cts-285 study guide

140
Questi on 1 1 out of 1 points System requirements serve as benchmarks to measure the overall acceptability of a finished system. Selected Answer: Tru e Correct Answer: Tru e Quest ion 2 1 out of 1 points New business support systems that produced valuable information, in addition to performing manual tasks, were called management information systems (MIS) because managers were the primary users. Selected Answer: Tru e Correct Answer: Tru e Quest ion 3 1 out of 1 points A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization. Selected Answer: Fal se Correct Answer: Fal se Quest ion 4 1 out of 1 points ____ is a typical example of a system requirement for the input category. Selected Student grades must be entered on

Upload: max-potent

Post on 27-Oct-2014

143 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: CTS-285 Study Guide

 Question 1

1 out of 1 points

System requirements serve as benchmarks to measure the overall acceptability of a finished system.

Selected Answer: True

Correct Answer: True

  Question 2

1 out of 1 points

New business support systems that produced valuable information, in addition to performing manual tasks, were called management information systems (MIS) because managers were the primary users.

Selected Answer: True

Correct Answer: True

  Question 3

1 out of 1 points

A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.

Selected Answer: False

Correct Answer: False

  Question 4

1 out of 1 points

____ is a typical example of a system requirement for the input category.

Selected Answer:

   Student grades must be entered on machine-scannable forms prepared by the instructor

Correct Answer:

   Student grades must be entered on machine-scannable forms prepared by the instructor

  Question 5

1 out of 1 points

____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

Selected Answer:    Customer relationship management (CRM)

Correct Answer:    Customer relationship management (CRM)

  Question 6

1 out of 1 points

Page 2: CTS-285 Study Guide

Examples of tangible benefits include all of the following except a(n) ____.

Selected Answer:

   user-friendly system that improves employee job satisfaction

Correct Answer:    user-friendly system that improves employee job satisfaction

  Question 7

1 out of 1 points

In a sequence diagram, the interaction proceeds from left to right along horizontal arrows, while a vertical timeline represents messages from one object to another.

Selected Answer: False

Correct Answer: False

  Question 8

1 out of 1 points

Internal factors that affect IT systems projects include all of the following except ____.

Selected Answer:    the economy

Correct Answer:    the economy

  Question 9

1 out of 1 points

A vertical system is a system, such as an inventory or payroll application, that can be adapted for use in many different companies.

Selected Answer: False

Correct Answer: False

  Question 10

1 out of 1 points

____ is a typical example of a system requirement for the output category.

Selected Answer:

   The contact management system must generate a daily reminder list for all sales reps

Correct Answer:

   The contact management system must generate a daily reminder list for all sales reps

  Question 11

1 out of 1 points

When evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

Page 3: CTS-285 Study Guide

Selected Answer:

   one person’s bias is more likely to affect the decisions

Correct Answer:    one person’s bias is more likely to affect the decisions

  Question 12

1 out of 1 points

Supporters of neutral locations for interviews believe that it ____.

Selected Answer:

   keeps interruptions to a minimum so people can concentrate fully

Correct Answer:

   keeps interruptions to a minimum so people can concentrate fully

  Question 13

1 out of 1 points

A horizontal system is designed to meet the unique requirements of a specific business or industry, such as a Web-based retailer, a medical practice, or a video chain.

Selected Answer: False

Correct Answer: False

  Question 14

1 out of 1 points

All of the following are common reasons for systems requests except ____.

Selected Answer:    weaker controls

Correct Answer:    weaker controls

  Question 15

1 out of 1 points

The main objective of all RAD approaches is to extend development time and expense by excluding users from every phase of systems development.

Selected Answer: False

Correct Answer: False

  Question 16

1 out of 1 points

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Page 4: CTS-285 Study Guide

Selected Answer:    enterprise applications

Correct Answer:    enterprise applications

  Question 17

1 out of 1 points

Product-oriented companies primarily offer information or services or sell goods produced by others.

Selected Answer: False

Correct Answer: False

  Question 18

1 out of 1 points

A systems request might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system.

Selected Answer: True

Correct Answer: True

  Question 19

1 out of 1 points

Knowledge management systems are called expert systems because they ____.

Selected Answer:

   simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

Correct Answer:

   simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

  Question 20

1 out of 1 points

When preparing a checklist of specific tasks to observe and questions to ask, a systems analyst should consider ____.

Selected Answer:    all of the above

Correct Answer:    all of the above

  Question 21

1 out of 1 points

A systems request form should not ____.

Selected Answer:    have complex instructions

Correct Answer:    have complex instructions

Page 5: CTS-285 Study Guide

  Question 22

1 out of 1 points

In an information system, information consists of basic facts that are the system’s raw material.

Selected Answer: False

Correct Answer: False

  Question 23

1 out of 1 points

In a typical company organizational model, middle managers ____.

Selected Answer:

   provide direction, necessary resources, and performance feedback to supervisors and team leaders

Correct Answer:

   provide direction, necessary resources, and performance feedback to supervisors and team leaders

  Question 24

1 out of 1 points

Each activity within the systems analysis phase has an end product and one or more milestones.

Selected Answer: True

Correct Answer: True

  Question 25

1 out of 1 points

Performance limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

Selected Answer: True

Correct Answer: True

  Question 26

1 out of 1 points

____ is a typical example of a system requirement for the performance category.

Selected Answer:

   The student records system must produce class lists within five hours after the end of registration

Correct Answer:

   The student records system must produce class lists within five hours after the end of registration

  Question 27

1 out of 1 points

Page 6: CTS-285 Study Guide

In launching a new information system, the greatest risk occurs when a company ____.

Selected Answer:

   tries to decide how the system will be implemented before determining what the system is supposed to do

Correct Answer:

   tries to decide how the system will be implemented before determining what the system is supposed to do

  Question 28

1 out of 1 points

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the

Page 7: CTS-285 Study Guide

accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

Selected Answer:    waterfall model

Correct Answer:    waterfall model

  Question 29

1 out of 1 points

When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

Selected Answer:    legacy systems

Correct Answer:    legacy systems

  Question 30

1 out of 1 points

In many large companies, applications called enterprise resource planning (ERP) systems provide cost-effective support for users and managers throughout the company.

Selected Answer: True

Correct Answer: True

  Question 31

1 out of 1 points

In an information system, data is information that has been transformed into output that is valuable to users.

Selected Answer: False

Correct Answer: False

  Question 32

1 out of 1 points

Page 8: CTS-285 Study Guide

Of the measures of feasibility in the accompanying figure, ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”

Selected Answer:    operational feasibility

Correct Answer:    operational feasibility

  Question 33

1 out of 1 points

A mission-critical system is one that is unimportant to a company’s operations.

Page 9: CTS-285 Study Guide

Selected Answer: False

Correct Answer: False

  Question 34

1 out of 1 points

To evaluate ____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.

Selected Answer:    scalability

Correct Answer:    scalability

  Question 35

1 out of 1 points

Greater user involvement in the system development process usually results in poorer communication, slower development times, and less satisfied users.

Selected Answer: False

Correct Answer: False

  Question 36

1 out of 1 points

Examples of intangible benefits include all of the following except a(n) ____.

Selected Answer:

   online package tracking system that decreases the need for clerical staff

Correct Answer:

   online package tracking system that decreases the need for clerical staff

  Question 37

1 out of 1 points

The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

Selected Answer:    systems analysis

Correct Answer:    systems analysis

  Question 38

1 out of 1 points

In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

Selected Answer:    class

Page 10: CTS-285 Study Guide

Correct Answer:    class

  Question 39

1 out of 1 points

Creating an FDD is different from drawing an organization chart — systems analysts start at the bottom and work their way up.

Selected Answer: False

Correct Answer: False

  Question 40

1 out of 1 points

Systems requests seldom are aimed at improving service to customers or users within a company.

Selected Answer: False

Correct Answer: False

  Question 41

1 out of 1 points

The primary advantage of RAD is that ____.

Selected Answer:

   systems can be developed more quickly with significant cost savings

Correct Answer:

   systems can be developed more quickly with significant cost savings

  Question 42

1 out of 1 points

TP systems are inefficient because they process a set of transaction-related commands individually rather than as a group.

Selected Answer: False

Correct Answer: False

  Question 43

1 out of 1 points

While RAD typically focuses only on fact-finding and requirements determination, JAD provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation.

Selected Answer: False

Correct Answer: False

Page 11: CTS-285 Study Guide

  Question 44

1 out of 1 points

____ is a traditional, time-tested, easy to understand systems development technique that uses a set of process models to describe a system graphically.

Selected Answer:    Structured analysis

Correct Answer:    Structured analysis

  Question 45

1 out of 1 points

A risk of RAD is that a system might work well in the short term, but the corporate and long-term objectives for the system might not be met.

Selected Answer: True

Correct Answer: True

  Question 46

1 out of 1 points

____ is an example of a discretionary project.

Selected Answer:    Creating a new report for a user

Correct Answer:    Creating a new report for a user

  Question 47

1 out of 1 points

A(n) ____ describes the logic that programmers use to write code modules.

