Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Chapter 1 – Introduction to Systems Analysis and Design   MULTIPLE CHOICE 1) In launching a new information system, the greatest risk occurs when a company ____

Chapter 1 – Introduction to Systems Analysis and Design   MULTIPLE CHOICE 1) In launching a new information system, the greatest risk occurs when a company ____

Business

Chapter 1 – Introduction to Systems Analysis and Design

 

MULTIPLE CHOICE

1) In launching a new information system, the greatest risk occurs when a company ____.

a.

begins by outlining its business models and identifying possible IT solutions

b.

tries to decide how the system will be implemented before determining what the system is supposed to do

c.

considers implementation options after having a clear set of objectives

d.

all of the above

 

 

          

 

     2.   ____ software controls the flow of data, provides data security, and manages network operations.

a.

Enterprise

c.

Application

b.

System

d.

Legacy

 

 

          

 

     3.   Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

a.

enterprise applications

c.

operating applications

b.

network operating systems (NOS)

d.

legacy systems

 

 

 

 

     4.   Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

a.

2 months

c.

24 months

b.

12 months

d.

48 months

 

 

          

 

     5.   When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

a.

enterprise applications

c.

operating applications

b.

network operating systems (NOS)

d.

legacy systems

 

 

          

 

     6.   When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

a.

electronic data interchange (EDI)

c.

business process reengineering (BPR)

b.

joint application development (JAD)

d.

rapid application development (RAD)

 

 

          

 

     7.   Systems analysts use a process called ____ to represent a company’s operations and information needs.

a.

JAD

c.

RAD

b.

Scrum

d.

business process modeling

 

 

          

 

     8.   A business ____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.

a.

matrix

c.

index

b.

profile

d.

glossary

 

 

          

 

     9.   A business ____ is a graphical representation of one or more business processes that a company performs, such as accepting airline reservations, selling a ticket, or crediting a customer account.

a.

iteration

c.

method

b.

model

d.

process

 

 

          

 

   10.   ____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.

a.

EDI

c.

TCH

b.

ACH

d.

O-O

 

 

          

 

   11.   Transaction processing (TP) systems ____.

a.

provide job-related information to users at all levels of a company

b.

simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.

process data generated by day-to-day business operations

d.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

 

 

          

 

   12.   Business support systems ____.

a.

provide job-related information support to users at all levels of a company

b.

simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.

process data generated by day-to-day business operations

d.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

 

 

          

 

   13.   Knowledge management systems are called expert systems because they ____.

a.

provide job-related information to users at all levels of a company

b.

simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.

process data generated by day-to-day business operations

d.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

 

 

          

 

   14.   User productivity systems ____.

a.

provide job-related information to users at all levels of a company

b.

simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.

process data generated by day-to-day business operations

d.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

 

 

          

 

   15.   In a typical company organizational model, top managers ____.

a.

develop long-range plans, called strategic plans, which define the company’s overall mission and goals

b.

provide direction, necessary resources, and performance feedback to supervisors and team leaders

c.

oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people

d.

include users who rely on TP systems to enter and receive the data they need to perform their jobs

 

 

          

 

   16.   In a typical company organizational model, middle managers ____.

a.

develop long-range plans, called strategic plans, which define the company’s overall mission and goals

b.

provide direction, necessary resources, and performance feedback to supervisors and team leaders

c.

oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people

d.

include users who rely on TP systems to enter and receive the data they need to perform their jobs

 

 

          

 

   17.   A ____, or requirements model, describes the information that a system must provide.

a.

process model

c.

business model

b.

data model

d.

network model

 

 

          

 

   18.   A(n) ____ describes the logic that programmers use to write code modules.

a.

process model

c.

business model

b.

object model

d.

network model

 

 

          

 

   19.   ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

a.

Prototyping

c.

Scrum

b.

Rapid application development

d.

Modeling

 

 

          

 

   20.   ____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.

a.

Scrum

c.

Modeling

b.

Prototyping

d.

Rapid application development

 

 

          

 

   21.   ____ methods include the latest trends in software development.

a.

Object-oriented analysis

c.

Structured analysis

b.

Agile/Adaptive

d.

Rapid application development

 

 

          

 

   22.   The ____ method of developing systems is well-suited to project management tools and techniques.

a.

object-oriented analysis

c.

structured analysis

b.

adaptive

d.

rapid application development

 

 

          

 

   23.   The ____ method of developing systems produces code modular and reusable.

a.

object-oriented analysis

c.

structured analysis

b.

adaptive

d.

rapid application development

 

 

          

 

   24.   The ____ method of developing systems stresses team interaction and reflects a set of community-based values.

a.

object-oriented analysis

c.

structured analysis

b.

adaptive

d.

rapid application development

 

 

          

 

   25.   Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

a.

O-O

c.

MSF

b.

SDLC

d.

RUP

 

 

          

 

   26.   Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

a.

iterative

c.

inferred

b.

process-centered

d.

empowered

 

 

          

 

 

 

   27.   Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

a.

interactive model

c.

waterfall model

b.

requirements model

d.

object model

 

 

          

 

   28.   In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

a.

systems design phase

c.

systems support and security phase

b.

systems planning phase

d.

systems analysis phase

 

 

          

 

   29.   In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system.

a.

systems analysis phase

c.

systems design phase

b.

systems implementation phase

d.

systems support and security phase

 

 

          

 

   30.   In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a blueprint that will satisfy all documented requirements for the system.

a.

systems implementation phase

c.

systems analysis phase

b.

systems planning phase

d.

systems design phase

 

 

          

 

   31.   In the model of the SDLC shown in the accompanying figure, during ____, the new system is constructed.

a.

systems planning

c.

systems design

b.

systems support and security

d.

systems implementation

 

 

          

 

   32.   In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.

a.

systems support and security

c.

systems analysis

b.

systems implementation

d.

systems planning

 

 

          

 

   33.   Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.

a.

the MSF

c.

RUP

b.

the SDLC

d.

O-O

 

 

          

 

   34.   In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

a.

property

c.

message

b.

class

d.

instance

 

 

          

 

   35.   In object-oriented design, built-in processes called ____ can change an object’s properties.

a.

methods

c.

attributes

b.

functions

d.

features

 

 

 

 

   36.   Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback.

a.

gradual

c.

spiral

b.

extreme

d.

evaluative

 

 

          

 

   37.   When building an information system, all of the following basic guidelines should be considered except ____.

a.

stick to an overall development plan

b.

identify major milestones for project review and assessment

c.

provide accurate and reliable cost and benefit information

d.

ensure that users are not involved in the development process

 

 

          

 

   38.   Traditionally, IT departments had a(n) ____ group composed of systems analysts and programmers who handled information system design, development, and implementation.

a.

Web support

c.

systems support

b.

application development

d.

database administration

 

 

          

 

   39.   ____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.

a.

User support

c.

Systems support and security

b.

Database administration

d.

Network administration

 

 

          

 

   40.   A systems analyst needs ____.

a.

solid technical knowledge and good analytical ability

b.

strong oral and written communication skills

c.

an understanding of business operations and processes

d.

all of the above

 

 

          

 

Option 1

Low Cost Option
Download this past answer in few clicks

7.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions