Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Chapter 1 – Introduction to Systems Analysis and Design MULTIPLE CHOICE 1) In launching a new information system, the greatest risk occurs when a company ____
Chapter 1 – Introduction to Systems Analysis and Design
MULTIPLE CHOICE
1) In launching a new information system, the greatest risk occurs when a company ____.
|
a. |
begins by outlining its business models and identifying possible IT solutions |
|
b. |
tries to decide how the system will be implemented before determining what the system is supposed to do |
|
c. |
considers implementation options after having a clear set of objectives |
|
d. |
all of the above |
2. ____ software controls the flow of data, provides data security, and manages network operations.
|
a. |
Enterprise |
c. |
Application |
|
b. |
System |
d. |
Legacy |
3. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.
|
a. |
enterprise applications |
c. |
operating applications |
|
b. |
network operating systems (NOS) |
d. |
legacy systems |
4. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.
|
a. |
2 months |
c. |
24 months |
|
b. |
12 months |
d. |
48 months |
5. When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.
|
a. |
enterprise applications |
c. |
operating applications |
|
b. |
network operating systems (NOS) |
d. |
legacy systems |
6. When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.
|
a. |
electronic data interchange (EDI) |
c. |
business process reengineering (BPR) |
|
b. |
joint application development (JAD) |
d. |
rapid application development (RAD) |
7. Systems analysts use a process called ____ to represent a company’s operations and information needs.
|
a. |
JAD |
c. |
RAD |
|
b. |
Scrum |
d. |
business process modeling |
8. A business ____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.
|
a. |
matrix |
c. |
index |
|
b. |
profile |
d. |
glossary |
9. A business ____ is a graphical representation of one or more business processes that a company performs, such as accepting airline reservations, selling a ticket, or crediting a customer account.
|
a. |
iteration |
c. |
method |
|
b. |
model |
d. |
process |
10. ____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
|
a. |
EDI |
c. |
TCH |
|
b. |
ACH |
d. |
O-O |
11. Transaction processing (TP) systems ____.
|
a. |
provide job-related information to users at all levels of a company |
|
b. |
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied |
|
c. |
process data generated by day-to-day business operations |
|
d. |
include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access |
12. Business support systems ____.
|
a. |
provide job-related information support to users at all levels of a company |
|
b. |
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied |
|
c. |
process data generated by day-to-day business operations |
|
d. |
include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access |
13. Knowledge management systems are called expert systems because they ____.
|
a. |
provide job-related information to users at all levels of a company |
|
b. |
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied |
|
c. |
process data generated by day-to-day business operations |
|
d. |
include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access |
14. User productivity systems ____.
|
a. |
provide job-related information to users at all levels of a company |
|
b. |
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied |
|
c. |
process data generated by day-to-day business operations |
|
d. |
include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access |
15. In a typical company organizational model, top managers ____.
|
a. |
develop long-range plans, called strategic plans, which define the company’s overall mission and goals |
|
b. |
provide direction, necessary resources, and performance feedback to supervisors and team leaders |
|
c. |
oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people |
|
d. |
include users who rely on TP systems to enter and receive the data they need to perform their jobs |
16. In a typical company organizational model, middle managers ____.
|
a. |
develop long-range plans, called strategic plans, which define the company’s overall mission and goals |
|
b. |
provide direction, necessary resources, and performance feedback to supervisors and team leaders |
|
c. |
oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people |
|
d. |
include users who rely on TP systems to enter and receive the data they need to perform their jobs |
17. A ____, or requirements model, describes the information that a system must provide.
|
a. |
process model |
c. |
business model |
|
b. |
data model |
d. |
network model |
18. A(n) ____ describes the logic that programmers use to write code modules.
|
a. |
process model |
c. |
business model |
|
b. |
object model |
d. |
network model |
19. ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.
|
a. |
Prototyping |
c. |
Scrum |
|
b. |
Rapid application development |
d. |
Modeling |
20. ____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
|
a. |
Scrum |
c. |
Modeling |
|
b. |
Prototyping |
d. |
Rapid application development |
21. ____ methods include the latest trends in software development.
|
a. |
Object-oriented analysis |
c. |
Structured analysis |
|
b. |
Agile/Adaptive |
d. |
Rapid application development |
22. The ____ method of developing systems is well-suited to project management tools and techniques.
|
a. |
object-oriented analysis |
c. |
structured analysis |
|
b. |
adaptive |
d. |
rapid application development |
23. The ____ method of developing systems produces code modular and reusable.
|
a. |
object-oriented analysis |
c. |
structured analysis |
|
b. |
adaptive |
d. |
rapid application development |
24. The ____ method of developing systems stresses team interaction and reflects a set of community-based values.
|
a. |
object-oriented analysis |
c. |
structured analysis |
|
b. |
adaptive |
d. |
rapid application development |
25. Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.
|
a. |
O-O |
c. |
MSF |
|
b. |
SDLC |
d. |
RUP |
26. Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.
|
a. |
iterative |
c. |
inferred |
|
b. |
process-centered |
d. |
empowered |
27. Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.
|
a. |
interactive model |
c. |
waterfall model |
|
b. |
requirements model |
d. |
object model |
28. In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.
|
a. |
systems design phase |
c. |
systems support and security phase |
|
b. |
systems planning phase |
d. |
systems analysis phase |
29. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system.
|
a. |
systems analysis phase |
c. |
systems design phase |
|
b. |
systems implementation phase |
d. |
systems support and security phase |
30. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a blueprint that will satisfy all documented requirements for the system.
|
a. |
systems implementation phase |
c. |
systems analysis phase |
|
b. |
systems planning phase |
d. |
systems design phase |
31. In the model of the SDLC shown in the accompanying figure, during ____, the new system is constructed.
|
a. |
systems planning |
c. |
systems design |
|
b. |
systems support and security |
d. |
systems implementation |
32. In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.
|
a. |
systems support and security |
c. |
systems analysis |
|
b. |
systems implementation |
d. |
systems planning |
33. Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.
|
a. |
the MSF |
c. |
RUP |
|
b. |
the SDLC |
d. |
O-O |
34. In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.
|
a. |
property |
c. |
message |
|
b. |
class |
d. |
instance |
35. In object-oriented design, built-in processes called ____ can change an object’s properties.
|
a. |
methods |
c. |
attributes |
|
b. |
functions |
d. |
features |
36. Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback.
|
a. |
gradual |
c. |
spiral |
|
b. |
extreme |
d. |
evaluative |
37. When building an information system, all of the following basic guidelines should be considered except ____.
|
a. |
stick to an overall development plan |
|
b. |
identify major milestones for project review and assessment |
|
c. |
provide accurate and reliable cost and benefit information |
|
d. |
ensure that users are not involved in the development process |
38. Traditionally, IT departments had a(n) ____ group composed of systems analysts and programmers who handled information system design, development, and implementation.
|
a. |
Web support |
c. |
systems support |
|
b. |
application development |
d. |
database administration |
39. ____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.
|
a. |
User support |
c. |
Systems support and security |
|
b. |
Database administration |
d. |
Network administration |
40. A systems analyst needs ____.
|
a. |
solid technical knowledge and good analytical ability |
|
b. |
strong oral and written communication skills |
|
c. |
an understanding of business operations and processes |
|
d. |
all of the above |
Expert Solution
please use this google drive link to download the answer file.
https://drive.google.com/file/d/1fImWL3Hp2WVoyIGfx6NbdVEhiyMudM4T/view?usp=sharing
note if you have any trouble in viewing/downloading the answer from the given link,please use this below guide to understand the whole process.
http://helpinhomework.org/blog/how-to-obtain-answer-through-google-drive-link
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