Selected Answer:    process model

Correct Answer:    process model

  Question 48

0 out of 1 points

In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

Selected Answer:    closed-ended questions

Correct Answer:    range-of-response questions

  Question 49

1 out of 1 points

IBM claims that its WebSphere strategy is best for Web-based application development, while Microsoft counters with a broad vision called .NET that redefines that company’s approach to Web-based application

Page 12: CTS-285 Study Guide

development.

Selected Answer: True

Correct Answer: True

  Question 50

1 out of 1 points

Hardware-based security controls include passwords, various levels of user access, and coding data.

Selected Answer: False

Correct Answer: False

  Question 51

1 out of 1 points

A business process describes a specific set of transactions, events, tasks, and results.

Selected Answer: True

Correct Answer: True

  Question 52

1 out of 1 points

A ____, or requirements model, describes the information that a system must provide.

Selected Answer:    business model

Correct Answer:    business model

  Question 53

1 out of 1 points

Compared with traditional methods, the entire RAD process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.

Selected Answer: False

Correct Answer: False

  Question 54

1 out of 1 points

As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.

Selected Answer: True

Correct Answer: True

Page 13: CTS-285 Study Guide

  Question 55

1 out of 1 points

Today, systems development is much more team-oriented than in the past.

Selected Answer: True

Correct Answer: True

  Question 56

1 out of 1 points

Business support systems ____.

Selected Answer:

   provide job-related information support to users at all levels of a company

Correct Answer:

   provide job-related information support to users at all levels of a company

  Question 57

1 out of 1 points

When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

Selected Answer:

   greatest benefit, at the lowest cost, in the shortest period of time

Correct Answer:

   greatest benefit, at the lowest cost, in the shortest period of time

  Question 58

1 out of 1 points

System requirements fall into five general categories: outputs, inputs, processes, performance, and controls.

Selected Answer: True

Correct Answer: True

  Question 59

1 out of 1 points

A SWOT analysis contributes to the strategic planning process by identifying ____ resources.

Selected Answer:    all of the above

Correct Answer:    all of the above

  Question 60

1 out of 1 points

Page 14: CTS-285 Study Guide

Although the business-to-business (B2B) sector is more familiar to retail customers, the volume of business-to-consumer (B2C) transactions is many times greater.

Selected Answer: False

Correct Answer: False

  Question 61

1 out of 1 points

IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

Selected Answer: True

Correct Answer: True

  Question 62

1 out of 1 points

Transaction processing (TP) systems ____.

Selected Answer:

   process data generated by day-to-day business operations

Correct Answer:    process data generated by day-to-day business operations

  Question 63

1 out of 1 points

Traditionally, a company either developed its own information systems, called in-house applications, or purchased systems called software packages from outside vendors.

Selected Answer: True

Correct Answer: True

  Question 64

1 out of 1 points

User productivity systems ____.

Selected Answer:

   include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

Correct Answer:

   include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

Page 15: CTS-285 Study Guide

  Question 65

1 out of 1 points

System analysts use modeling and fact-finding interactively — first they build fact-finding results into models, then they study the models to determine whether additional fact-finding is needed.

Selected Answer: True

Correct Answer: True

  Question 66

1 out of 1 points

In a typical company organizational model, top managers ____.

Selected Answer:

   develop long-range plans, called strategic plans, that define the company’s overall mission and goals

Correct Answer:

   develop long-range plans, called strategic plans, that define the company’s overall mission and goals

  Question 67

1 out of 1 points

Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Selected Answer:    FDD

Correct Answer:    FDD

  Question 68

1 out of 1 points

When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

Selected Answer:    business process reengineering (BPR)

Correct Answer:    business process reengineering (BPR)

  Question 69

1 out of 1 points

Compared with traditional methods, when properly used, JAD can result in all of the following except ____.

Selected Answer:

   less expense and greater manageability if the group is too large

Correct Answer:    less expense and greater manageability if the group is too large

Page 16: CTS-285 Study Guide

  Question 70

1 out of 1 points

In an interview, ____ limit or restrict the response.

Selected Answer:    closed-ended questions

Correct Answer:    closed-ended questions

  Question 71

1 out of 1 points

Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.

Selected Answer: True

Correct Answer: True

  Question 72

1 out of 1 points

A company’s mission statement is unrelated to its major goals, shorter-term objectives, and day-to-day business operations.

Selected Answer: False

Correct Answer: False

  Question 73

1 out of 1 points

Strategic planning looks beyond day-to-day activities and focuses on a horizon that is 3, 5, or even 10 years in the future.

Selected Answer: True

Correct Answer: True

  Question 74

1 out of 1 points

____ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.

Selected Answer:    Interpersonal skills

Correct Answer:    Interpersonal skills

  Question 75

1 out of 1 points

Page 17: CTS-285 Study Guide

Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

Selected Answer:    economic feasibility

Correct Answer:    economic feasibility

  Question 76

1 out of 1 points

____ is a typical example of a system requirement for the process category.

Selected Answer:

   The video rental system must not execute new rental transactions for customers who have overdue tapes

Page 18: CTS-285 Study Guide

Correct Answer:

   The video rental system must not execute new rental transactions for customers who have overdue tapes

  Question 77

1 out of 1 points

Internal and external factors affect every business decision that a company makes, and IT systems are no exception.

Selected Answer: True

Correct Answer: True

  Question 78

1 out of 1 points

Because it is linked to a specific development methodology, systems developers use JAD whenever group input and interaction is not desired.

Selected Answer: False

Correct Answer: False

  Question 79

1 out of 1 points

External factors that affect IT systems projects include all of the following except ____.

Selected Answer:    managers

Correct Answer:    managers

  Question 80

1 out of 1 points

The purpose of a JIT (just-in-time) system is to provide the right product at the right place at the right time.

Selected Answer: True

Correct Answer: True

  Question 81

1 out of 1 points

Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product.

Selected Answer: True

Correct Answer: True

  Question 1 out of 1 points

Page 19: CTS-285 Study Guide

82

____ is a typical example of a system requirement for the control category.

Selected Answer:

   The system must maintain separate levels of security for users and the system administrator

Correct Answer:

   The system must maintain separate levels of security for users and the system administrator

  Question 83

1 out of 1 points

Management leadership and information technology are unconnected, and no significant changes have occurred in either area.

Selected Answer: False

Correct Answer: False

  Question 84

1 out of 1 points

Page 20: CTS-285 Study Guide

Of the measures of feasibility in the accompanying figure, ____ considers points such as “Does the proposed platform have sufficient capacity for future needs?” and “Will the hardware and software environment be reliable?”

Selected Answer:    technical feasibility

Correct Answer:    technical feasibility

  Question 85

1 out of 1 points

____ software controls the flow of data, provides data security, and manages network operations.

Page 21: CTS-285 Study Guide

Selected Answer:    System

Correct Answer:    System

  Question 86

1 out of 1 points

Of the measures of feasibility in the accompanying figure, issues that relate to ____ include “Has management established a firm timetable for the project?” and “Will a project manager be appointed?”

Selected Answer:    schedule feasibility

Correct Answer:    schedule feasibility

  Question 87

1 out of 1 points

When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

Selected Answer:

   Will the proposed system decrease revenue for the company?

Correct Answer:    Will the proposed system decrease revenue for the company?

  Question 88

1 out of 1 points

Because of the limited range of input and interaction among participants, few companies believe that a JAD group produces the best definition of a new system.

Selected Answer: False

Correct Answer: False

  Question 89

1 out of 1 points

Application software manages hardware components, which can include a single workstation or a global network with many thousands of clients.

Selected Answer: False

Correct Answer: False

  Question 90

1 out of 1 points

System software consists of programs that support day-to-day business functions and provide users with the information they require.

Page 22: CTS-285 Study Guide

Selected Answer: False

Correct Answer: False

  Question 91

1 out of 1 points

The success or failure of an information system usually is unrelated to whether users are satisfied with the system’s output and operations.

Selected Answer: False

Correct Answer: False

  Question 92

1 out of 1 points

In an interview, ____ encourage spontaneous and unstructured responses.

Selected Answer:    open-ended questions

Correct Answer:    open-ended questions

  Question 93

1 out of 1 points

A system must have effective controls to ensure that data is secure and accurate.

Selected Answer: True

Correct Answer: True

  Question 94

1 out of 1 points

UML provides various graphical tools, such as use case diagrams and sequence diagrams.

Selected Answer: True

Correct Answer: True

  Question 95

1 out of 1 points

Service-oriented companies manufacture and sell products such as computers, routers, or microchips.

Selected Answer: False

Correct Answer: False

  Question 96

1 out of 1 points

Systems development typically starts with a ____.

Page 23: CTS-285 Study Guide

Selected Answer:

   systems request, followed by a preliminary investigation, which includes a feasibility study

Correct Answer:

   systems request, followed by a preliminary investigation, which includes a feasibility study

  Question 97

1 out of 1 points

A strong business case suggests that a company should pursue other options, above the alternative, because it would be in the firm’s best interest to do so.

