.
• easy-to-use instructions for understanding
and utilizing a system to achieve desired
goals and recover from problem situations
• be informed clearly about all systems
requirements for successfully using
software or hardware
• communicate with the technology provider
and receive a thoughtful and helpful
response when raising concerns
• all of the above
2. Initial screen designs can be presented to users
in the form of a(n) __________, which is a sketch
that shows the general screen layout and design.
• storyboard
• turn-around document
• faxback
• output control
3. Good user interface design is based partly on
__________, which describes how people work,
learn, and interact with computers.
• aesthetics
• interface technology
• ergonomics
• output security
4. Good interface design is based partly on
__________, which focuses on how an interface
can be made attractive and easy to use.
• aesthetics
• interface technology
• ergonomics
• output security
5. Good interface design is based partly on
__________, which provides the operational
structure required to carry out the design
objectives.
• aesthetics
• interface technology
• ergonomics
• output security
Figure Above used for Questions 6 thur 9!
6. In a data entry screen such as that shown in the
accompanying figure, a(n) __________ is a control
feature that initiates an action such as printing a
form or requesting Help.
•
•
•
•
command button
option button
toggle button
radio button
7. In a data entry screen such as that shown in the
accompanying figure, a(n) __________ is a control
feature that is used to represent on or off status
and switches to the other status when clicked.
• command button
• option button
• toggle button
• radio button
8. In a data entry screen such as that shown in the
accompanying figure, a __________ is a control
feature that displays the current selection and,
when a user clicks the arrow, a roster of available
choices.
• text box
• drop-down list box
• check box
• dialog box
9. In a data entry screen such as that shown in the
accompanying figure, a __________ is a control
feature that is used to select one or more choices
from a group.
• dialog box
• list box
• text box
• check box
10. The concept that the quality of the output is
only as good as the quality of the input, which
sometimes is known as __________, is familiar to
IT professionals, who recognize that the best time
to avoid problems is when data is entered.
• bad input, bad output (BIBO)
• garbage in, garbage out (GIGO)
• poor start, poor finish (PSPF))
• weak hand, weak hold (WHWH)
11. To design data entry screens that are easy to
learn and use, employ all of the following
guidelines except __________.
• restrict user access to screen locations
where data is entered
• provide a descriptive caption for every field
• require users to type leading zeroes for
numeric fields
• display a default value when a field value
will be constant for successive records
12. An existence check is a data validation check
that __________.
• tests data items to verify that they fall
between a specified minimum and
maximum value
• identifies values that are questionable, but
not necessarily wrong
• is performed on two or more fields to
ensure that they are consistent or
reasonable when considered together
• is used for mandatory data items
13. A range check is a data validation check that
__________.
• tests data items to verify that they fall
between a specified minimum and
maximum value
• identifies values that are questionable, but
not necessarily wrong
• is performed on two or more fields to
ensure that they are consistent or
reasonable when considered together
• is used for mandatory data items
14. A reasonableness check is a data validation
check that __________.
• tests data items to verify that they fall
between a specified minimum and
maximum value
• identifies values that are questionable, but
not necessarily wrong
• is performed on two or more fields to
ensure that they are consistent or
reasonable when considered together
• is used for mandatory data items
15. A combination check is a data validation check
that __________.
• tests data items to verify that they fall
between a specified minimum and
maximum value
• identifies values that are questionable, but
not necessarily wrong
• is performed on two or more fields to
ensure that they are consistent or
reasonable when considered together
• is used for mandatory data items
16. On a source document, the __________
contains codes, identification information,
numbers, and dates that are used for storing
completed forms.
• control zone
• heading zone
• totals zone
• authorization zone
17. On a source document, the main part of the
form, called the __________, usually takes up at
least half of the space on the form and contains
captions and areas for entering variable data.
• instruction zone
• authorization zone
• body zone
• heading zone
18. Because users tend to skim a Web page,
picking out individual words and sentences, Web
designers must use __________ to capture and
hold a user’s attention.
• batch controls
• scannable text
• audit trails
• hash totals
19. A(n) __________ produces one or more lines
of output for each record processed.
• detail report
• exception report
• summary report
• all of the above
20. A(n) __________ displays only those records
that meet a specific condition or conditions.
• detail report
• exception report
• summary report
• all of the above
21. For upper-level managers who often want to
see total figures and do not need supporting
details, a(n) __________ is appropriate.
• detail report
• exception report
• summary report
• all of the above
22. When designing a report, a sample report,
which is a __________, or prototype, should be
prepared for users to review.
• storyboard
• dialog box
• form layout
• mock-up
23. After a report design is approved, the design
should be documented in a __________, which
contains information about the fields, data types
and lengths, report frequency and distribution, and
other comments.
• printer spacing chart
• data validation check
• source document
• report analysis form
24. The speed of laser printers is rated in
__________, which can be used to estimate the
time required to print a report.
• cps (characters per second)
• lpm (lines per minute)
• ppm (pages per minute)
• rph (reports per hour)
25. __________ protects privacy rights and shields
an organization’s proprietary data from theft or
unauthorized access.
• Aesthetics
• Interface technology
• Ergonomics
• Output security
Systems Analysis and Design
Fifth Edition
Multiple Choice – Chapter 8
1. __________ is the measure of a system’s ability
to expand, change, or downsize easily to meet the
changing needs of a business enterprise.
• Transparency
• Scalability
• Redundancy
• Interoperability
2. Every information system involves __________.
• data storage and access methods
• application programs to handle the
programming logic
• an interface that allows users to interact
with the system
• all of the above
3. A system design where the server performs all
the processing is described as __________.
• mainframe architecture
• thin architecture
• workstation architecture
• thick architecture
4. A server that supports a large number of clients
at various locations is called a(n) __________.
• closed system
• distributed system
• open system
• centralized system
5. File sharing designs are efficient only if the
number of networked users is __________
• low and the transmitted file sizes are
relatively small
• high but the transmitted file sizes are
relatively small
• low but the transmitted file sizes are
relatively large
• high and the transmitted file sizes are
relatively large
6. In a client/server design, a database server
__________.
• processes individual SQL commands
• exchanges object methods with clients
• handles a set of SQL commands
• sends and receives Internet-based
communications
7. A fat client design is __________ to develop
than a thin client design, because the architecture
resembles traditional file server designs where all
processing is performed at the client.
• simpler but more expensive
• more complex and more expensive
• simpler and less expensive
• more complex but less expensive
8. Compared to file server designs, client/server
systems __________ response times.
• increase network loads but improve
response times
• reduce network loads and improve
response times
• increase network loads and worsen
response times
• reduce network loads but worsen
response times
9. Using a DDBMS (distributed database
management system) offers all of the following
advantages except __________.
• the system is scalable, so new data sites
can be added without reworking the
system design
• data stored closer to users can reduce
network traffic
• with data stored in various locations, the
system is less likely to experience a
catastrophic failure
• the architecture of the system is simple
and easy to manage
10. When developing e-business systems, an inhouse solution usually requires a __________ for
a company that must adapt quickly in a dynamic ecommerce environment.
• smaller initial investment and provides
more flexibility
• smaller initial investment but provides less
flexibility
• greater initial investment but provides
more flexibility
• greater initial investments and provides
less flexibility
11. Online processing systems typically have all of
the following characteristics except __________.
• users interact directly with the information
system
• the system requires significantly fewer
network resources than batch systems
• users can access data randomly
• the system processes transactions
completely when and where they occur
12. A batch processing system has all of the
following characteristics except __________.
• transactions are collected, processed, and
grouped periodically
• the IT operations group can run batch
programs on a predetermined schedule
• the information system is available
whenever necessary to support business
operations
• batch programs require significantly fewer
network resources than online systems
13. In the OSI (open system interconnection)
model, the application layer __________.
• defines specific methods of transmitting
data over the physical layer
• provides network services requested by
local workstation
• defines control structures that manage the
communications link between computers
• contains physical components that carry
data
14. In the OSI (open system interconnection)
model, the presentation layer __________.
• defines network addresses and
determines how data is routed over the
network
• provides reliable data flow and error
recovery
• assures that data is uniformly structured
and formatted for network transmission
• contains physical components that carry
data
15. In the OSI (open system interconnection)
model, the session layer __________.
• assures that data is uniformly structured
and formatted for network transmission
• defines network addresses and
determines how data is routed over the
network
• defines specific methods of transmitting
data over the physical layer
• defines control structures that managed
the communications link between
computers
16. In a __________, one computer (typically a
mainframe), controls the network, and satellite
computers or servers control lower levels of
processing and network devices.
• hierarchical network
• star network
• bus network
• ring network
Figure above is for Questions 17 & 18
17. A __________, such as that illustrated in the
accompanying figure, has a central computer with
network devices connected to it.
• hierarchical network
• star network
• bus network
• ring network
18. As shown in the accompanying figure, at the
center of a star network, which is called the
__________, a central computer manages the
network.
• log
• scale
• hub
• portal
19. In a __________, a single communications
path connects the mainframe computer, server,
workstations, and peripheral devices.
• hierarchical network
• star network
• bus network
• ring network
20. A disadvantage of a bus network is that
__________.
• performance can decline as more users
and devices are added
• devices cannot be attached or detached
without disturbing the rest of the network
• failure in one workstation necessarily
affects other workstations on the network
• all of the above
21. A __________ resembles a circle of computers
that communicate with each other.
• hierarchical network
• star network
• bus network
• ring network
22. Apart from backup and recovery procedures
necessary to sustain business operations
__________ laws and regulations apply to
company data.
• file retention
• file backup
• file server
• file disposal
23. The __________ section in a typical system
design specification contains the complete design
for a new system, including the user interface,
outputs, inputs, files, databases, and network
specifications.
• System Components
• Executive Summary
• Implementation Requirements
• Time and Cost Estimates
24. The __________ section in a typical system
design specification describes the constraints, or
conditions, affecting a system, including any
requirements that involve operations, hardware,
systems software, or security.
• Time and Cost Estimates
• System Environment
• Executive Summary
• System Components
25. In the __________ section in a typical system
design specification, startup processing, initial data
entry or acquisition, user training requirements, and
software test plans are specified.
• System Environment
• Executive Summary
• System Components
• Implementation Requirements

similar documents