Selected Answer: False

Correct Answer: False

  Question 98

1 out of 1 points

Much of the time a systems analyst spends talking with people is spent conducting ____, which is/are the most common fact-finding technique.

Selected Answer:    interviews

Correct Answer:    interviews

  Question 99

1 out of 1 points

Data entry controls should be excessive without being effective.

Selected Answer: False

Correct Answer: False

  Question 100 1 out of 1 points

RAD relies heavily on prototyping and user involvement.

Selected Answer: True

Correct Answer: True

 Question 1 1 out of 1 points

When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

Correct Answer:    fixed fee model

  Question 2

1 out of 1 points

Page 24: CTS-285 Study Guide

The Software & Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of ____ is redefining the way that companies develop and deploy their information systems.

Correct Answer:

   software as a service

  Question 3

1 out of 1 points

In a DFD, the Gane and Sarson symbol for an entity is a ____.

Correct Answer:

   rectangle, which may be shaded to make it look three-dimensional

  Question 4

1 out of 1 points

Another term for IBS is managed hosting, because the operation is managed by the outside firm, or host.

Correct Answer:

True

  Question 5

1 out of 1 points

A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

Correct Answer:

   request for proposal (RFP)

  Question 6

1 out of 1 points

All of the following are true of Web-based development except ____.

Correct Answer:

   Internet-based development treats the Web as a communication channel, rather than as the platform

  Question 7

1 out of 1 points

An object treats data and processes separately.

Page 25: CTS-285 Study Guide

Correct Answer: False

  Question 8

1 out of 1 points

In a DFD, the Gane and Sarson symbol for a process is a ____.

Correct Answer:

   rectangle with rounded corners

  Question 9

1 out of 1 points

A gray hole process is a process that has ____.

Correct Answer:

   at least one input and one output, but the input obviously is too insufficient to generate the output shown

  Question 10

1 out of 1 points

All of the following are true of a traditional systems development environment except ____.

Correct Answer:

   scalability is not affected by telecommunications limitations and local networks

  Question 11

1 out of 1 points

When DFDs are drawn, each of the following conventions should be followed except ____.

Correct Answer:    use the same names within each set of symbols

  Question 12

1 out of 1 points

Which of the following is NOT an attribute of a car?

Correct Answer:

   parking

  Question 13

1 out of 1 points

Two Web-based development environments are IBM’s WebSphere and Microsoft’s .NET.

Page 26: CTS-285 Study Guide

Correct Answer:

True

  Question 14

1 out of 1 points

Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

Correct Answer:    read-only properties

  Question 15

1 out of 1 points

Building an application in a Web-based environment might involve different risks and benefits, compared to a traditional environment.

Correct Answer:

True

  Question 16

1 out of 1 points

Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

Correct Answer:

   exploded view

  Question 17

1 out of 1 points

____ is a widely used method of visualizing and documenting an information system.

Correct Answer:

   UML

  Question 18

1 out of 1 points

A logical model describes how a system will be constructed.

Correct Answer: False

  Question 19

1 out of 1 points

Page 27: CTS-285 Study Guide

In a DFD, a process symbol can have only one outgoing data flow.

Correct Answer: False

  Question 20

1 out of 1 points

In a DFD, a data flow must have a process symbol on at least one end.

Correct Answer:

True

  Question 21

1 out of 1 points

Typically, customers purchase licenses that give them the right to use the software under the terms of the license agreement.

Correct Answer:

True

  Question 22

1 out of 1 points

When companies use a ____, they already know the specific products or service they want and need to obtain price quotations or bids from vendors.

Correct Answer:

   request for quotation (RFQ)

  Question 23

1 out of 1 points

Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.

Correct Answer: False

  Question 24

1 out of 1 points

A gas pump is an example of a black box.

Page 28: CTS-285 Study Guide

Correct Answer:

True

  Question 25

1 out of 1 points

An IBS (Internet business services) solution is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.

Correct Answer:

True

  Question 26

1 out of 1 points

Your car performs a(n) ____ called operate wipers when you send a message by moving the proper control.

Correct Answer:    method

  Question 27

1 out of 1 points

A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.

Correct Answer:

True

  Question 28

1 out of 1 points

A black hole process is a process that has ____.

Correct Answer:    no output

  Question 29

1 out of 1 points

In a use case, an external entity is called a(n) ____.

Correct Answer:    actor

  Question 1 out of 1 points

Page 29: CTS-285 Study Guide

30

Leveling ____.

Correct Answer:

   uses a series of increasingly detailed DFDs to describe an information system

  Question 31

1 out of 1 points

In a DFD, the Gane and Sarson symbol for a data store is a ____.

Correct Answer:

   flat rectangle that is open on the right side and closed on the left side

  Question 32

1 out of 1 points

Several years ago, Gartner, a leading IT research and consulting firm, accurately forecast the enormous growth of offshore outsourcing.

Correct Answer:

True

  Question 33

1 out of 1 points

A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects.

Correct Answer:

True

  Question 34

1 out of 1 points

An auto parts store inventory ____ might include part number, description, supplier code, minimum and maximum stock levels, cost, and list price.

Correct Answer:    record

  Question 35

1 out of 1 points

All of the following are true of Web-based development except ____.

Correct    Web-based software treats the software as a service that is

Page 30: CTS-285 Study Guide

Answer: more dependent on desktop computing powers and resources

  Question 36

1 out of 1 points

Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable, business solution that fits the company’s long-term business strategy.

Correct Answer:

True

  Question 37

0 out of 1 points

Many valuable reports can be obtained from a data dictionary, including a(n) ____.

Correct Answer:

   all of the above

  Question 38

1 out of 1 points

In a DFD, the Gane and Sarson symbol for a data flow is a ____.

Correct Answer:    line with a single or double arrowhead

  Question 39

1 out of 1 points

Microsoft’s ____ is one of the major Web-based development environments.

Correct Answer:    .NET

  Question 40

1 out of 1 points

A data flow in a DFD represents one or more data items.

Correct Answer:

True

  Question 41

1 out of 1 points

Page 31: CTS-285 Study Guide

The number of attributes needed to describe an object depends on the business requirements of the information system and its users.

Correct Answer:

True

  Question 42

1 out of 1 points

An object’s ____ are the tasks or functions the object performs.

Correct Answer:

   methods

  Question 43

1 out of 1 points

A major advantage of outsourcing is that it eliminates employee concerns about job security.

Correct Answer: False

  Question 44

1 out of 1 points

The UML symbol for a use case is a(n) ____ with a label that describes the action or event.

Correct Answer:

   oval

  Question 45

1 out of 1 points

Using Gane and Sarson symbols, a DFD represents processes as circles.

Correct Answer: False

  Question 46

1 out of 1 points

A black box does not want or need outside interference.

Page 32: CTS-285 Study Guide

Correct Answer:

True

  Question 47

1 out of 1 points

The Software & Information Industry Association (SIIA) believes that the acquisition of software as a service rather than a product will have a major impact on the software industry.

Correct Answer:

True

  Question 48

1 out of 1 points

Two data stores can be connected by a data flow without an intervening process.

Correct Answer: False

  Question 49

1 out of 1 points

Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

Correct Answer: False

  Question 50

1 out of 1 points

A class can belong to a more general category called a subclass.

Correct Answer: False

  Question 51

1 out of 1 points

The concept that a message gives different meanings to different objects is called encapsulation.

Correct Answer: False

Page 33: CTS-285 Study Guide

  Question 52

1 out of 1 points

Oracle Corporation offers a service called ____, which provides E-business applications on a fixed fee basis.

Correct Answer:    Oracle On Demand

  Question 53

1 out of 1 points

Balancing ____.

Correct Answer:

   ensures that the input and output data flows of the parent DFD are maintained on the child DFD

  Question 54

1 out of 1 points

In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

Correct Answer:    logical

  Question 55

1 out of 1 points

The UML represents an object as a(n) ____ with the object name at the top, followed by the object’s attributes and methods.

Correct Answer:

   rectangle

  Question 56

1 out of 1 points

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

Correct Answer:    subscription model

  Question 57

1 out of 1 points

All relationships have equal weight; none is stronger than any other.

Correct Answer: False

  Question 0 out of 1 points

Page 34: CTS-285 Study Guide

58

A method is like a blueprint, or template, for all the objects within a class.

Correct Answer: False

  Question 59

1 out of 1 points

A DFD shows the structure and detailed contents of a data flow.

Correct Answer: False

  Question 60

1 out of 1 points

In a traditional systems development environment, security issues usually are less complex than with Web-based systems, because the system operates on a private telecommunications network, rather than the Internet.

Correct Answer:

True

  Question 61

1 out of 1 points

System analysts define an object’s attributes during the systems design process.

Correct Answer:

True

  Question 62

1 out of 1 points

An ASP provides a license to use the software, and nothing more.

Correct Answer: False

  Question 63

1 out of 1 points

A(n) ____ defines specific tasks that an object can perform.

Page 35: CTS-285 Study Guide

Correct Answer:    method

  Question 64

0 out of 1 points

The same message to two different objects produces the same results.

Correct Answer: False

  Question 65

1 out of 1 points

A software package developed to handle information requirements for a specific type of business is called a horizontal application.

Correct Answer: False

  Question 66

1 out of 1 points

Spontaneous generation, black holes, and gray holes are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.

Correct Answer:

True

  Question 67

1 out of 1 points

A use case ____ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.

Correct Answer:    description

  Question 68

1 out of 1 points

Data flows are shown in a context diagram because data stores are external to the system.

Page 36: CTS-285 Study Guide

Correct Answer: False

  Question 69

1 out of 1 points

A software package that can be used by many different types of organizations is called a vertical application.

Correct Answer: False

  Question 70

1 out of 1 points

Internet-based development treats the Web as just a communications channel, rather than as a platform.

Correct Answer: False

  Question 71

1 out of 1 points

A DFD does not show the external entities that provide data to the system or receive output from the system.

Correct Answer: False

  Question 72

1 out of 1 points

The ____ uses a set of symbols to represent graphically the various components and relationships within a system.

Correct Answer:

   UML

  Question 73

1 out of 1 points

Late in the systems design phase, you build a logical model that describes how a system will be constructed.

Page 37: CTS-285 Study Guide

Correct Answer: False

  Question 74

1 out of 1 points

The main reason for offshore outsourcing is the same as domestic outsourcing: lower bottom-line costs.

Correct Answer:

True

  Question 75

1 out of 1 points

By limiting access to internal processes, an object prevents its internal code from being altered by another object or process.

Correct Answer:

True

  Question 76

1 out of 1 points

Systems analysts call an entity that supplies data to the system a sink, and an entity that receives data from the system a source.

Correct Answer: False

  Question 77

1 out of 1 points

Typically, companies choose in-house software development for all of the following reasons except to ____.

Correct Answer:

   obtain input from other companies who already have implemented the software

  Question 78

1 out of 1 points

Which of the following is not a path that development can follow?

Correct Answer:

   construct a legacy system

  Question 1 out of 1 points

Page 38: CTS-285 Study Guide

79

DFD symbols are referenced by using all ____ letters for the symbol name.

Correct Answer:    capital

  Question 80

1 out of 1 points

The data dictionary usually records and describes a default value, which is the ____.

Correct Answer:

   value for the data element if a value otherwise is not entered for it

  Question 81

1 out of 1 points

Leveling also is called ____.

Correct Answer:

   all of the above

  Question 82

1 out of 1 points

The line from the actor to a use case is called a(n) ____.

Correct Answer:    association

  Question 83

1 out of 1 points

If objects are similar to adjectives that describe the characteristics of an object, attributes are similar to nouns.

Correct Answer: False

  Question 84

1 out of 1 points

Customer objects can perform specific tasks, such as placing an order, or paying a bill.

Correct Answer:

True

  Question 1 out of 1 points

Page 39: CTS-285 Study Guide

85

A DFD does not show the detailed contents of a data store — the specific structure and data elements are defined in the data dictionary.

Correct Answer:

True

  Question 86

1 out of 1 points

A use case ____ is a visual summary of several related use cases within a system or subsystem.

Correct Answer:    diagram

  Question 87

0 out of 1 points

Advantages of purchasing a software package over developing software in-house include all of the following except ____.

Correct Answer:

   satisfaction of unique business requirements

  Question 88

1 out of 1 points

Inheritance enables an object to derive one or more of its attributes from a(n) ____.

Correct Answer:

   parent

  Question 89

0 out of 1 points

Buyers can customize a software package by ____.

Correct Answer:

   all of the above

  Question 90

1 out of 1 points

Your red Mustang is a(n) ____ of the CAR class.

Correct Answer:    instance

Page 40: CTS-285 Study Guide

  Question 91

1 out of 1 points

Objects can have a specific attribute called a(n) ____, which describes the object’s current status.

Correct Answer:

   state

  Question 92

1 out of 1 points

A physical model shows what the system must do, regardless of how it will be implemented.

Correct Answer: False

  Question 93

1 out of 1 points

In a DFD, processes contain the business logic, also called business rules, that transform the data and produce the required results.

Correct Answer:

True

  Question 94

1 out of 1 points

Outsourcing can refer to ____.

Correct Answer:

   all of the above

  Question 95

1 out of 1 points

A data flow diagram (DFD) shows how the system transforms input data into useful information.

Correct Answer:

True

  Question 96

1 out of 1 points

Page 41: CTS-285 Study Guide

When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____.

Correct Answer:

   rectangle

  Question 97

1 out of 1 points

Some objects might have a few attributes; others might have dozens.

Correct Answer:

True

  Question 98

1 out of 1 points

A set of DFDs provides a logical model that shows how the system works, not what the system does.

Correct Answer: False

  Question 99

0 out of 1 points

A spontaneous generation process is a process that has ____.

Correct Answer:

   no input

  Question 100

1 out of 1 points

An object has certain ____.

Correct Answer:    attributes

Question 1

1 out of 1 points

Problems found with 1NF (first normal form) design that do not exist in 2NF (second normal form) include all of the following except ____.

Correct Answer:    1NF tables always contain consistent data

Page 42: CTS-285 Study Guide

  Question 2

1 out of 1 points

When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.

Correct Answer:    greater initial investment but provides more flexibility

  Question 3

1 out of 1 points

An existence check is a data validation check that ____.

Correct Answer:

   is used for mandatory data items

  Question 4

1 out of 1 points

Exception reports are useful when the user needs to know the details, but does not want information only on records that might require action.

Correct Answer: False

  Question 5

0 out of 1 points

In a typical file processing environment, ____ problems can occur if updates are not applied in every file.

Correct Answer:

   data integrity

  Question 6

1 out of 1 points

In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.

Correct Answer: False

  Question 7

1 out of 1 points

A combination check is a data validation check that ____.

Page 43: CTS-285 Study Guide

Correct Answer:

   is performed on two or more fields to ensure that they are consistent or reasonable when considered together

  Question 8

1 out of 1 points

In a detail report, each line of output printed is called a detail line.

Correct Answer:

True

  Question 9

1 out of 1 points

Web pages are stored on a Web server, which is a computer that receives requests and makes Web pages available to users.

Correct Answer:

True

  Question 10

1 out of 1 points

Online processing systems typically have all of the following characteristics except ____.

Correct Answer:

   the system requires significantly fewer network resources than batch systems

  Question 11

1 out of 1 points

A ____ is a text document written in HTML.

Correct Answer:

   Web page

  Question 12

0 out of 1 points

A table is in first normal form (1NF) if it contains a repeating group.

Correct Answer: False

  Question 1 out of 1 points

Page 44: CTS-285 Study Guide

13

Relational databases are poorly suited to client/server computing because they are so powerless and rigid.

Correct Answer: False

  Question 14

1 out of 1 points

____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

Correct Answer:

   Scalability

  Question 15

1 out of 1 points

Today, client/server architecture is the dominant form of systems design, using Internet protocols and traditional network models.

Correct Answer:

True

  Question 16

1 out of 1 points

A disadvantage of server-based processing is that character-based terminals typically are used, which provide a limited interface for users.

Correct Answer:

True

  Question 17

1 out of 1 points

In a file-oriented information system, a security file ____.

Correct Answer:    is created and saved for backup and recovery purposes

  Question 18

1 out of 1 points

In the OSI (open system interconnection) model, the application layer ____.

Page 45: CTS-285 Study Guide

Correct Answer:

   provides network services requested by a local workstation

  Question 19

1 out of 1 points

To design data entry screens that are easy to learn and use, employ all of the following guidelines except ____.

Correct Answer:

   require users to type leading zeroes for numeric fields

  Question 20

1 out of 1 points

Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.

Correct Answer: False

  Question 21

1 out of 1 points

A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.

Correct Answer:

True

  Question 22

1 out of 1 points

A batch processing system has all of the following characteristics except ____.

Correct Answer:

   the information system is available whenever necessary to support business operations

  Question 23

1 out of 1 points

In contrast to a centralized system, a client/server design separates applications and data.

Correct Answer:

True

Page 46: CTS-285 Study Guide

  Question 24

1 out of 1 points

Impact printers can use multi-part forms to produce more than one copy, which is an advantage to firms that require several copies of the same report.

Correct Answer:

True

  Question 25

1 out of 1 points

In a client/server design, a database server ____.

Correct Answer:    processes individual SQL commands

  Question 26

1 out of 1 points

In a Web-based database design, the Internet serves as the front end, or interface, for the database management system.

Correct Answer:

True

  Question 27

1 out of 1 points

In the OSI (open system interconnection) model, the presentation layer ____.

Correct Answer:

   assures that data is uniformly structured and formatted for network transmission

  Question 28

1 out of 1 points

Podcasts are especially important for legal reasons, or where it is necessary to display a signature, date stamp, or other visual features of a document.

Correct Answer: False

  Question 29

1 out of 1 points

In a file-oriented information system, a transaction file ____.

Page 47: CTS-285 Study Guide

Correct Answer:

   stores records that contain day-to-day business and operational data

  Question 30

1 out of 1 points

A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

Correct Answer:    query language

  Question 31

1 out of 1 points

For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate.

Correct Answer:

   summary report

  Question 32

1 out of 1 points

In a file-oriented information system, a history file contains reference data used by the information system.

Correct Answer: False

  Question 33

1 out of 1 points

An entity is a person, place, thing, or event for which data is collected and maintained.

Correct Answer:

True

  Question 34

1 out of 1 points

A client is a computer that supplies data, processing services, or other support to one or more computers, called servers.

Correct Answer: False

Page 48: CTS-285 Study Guide

  Question 35

1 out of 1 points

The Internet has had little impact on system architecture.

Correct Answer: False

  Question 36

1 out of 1 points

In e-commerce, data mining works best when a goal is to reduce clicks to close, which means average page views to accomplish a purchase or obtain desired information.

Correct Answer:

True

  Question 37

1 out of 1 points

According to a usability expert at IBM, a computer user has the right to ____.

Correct Answer:

   all of the above

  Question 38

1 out of 1 points

A reasonableness check is a data validation check that ____.

Correct Answer:

   identifies values that are questionable, but not necessarily wrong

  Question 39

1 out of 1 points

A range check is a data validation check that ____.

Correct Answer:

   tests data items to verify that they fall between a specified minimum and maximum value

  Question 40

1 out of 1 points

A system design where the server performs all the processing is described as ____.

Page 49: CTS-285 Study Guide

Correct Answer:    mainframe architecture

  Question 41

1 out of 1 points

In a typical LAN, clients share data stored on a local server that supports a group of users or a department.

Correct Answer:

True

  Question 42

1 out of 1 points

Intranets and extranets are called Web-centric because they use different protocols, or data transmission standards, than the Internet.

Correct Answer: False

  Question 43

1 out of 1 points

In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.

Correct Answer:

   centralized

  Question 44

1 out of 1 points

One problem in a file processing environment is ____, which means that data common to two or more information systems is stored in several places.

Correct Answer:

   data redundancy

  Question 45

1 out of 1 points

Interface design should call attention to the interface, rather than facilitating design objectives.

Correct Answer: False

Page 50: CTS-285 Study Guide

  Question 46

1 out of 1 points

In today’s interconnected world, output from one system often becomes input into another system.

Correct Answer:

True

  Question 47

1 out of 1 points

When using Microsoft Office, documents, spreadsheets, and databases can be stored in Unicode-compatible form by using the font called ____.

Correct Answer:

   Arial Unicode MS

  Question 48

1 out of 1 points

Good interface design is based partly on ____, which focuses on how an interface can be made attractive and easy to use.

Correct Answer:    aesthetics

  Question 49

1 out of 1 points

A subschema is a view of a database used by one or more systems or users.

Correct Answer:

True

  Question 50

1 out of 1 points

Good user interface design is based partly on ____, which describes how people work, learn, and interact with computers.

Correct Answer:    ergonomics

  Question 51

1 out of 1 points

____ describes how instances of one entity relate to instances of another entity.

Page 51: CTS-285 Study Guide

Correct Answer:    Cardinality

  Question 52

1 out of 1 points

____ protects privacy rights and shields an organization’s proprietary data from theft or unauthorized access.

Correct Answer:

   Output security

  Question 53

1 out of 1 points

____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Correct Answer:

   Scalability

  Question 54

1 out of 1 points

Centering headings over maximum field widths is ideal when many of the actual values are shorter than the maximum width.

Correct Answer: False

  Question 55

1 out of 1 points

Middleware provides a transparent interface that enables system designers to integrate dissimilar software and hardware.

Correct Answer:

True

  Question 56

1 out of 1 points

The speed of laser printers is rated in ____, which can be used to estimate the time required to print a report.

Correct Answer:

   ppm (pages per minute)

  Question 0 out of 1 points

Page 52: CTS-285 Study Guide

57

As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.

Correct Answer: False

  Question 58

1 out of 1 points

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

Correct Answer: False

  Question 59

1 out of 1 points

On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms.

Correct Answer:

   control zone

  Question 60

1 out of 1 points

Compared to file server designs, client/server systems ____.

Correct Answer:    reduce network loads and improve response times

  Question 61

1 out of 1 points

A report footer, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.

Correct Answer:

True

  Question 62

1 out of 1 points

In a typical client/server system, the client stores the data and provides data access and database management functions.

Page 53: CTS-285 Study Guide

Correct Answer: False

  Question 63

1 out of 1 points

Apart from backup and recovery procedures necessary to sustain business operations ____ laws and regulations apply to company data.

Correct Answer:    file retention

  Question 64

1 out of 1 points

When considering physical design, a systems analyst must determine how a new application will communicate with existing legacy systems.

Correct Answer:

True

  Question 65

1 out of 1 points

After a report design is approved, the design should be documented in a ____, which contains information about the fields, data types and lengths, report frequency and distribution, and other comments.

Correct Answer:    report analysis form

  Question 66

1 out of 1 points

A fat client, also called a thick client, design locates all or most of the processing logic at the server.

Correct Answer: False

  Question 67

1 out of 1 points

Visio is an example of a CASE tool that can help users plan, analyze, design, and implement an information system.

Page 54: CTS-285 Study Guide

Correct Answer:

True

  Question 68

1 out of 1 points

A(n) ____ produces one or more lines of output for each record processed.

Correct Answer:

   detail report

  Question 69

1 out of 1 points

In a file-oriented information system, a work file ____.

Correct Answer:

   is a temporary file created by an information system for a single task

  Question 70

1 out of 1 points

The type of output and the technology needed usually is decided during the systems analysis phase, based on user requirements.

Correct Answer:

True

  Question 71

1 out of 1 points

A database system stores and manages data in separate files using a method called file processing.

Correct Answer: False

  Question 72

1 out of 1 points

When designing a report, a sample report, which is a ____, or prototype, should be prepared for users to review.

Correct Answer:    mock-up

  Question 73

1 out of 1 points

Page 55: CTS-285 Study Guide

A(n) ____ displays only those records that meet a specific condition or conditions.

Correct Answer:

   exception report

  Question 74

1 out of 1 points

In the OSI (open system interconnection) model, the session layer ____.

Correct Answer:

   defines control structures that manage the communications link between computers

  Question 75

0 out of 1 points

Either a page header or a page footer, which appears at the bottom of a page, is used to display the name of the report and a page number.

Correct Answer:

True

  Question 76

1 out of 1 points

A fat client design is ____ to develop than a thin client design, because the architecture resembles traditional file-server designs where all processing is performed at the client.

Correct Answer:

   simpler and less expensive

  Question 77

1 out of 1 points

A three-tier design includes a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.

Correct Answer:

True

  Question 78

1 out of 1 points

Page 56: CTS-285 Study Guide

The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

Correct Answer:    System Environment

  Question 79

1 out of 1 points

When a system produces multiple reports, each report should have completely different design elements.

Correct Answer: False

  Question 80

1 out of 1 points

In a report, a group header can be printed after the last detail line in a group and a group footer above the first detail line.

Correct Answer: False

  Question 81

1 out of 1 points

In a file-oriented information system, a master file ____.

Correct Answer:    stores relatively permanent data about an entity

  Question 82

1 out of 1 points

A report header, which appears at the beginning of a report, identifies the report, and contains the report title, date, and other necessary information.

Correct Answer:

True

  Question 83

1 out of 1 points

In a client/server design, tasks are divided between servers, which are workstations that users interact with, and clients, which are computers that supply data, processing, and services to the server workstations.

Page 57: CTS-285 Study Guide

Correct Answer: False

  Question 84

1 out of 1 points

When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.

Correct Answer:

   buffer

  Question 85

1 out of 1 points

An extranet is a private, company-owned network to provide Web-based access to users.

Correct Answer: False

  Question 86

1 out of 1 points

Specific DBMS (database management system) advantages include all of the following except ____.

Correct Answer:    data dependence

  Question 87

1 out of 1 points

Although stand-alone PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, stand-alone computing was inefficient and expensive.

Correct Answer:

True

  Question 88

0 out of 1 points

Physical storage refers to information as seen through a user’s eyes, regardless of how or where the information actually is organized or stored.

Page 58: CTS-285 Study Guide

Correct Answer: False

  Question 89

1 out of 1 points

Using a DDBMS (distributed database management system) offers all of the following advantages except ____.

Correct Answer:

   the architecture of the system is simple and easy to manage

  Question 90

1 out of 1 points

File sharing designs are efficient only if the number of networked users is ____.

Correct Answer:    low and the transmitted file sizes are relatively small

  Question 91

1 out of 1 points

Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.

Correct Answer:

   storyboard

  Question 92

1 out of 1 points

HTML uses formatting codes called ____, which specify how the text and visual elements on a Web page will be displayed in a Web browser.

Correct Answer:

   tags

  Question 93

1 out of 1 points

A Web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.

Correct Answer: False

  Question 94

1 out of 1 points

A dialog box allows a user to enter information about a task that the system will perform.

Page 59: CTS-285 Study Guide

Correct Answer:

True

  Question 95

1 out of 1 points

In a client/server interaction, the client submits a request for information from the server, which carries out the operations and responds to the client.

Correct Answer:

True

  Question 96

1 out of 1 points

Every information system involves ____.

Correct Answer:

   all of the above

  Question 97

1 out of 1 points

Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems.

Correct Answer:

True

  Question 98

1 out of 1 points

User-selected Help always offers assistance for the task in progress.

Correct Answer: False

  Question 99

1 out of 1 points

In most organizations, the IT department is responsible for output control and security measures.

Page 60: CTS-285 Study Guide

Correct Answer:

True

  Question 100

1 out of 1 points

In older systems, often the user interface mainly consisted of process-control screens that allowed a user to send commands to the system.

Correct Answer:

True

Exam 1 - Chapters 1 -2

1. ____ software controls the flow of data, provides data security, and manages network operations.

A) Enterprise

B) System

C) Application

D) Legacy Points Earned: 1.0/1.0

2. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

A) enterprise applications

B) network operating systems (NOS)

C) operating applications

D) legacy systems Points Earned: 1.0/1.0

3. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

Page 61: CTS-285 Study Guide

A) 2 months

B) 12 months

C) 24 months

D) 48 months Points Earned: 1.0/1.0

4. When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

A) electronic data interchange (EDI)

B) joint application development (JAD)

C) business process reengineering (BPR)

D) rapid application development (RAD) Points Earned: 1.0/1.0

5. Systems analysts use a process called ____ to represent a company’s operations and information needs.

A) JAD

B) Scrum

C) RAD

D) business process modeling Points Earned: 1.0/1.0

6. A

A) matrix

B) profile

C) index

D) glossary Points Earned: 1.0/1.0

7. ____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.

Page 62: CTS-285 Study Guide

A) EDI

B) ACH

C) TCH

D) O-O Points Earned: 1.0/1.0

8. Transaction processing (TP) systems ____.

A) provide job-related information to users at all levels of a company

B) simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

C) process data generated by day-to-day business operations

D) include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access Points Earned: 1.0/1.0

9. Business support systems ____.

A) provide job-related information support to users at all levels of a company

B) simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

C) process data generated by day-to-day business operations

D) include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access Points Earned: 1.0/1.0

10. User productivity systems ____.

A) provide job-related information to users at all levels of a company

B) simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

C) process data generated by day-to-day business operations

D) include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access Points Earned: 0.0/1.0

Page 63: CTS-285 Study Guide

11. In a typical company organizational model, top managers ____.

A) develop long-range plans, called strategic plans, which define the company’s overall mission and goals

B) provide direction, necessary resources, and performance feedback to supervisors and team leaders

C) oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people

D) include users who rely on TP systems to enter and receive the data they need to perform their jobs Points Earned: 1.0/1.0

12. A ____, or requirements model, describes the information that a system must provide.

A) process model

B) data model

C) business model

D) network model Points Earned: 1.0/1.0

13. ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

A) Prototyping

B) Rapid application development

C) Scrum

D) Modeling Points Earned: 1.0/1.0

14. ____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.

A) Scrum

B) Prototyping

C) Modeling

D) Rapid application development Points Earned: 1.0/1.0

Page 64: CTS-285 Study Guide

15. ____ methods include the latest trends in software development.

A) Object-oriented analysis

B) Agile/Adaptive

C) Structured analysis

D) Rapid application development Points Earned: 1.0/1.0

16. The ____ method of developing systems produces code that is modular and reusable.

A) object-oriented analysis

B) adaptive

C) structured analysis

D) rapid application development Points Earned: 1.0/1.0

17. The ____ method of developing systems stresses team interaction and reflects a set of community-based values.

A) object-oriented analysis

B) adaptive

C) structured analysis

D) rapid application development Points Earned: 1.0/1.0

18. Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

A) O-O

B) SDLC

C) MSF

D) RUP Points Earned: 1.0/1.0

Page 65: CTS-285 Study Guide

19. Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

A) iterative

B) process-centered

C) inferred

D) empowered Points Earned: 1.0/1.0

20.

Page 66: CTS-285 Study Guide
Page 67: CTS-285 Study Guide

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of

A) interactive model

B) requirements model

C) waterfall model

D) object model Points Earned: 1.0/1.0

21.

Page 68: CTS-285 Study Guide
Page 69: CTS-285 Study Guide

In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a blueprint that

A) systems implementation phase

B) systems planning phase

C) systems analysis phase

D) systems design phase Points Earned: 1.0/1.0

22.

Page 70: CTS-285 Study Guide
Page 71: CTS-285 Study Guide

A) systems planning

B) systems support and security

C) systems design

D) systems implementation Points Earned: 1.0/1.0

23.

Page 72: CTS-285 Study Guide
Page 73: CTS-285 Study Guide

In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and

A) systems support and security

B) systems implementation

C) systems analysis

D) systems planning Points Earned: 1.0/1.0

24. In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

A) property

B) class

C) message

D) instance Points Earned: 1.0/1.0

25. In object-oriented design, built-in processes called ____ can change an object’s properties.

A) methods

B) functions

C) attributes

D) features Points Earned: 1.0/1.0

26. When building an information system, all of the following basic guidelines should be considered except ____.

A) stick to an overall development plan

B) identify major milestones for project review and assessment

C) provide accurate and reliable cost and benefit information

D) ensure that users are not involved in the development process Points Earned: 1.0/1.0

27. ____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.

Page 74: CTS-285 Study Guide

A) User support

B) Database administration

C) Systems support and security

D) Network administration Points Earned: 1.0/1.0

28. Systems development typically starts with a ____.

A) feasibility study, followed by a systems request, which includes a preliminary investigation

B) systems request, followed by a preliminary investigation, which includes a feasibility study

C) preliminary investigation, followed by a feasibility study, which includes a systems request

D) feasibility study, followed by a preliminary investigation, which includes a systems request Points Earned: 0.0/1.0

29. During strategic planning, top managers ask a series of questions that is called a(n) ____ analysis because it examines a company’s strengths, weaknesses, opportunities, and threats.

A) CRM

B) TCO

C) JIT

D) SWOT Points Earned: 1.0/1.0

30. Strategic planning looks beyond day-to-day activities and focuses on a horizon that is ____ years in the future.

A) 3

B) 5

C) 10

D) any of the above Points Earned: 1.0/1.0

31. Hardware-based security controls include ____

Page 75: CTS-285 Study Guide

A) passwords

B) various levels of user access

C) coding data

D) none of the above Points Earned: 1.0/1.0

32. Electronic data interchange (EDI) enables ____ inventory systems, which rely on computer-to-computer data exchange to minimize unnecessary inventory.

A) CRM

B) TCO

C) JIT

D) RFID Points Earned: 1.0/1.0

33. When a systems request form is received, a systems analyst or IT manager examines it to determine what IT resources (including ____) are required for the preliminary investigation.

A) staff

B) time

C) budget funding

D) either a or b Points Earned: 1.0/1.0

34.

Page 76: CTS-285 Study Guide

Of the measures of feasibility in the accompanying figure, ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”

A) schedule feasibility

B) technical feasibility

C) economic feasibility

D) operational feasibility Points Earned: 1.0/1.0

Page 77: CTS-285 Study Guide

35.

Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

A) schedule feasibility

B) technical feasibility

C) economic feasibility

D) operational feasibility

Page 78: CTS-285 Study Guide

Points Earned: 1.0/1.0

36.

Of the measures of feasibility in the accompanying figure, issues that relate to ____ include “Has management established a firm timetable for the project?” and “Will a project manager be appointed?”

A) schedule feasibility

B) technical feasibility

Page 79: CTS-285 Study Guide

C) economic feasibility

D) operational feasibility Points Earned: 1.0/1.0

37. A feasibility study includes tests for ____ feasibility, which means that a proposed system will be used effectively after it has been developed.

A) operational

B) technical

C) schedule

D) economic Points Earned: 1.0/1.0

38. A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs.

A) economic

B) schedule

C) operational

D) technical Points Earned: 1.0/1.0

39. Examples of intangible benefits include all of the following except a(n) ____.

A) user-friendly system that improves employee job satisfaction

B) sales tracking system that supplies better information for marketing decisions

C) new Web site that enhances the company’s image

D) online package tracking system that decreases the need for clerical staff Points Earned: 1.0/1.0

40. When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

A) least benefit, at the highest cost, in the longest period of time

B) least benefit, at the lowest cost, in the longest period of time

Page 80: CTS-285 Study Guide

C) greatest benefit, at the highest cost, in the shortest period of time

D) greatest benefit, at the lowest cost, in the shortest period of time Points Earned: 1.0/1.0

41. Projects where management has a choice in implementing them are called ____ projects.

A) discretionary

B) nondiscretionary

C) appended

D) concatenated Points Earned: 1.0/1.0

42. A systems analyst conducts a(n) ____ investigation to study the systems request and recommend specific action.

A) preliminary

B) appendix

C) systems

D) transitional Points Earned: 1.0/1.0

43. When using a ____ diagram to investigate causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.

A) wishbone

B) fishbone

C) jawbone

D) crossbones Points Earned: 1.0/1.0

44. To avoid the problem of project creep, ____.

A) define project scope as vaguely as possible

B) leave project scope undefined

Page 81: CTS-285 Study Guide

C) define project scope as clearly as possible

D) expand the focus beyond the problem at hand Points Earned: 1.0/1.0

45. Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called project ____.

A) dilation

B) creep

C) expansion

D) drift Points Earned: 1.0/1.0

46. The primary method of obtaining information during the preliminary investigation is to ____.

A) analyze organization charts

B) conduct interviews

C) review documentation

D) observe operations Points Earned: 0.0/1.0

47. In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview.

A) determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview

B) establish objectives for the interview, develop interview questions, prepare for the interview, determine the people to interview

C) develop interview questions, prepare for the interview, determine the people to interview, establish objectives for the interview

D) prepare for the interview, determine the people to interview, establish objectives for the interview, develop interview questions Points Earned: 1.0/1.0

48. A survey is ____, generally takes less time, and can involve a broad cross-section of people.

Page 82: CTS-285 Study Guide

A) more flexible than a series of interviews, and it is less expensive

B) more flexible than a series of interviews, but it is more expensive

C) not as flexible as a series of interviews, but it is less expensive

D) not as flexible as a series of interviews, and it is more expensive Points Earned: 1.0/1.0

49. A systems analyst should provide ____ so managers can understand the full cost impact and timetable.

A) time figures for the next development phase

B) cost figures for the next development phase

C) an estimate for the overall project

D) all of the above Points Earned: 1.0/1.0

50. In the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project’s scope, constraints, and feasibility.

A) appendix

B) introduction

C) case for action

D) findings

Chapter 1 – Introduction to Systems Analysis and Design

MULTIPLE CHOICE

1. In launching a new information system, the greatest risk occurs when a company ____.a. begins by outlining its business models and identifying possible IT solutionsb. tries to decide how the system will be implemented before determining what the system is

supposed to doc. considers implementation options after having a clear set of objectivesd. all of the above

ANS: B PTS: 1 REF: 5

2. ____ software controls the flow of data, provides data security, and manages network operations.a. Enterprise c. Applicationb. System d. Legacy

ANS: B PTS: 1 REF: 6

Page 83: CTS-285 Study Guide

3. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.a. enterprise applications c. operating applicationsb. network operating systems (NOS) d. legacy systems

ANS: A PTS: 1 REF: 6

4. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.a. 2 months c. 24 monthsb. 12 months d. 48 months

ANS: C PTS: 1 REF: 6

5. When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.a. enterprise applications c. operating applicationsb. network operating systems (NOS) d. legacy systems

ANS: D PTS: 1 REF: 7

6. When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.a. electronic data interchange (EDI) c. business process reengineering (BPR)b. joint application development (JAD) d. rapid application development (RAD)

ANS: C PTS: 1 REF: 8

7. Systems analysts use a process called ____ to represent a company’s operations and information needs.a. JAD c. RADb. Scrum d. business process modeling

ANS: D PTS: 1 REF: 8

8. A business ____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.a. matrix c. indexb. profile d. glossary

ANS: B PTS: 1 REF: 8

9. A business ____ is a graphical representation of one or more business processes that a company performs, such as accepting airline reservations, selling a ticket, or crediting a customer account.a. iteration c. methodb. model d. process

ANS: B PTS: 1 REF: 8

10. ____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.a. EDI c. TCHb. ACH d. O-O

Page 84: CTS-285 Study Guide

ANS: A PTS: 1 REF: 10

11. Transaction processing (TP) systems ____.a. provide job-related information to users at all levels of a companyb. simulate human reasoning by combining a knowledge base and inference rules that

determine how the knowledge is appliedc. process data generated by day-to-day business operationsd. include e-mail, voice mail, fax, video conferencing, word processing, automated

calendars, database management, spreadsheets, and high-speed Internet access

ANS: C PTS: 1 REF: 12

12. Business support systems ____.a. provide job-related information support to users at all levels of a companyb. simulate human reasoning by combining a knowledge base and inference rules that

determine how the knowledge is appliedc. process data generated by day-to-day business operationsd. include e-mail, voice mail, fax, video conferencing, word processing, automated

calendars, database management, spreadsheets, and high-speed Internet access

ANS: A PTS: 1 REF: 13

13. Knowledge management systems are called expert systems because they ____.a. provide job-related information to users at all levels of a companyb. simulate human reasoning by combining a knowledge base and inference rules that

determine how the knowledge is appliedc. process data generated by day-to-day business operationsd. include e-mail, voice mail, fax, video conferencing, word processing, automated

calendars, database management, spreadsheets, and high-speed Internet access

ANS: B PTS: 1 REF: 14

14. User productivity systems ____.a. provide job-related information to users at all levels of a companyb. simulate human reasoning by combining a knowledge base and inference rules that

determine how the knowledge is appliedc. process data generated by day-to-day business operationsd. include e-mail, voice mail, fax, video conferencing, word processing, automated

calendars, database management, spreadsheets, and high-speed Internet access

ANS: D PTS: 1 REF: 14

15. In a typical company organizational model, top managers ____.a. develop long-range plans, called strategic plans, which define the company’s overall

mission and goalsb. provide direction, necessary resources, and performance feedback to supervisors and team

leadersc. oversee operation employees and carry out day-to-day functions, coordinating operational

tasks and peopled. include users who rely on TP systems to enter and receive the data they need to perform

their jobs

ANS: A PTS: 1 REF: 15

Page 85: CTS-285 Study Guide

16. In a typical company organizational model, middle managers ____.a. develop long-range plans, called strategic plans, which define the company’s overall

mission and goalsb. provide direction, necessary resources, and performance feedback to supervisors and team

leadersc. oversee operation employees and carry out day-to-day functions, coordinating operational

tasks and peopled. include users who rely on TP systems to enter and receive the data they need to perform

their jobs

ANS: B PTS: 1 REF: 15

17. A ____, or requirements model, describes the information that a system must provide.a. process model c. business modelb. data model d. network model

ANS: C PTS: 1 REF: 16

18. A(n) ____ describes the logic that programmers use to write code modules.a. process model c. business modelb. object model d. network model

ANS: A PTS: 1 REF: 16

19. ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.a. Prototyping c. Scrumb. Rapid application development d. Modeling

ANS: D PTS: 1 REF: 16

20. ____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.a. Scrum c. Modelingb. Prototyping d. Rapid application development

ANS: B PTS: 1 REF: 17

21. ____ methods include the latest trends in software development.a. Object-oriented analysis c. Structured analysisb. Agile/Adaptive d. Rapid application development

ANS: B PTS: 1 REF: 18

22. The ____ method of developing systems is well-suited to project management tools and techniques.a. object-oriented analysis c. structured analysisb. adaptive d. rapid application development

ANS: C PTS: 1 REF: 18

23. The ____ method of developing systems produces code that is modular and reusable.a. object-oriented analysis c. structured analysis

Page 86: CTS-285 Study Guide

b. adaptive d. rapid application development

ANS: A PTS: 1 REF: 18

24. The ____ method of developing systems stresses team interaction and reflects a set of community-based values.a. object-oriented analysis c. structured analysisb. adaptive d. rapid application development

ANS: B PTS: 1 REF: 18

25. Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.a. O-O c. MSFb. SDLC d. RUP

ANS: B PTS: 1 REF: 19

26. Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.a. iterative c. inferredb. process-centered d. empowered

ANS: B PTS: 1 REF: 19

Page 87: CTS-285 Study Guide

27. Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.a. interactive model c. waterfall modelb. requirements model d. object model

ANS: C PTS: 1 REF: 19

28. In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

Page 88: CTS-285 Study Guide

a. systems design phase c. systems support and security phaseb. systems planning phase d. systems analysis phase

ANS: B PTS: 1 REF: 19

29. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system.a. systems analysis phase c. systems design phaseb. systems implementation phase d. systems support and security phase

ANS: A PTS: 1 REF: 20

30. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a blueprint that will satisfy all documented requirements for the system.a. systems implementation phase c. systems analysis phaseb. systems planning phase d. systems design phase

ANS: D PTS: 1 REF: 21

31. In the model of the SDLC shown in the accompanying figure, during ____, the new system is constructed.a. systems planning c. systems designb. systems support and security d. systems implementation

ANS: D PTS: 1 REF: 21

32. In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.a. systems support and security c. systems analysisb. systems implementation d. systems planning

ANS: A PTS: 1 REF: 21

33. Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.a. the MSF c. RUPb. the SDLC d. O-O

ANS: D PTS: 1 REF: 21

34. In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.a. property c. messageb. class d. instance

ANS: B PTS: 1 REF: 21

35. In object-oriented design, built-in processes called ____ can change an object’s properties.a. methods c. attributesb. functions d. features

ANS: A PTS: 1 REF: 22

Page 89: CTS-285 Study Guide

36. Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback.a. gradual c. spiralb. extreme d. evaluative

ANS: C PTS: 1 REF: 23

37. When building an information system, all of the following basic guidelines should be considered except ____.a. stick to an overall development planb. identify major milestones for project review and assessmentc. provide accurate and reliable cost and benefit informationd. ensure that users are not involved in the development process

ANS: D PTS: 1 REF: 25|26

38. Traditionally, IT departments had a(n) ____ group composed of systems analysts and programmers who handled information system design, development, and implementation.a. Web support c. systems supportb. application development d. database administration

ANS: B PTS: 1 REF: 26

39. ____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.a. User support c. Systems support and securityb. Database administration d. Network administration

ANS: C PTS: 1 REF: 27

40. A systems analyst needs ____.a. solid technical knowledge and good analytical abilityb. strong oral and written communication skillsc. an understanding of business operations and processesd. all of the above

ANS: D PTS: 1 REF: 29

Instructions

Question 1

2.5 out of 2.5 points

false

Page 90: CTS-285 Study Guide

In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a physical model that will satisfy all documented requirements for the system.

Answer

Selected Answer:

systems design phase

Correct Answer:

systems design phase

Question 2

2.5 out of 2.5 points

When building an information system, all of the following basic guidelines should be considered except ____.

Answer

Page 91: CTS-285 Study Guide

Selected Answer:

ensure that users are not involved in the development process

Correct Answer:

ensure that users are not involved in the development process

Question 3

2.5 out of 2.5 points

Business support systems ____.

Answer

Selected Answer:

provide job-related information support to users at all levels of a company

Correct Answer:

provide job-related information support to users at all levels of a company

Question 4

2.5 out of 2.5 points

Systems analysts use a process called ____ to represent company operations and information needs.

Answer

Selected Answer:

business process modeling

Correct Answer:

business process modeling

Question 5

2.5 out of 2.5 points

Page 92: CTS-285 Study Guide

In the model of the SDLC shown in the accompanying figure, during ____, the new system is constructed.

Answer

Selected Answer:

systems implementation

Correct Answer:

systems implementation

Question 6

2.5 out of 2.5 points

The ____ method of developing systems produces code that is modular and reusable.

Answer

Selected Answer:

Page 93: CTS-285 Study Guide

object-oriented analysis

Correct Answer:

object-oriented analysis

Question 7

2.5 out of 2.5 points

In launching a new information system, the greatest risk occurs when a company ____.

Answer

Selected Answer:

tries to decide how the system will be implemented before determining what the system is supposed to do

Correct Answer:

tries to decide how the system will be implemented before determining what the system is supposed to do

Question 8

2.5 out of 2.5 points

____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.

Answer

Selected Answer:

Systems support and security

Correct Answer:

Systems support and security

Question 9

2.5 out of 2.5 points

Page 94: CTS-285 Study Guide

____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.

Answer

Selected Answer:

Prototyping

Correct Answer:

Prototyping

Question 10

2.5 out of 2.5 points

Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

Answer

Selected Answer:

process-centered

Correct Answer:

process-centered

Question 11

2.5 out of 2.5 points

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Answer

Selected Answer:

enterprise applications

Correct Answer:

Page 95: CTS-285 Study Guide

enterprise applications

Question 12

2.5 out of 2.5 points

In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

Answer

Selected Answer:

class

Correct Answer:

class

Question 13

2.5 out of 2.5 points

Page 96: CTS-285 Study Guide

In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.

Answer

Selected Answer:

systems support and security

Correct Answer:

systems support and security

Question 14

2.5 out of 2.5 points

A systems analyst needs ____.

Answer

Selected Answer:

all of the above

Correct Answer:

all of the above

Question 15

2.5 out of 2.5 points

Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

Answer

Selected Answer:

24 months

Correct Answer:

Page 97: CTS-285 Study Guide

24 months

Question 16

2.5 out of 2.5 points

____ software controls the flow of data, provides data security, and manages network operations.

Answer

Selected Answer:

System

Correct Answer:

System

Question 17

2.5 out of 2.5 points

In object-oriented design, built-in processes called ____ can change an object’s properties.

Answer

Selected Answer:

methods

Correct Answer:

methods

Question 18

2.5 out of 2.5 points

Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback.

Answer

Page 98: CTS-285 Study Guide

Selected Answer:

spiral

Correct Answer:

spiral

Question 19

2.5 out of 2.5 points

In a typical company organizational model, middle managers ____.

Answer

Selected Answer:

provide direction, necessary resources, and performance feedback to supervisors and team leaders

Correct Answer:

provide direction, necessary resources, and performance feedback to supervisors and team leaders

Question 20

2.5 out of 2.5 points

____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.

Answer

Selected Answer:

EDI

Correct Answer:

EDI

Question 21

Page 99: CTS-285 Study Guide

2.5 out of 2.5 points

Knowledge management systems are called expert systems because they ____.

Answer

Selected Answer:

simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

Correct Answer:

simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

Question 22

2.5 out of 2.5 points

In the ____, like that shown in the accompanying figure, the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase in the SDLC.

Page 100: CTS-285 Study Guide

Answer

Selected Answer:

waterfall model

Correct Answer:

waterfall model

Question 23

2.5 out of 2.5 points

In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

Answer

Selected Answer:

Page 101: CTS-285 Study Guide

systems planning phase

Correct Answer:

systems planning phase

Question 24

2.5 out of 2.5 points

For complex operations, analysts apply computer-based modeling tools that use a standard language called ____.

Answer

Selected Answer:

business process modeling notation (BPMN)

Correct Answer:

business process modeling notation (BPMN)

Question 25

2.5 out of 2.5 points

Page 102: CTS-285 Study Guide

In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system.

Answer

Selected Answer:

systems analysis phase

Correct Answer:

systems analysis phase

Question 26

2.5 out of 2.5 points

A(n) ____ describes the logic that programmers use to write code modules.

Answer

Selected Answer:

Page 103: CTS-285 Study Guide

process model

Correct Answer:

process model

Question 27

2.5 out of 2.5 points

The ____ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.

Answer

Selected Answer:

application development

Correct Answer:

application development

Question 28

2.5 out of 2.5 points

____ methods include the latest trends in software development.

Answer

Selected Answer:

Agile/Adaptive

Correct Answer:

Agile/Adaptive

Question 29

2.5 out of 2.5 points

Page 104: CTS-285 Study Guide

The ____ method of developing systems is well-suited to project management tools and techniques.

Answer

Selected Answer:

structured analysis

Correct Answer:

structured analysis

Question 30

2.5 out of 2.5 points

A business ____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.

Answer

Selected Answer:

profile

Correct Answer:

profile

Question 31

2.5 out of 2.5 points

Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

Answer

Selected Answer:

SDLC

Page 105: CTS-285 Study Guide

Correct Answer:

SDLC

Question 32

2.5 out of 2.5 points

____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

Answer

Selected Answer:

Modeling

Correct Answer:

Modeling

Question 33

2.5 out of 2.5 points

User productivity systems ____.

Answer

Selected Answer:

include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and high-speed Internet access

Correct Answer:

include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and high-speed Internet access

Question 34

2.5 out of 2.5 points

Page 106: CTS-285 Study Guide

A ____, or requirements model, describes the information that a system must provide.

Answer

Selected Answer:

business model

Correct Answer:

business model

Question 35

2.5 out of 2.5 points

When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

Answer

Selected Answer:

legacy systems

Correct Answer:

legacy systems

Question 36

2.5 out of 2.5 points

The ____ method of developing systems stresses team interaction and reflects a set of community-based values.

Answer

Selected Answer:

agile/adaptive

Correct Answer:

Page 107: CTS-285 Study Guide

agile/adaptive

Question 37

2.5 out of 2.5 points

Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.

Answer

Selected Answer:

O-O

Correct Answer:

O-O

Question 38

2.5 out of 2.5 points

Which of the following is one of the main sectors of e-commerce?

Answer

Selected Answer:

B2C

Correct Answer:

B2C

Question 39

2.5 out of 2.5 points

Transaction processing (TP) systems ____.

Answer

Selected Answer:

Page 108: CTS-285 Study Guide

process data generated by day-to-day business operations

Correct Answer:

process data generated by day-to-day business operations

Question 40

2.5 out of 2.5 points

In a typical company organizational model, top managers ____.

Answer

Selected Answer:

develop long-range plans, called strategic plans, which define the company’s overall mission and goals

Correct Answer:

develop long-range plans, called strategic plans, which define the company’s overall mission and goals

Thursday, August 23, 2012 9:36:28 PM EDT

OK