System Analysis and Design 9th Edition Chapters 1-12 Review Chapter 1

1. Structured analysis is called a A" managed #" $oundation C" !asic D" predictive approach since it is !ased on an overall plan.

2. %ne o$ the two main sectors o$ E-commerce is A" !usiness-to-consumer #" !ric&-and-mortar C" consumer-to-!usiness D" dot-com '. So$tware consists o$ system so$tware and A" application so$tware #" networ& operating system C" linear so$tware D" data so$tware .


(. )he term re$ers to the com!ination o$ hardware and so$tware products and services that companies use to manage* access* communicate* and share in$ormation. A" practical technology #" electronic technology C" in$ormation technology D" systems technology +. tests system concepts and e,amine input* output* and user inter$aces !e$ore $inal decisions are made. A" CASE tools #" -rototyping C" .nvestigative design D" /roup typing 0. /oogle is an e,ample o$ . A" an .nternet-dependent company #" a !ric&-and-mortar company C" a #2# company D" an .nternet-independent company 1. )he programs that control the hardware and produce the desired in$ormation or results are re$erred to as . A" data #" people C" processes D" so$tware 2. veri$ies that an individual demonstrated a certain level o$ &nowledge and s&ill on a standardi3ed test. A" Certi$ication #" 4alidation

C" Documentation D" Authentication 9. )he are logical rules that identi$y data patterns and relationships. A" linear rules #" system rules C" in$erence rules D" productivity rules 15. A graphical representation o$ one or more tas&s that a company per$orms is considered A" a !usiness model #" a !usiness process C" a !usiness pro$ile D" an analytic pro$ile 11. Data that has !een trans$ormed into output that is valua!le to users is A" mission #" in$ormation C" operations D" processes . .

12. )he .) group provides technical support that includes all o$ the $ollowing E6CE-) A" 7e! support #" application development C" user systems re8uests D" data!ase administration 1'. )he newest development in data ac8uisition is called $re8uency radio waves to trac& physical o!9ects. A" R.D #" RAD C" R:.D D" :.D


technology* which uses high-

1(. A is an overview that descri!es a company;s overall $unctions* processes* organi3ation* products* services* customers* suppliers* competitors* constraints* and $uture direction. A" !usiness model #" !usiness process C" !usiness system D" !usiness pro$ile 1+. A set o$ related components that produce speci$ic results is a A" system #" compound C" strategy D" pac&age 10. A development system that $ocuses on team-!ased $act-$inding is A" RAD #" <AD C" either a. or !. D" neither a. nor !. .


11. 7hen $irst introduced* management in$ormation systems =>.S? was a category o$ systems which served .

A" managers #" administrative sta$$ C" operational personnel D" maintenance sta$$ 12. )he is @%) an e,ample o$ an internal user o$ a company;s in$ormation system. A" customers who trac& their orders on a company;s 7e! site #" company;s technicians C" company;s sales sta$$ D" company;s corporate o$$icers 19. )he correct de$inition o$ an in-house application is . A" an in$ormation system developed !y outside vendors #" an in$ormation system developed !y the company that uses the in$ormation system C" a so$tware pac&age D" an in$ormation system that is .nternet-!ased 25. Structured analysis uses a set o$ process models to descri!e a system A" in words #" in num!ers C" dynamically D" graphically 21. A way in which !usinesses use in$ormation is A" to deliver 8uality products and services #" to ma&e sound decisions C" to maintain customer loyalty D" all o$ these choices . .

22. )he com!ination o$ in$ormation technology* people* and data to support !usiness re8uirements is called a=n? . A" active data system #" in$ormation system C" electronic system D" communal system 2'. .n an in$ormation system* the system;s raw material is A" data #" critical 8uota C" people D" matter .

2(. )he component is @%) a &ey part o$ an in$ormation system. A" .nternet access #" processes C" so$tware D" people 2+. An inventory or payroll application is an e,ample o$ a A" data system #" vertical system C" legacy system D" hori3ontal system .

20. )he !uilding !loc&s o$ an in$ormation system* representing actual day-to-day !usiness
operations are called A" !usiness models #" processes C" hardware D" data .

21. )he process used !y systems analysts to represent company operations and in$ormation needs is called . A" user targeted modeling #" !usiness action modeling C" !usiness process modeling D" product modeling 22. #->@ re$ers to . A" !usiness process modeling notation #" !usiness pro$ile modeling notation C" none o$ these choices D" !usiness process modeling names 29. Computer-to-computer data trans$er !etween companies* usually over private telecommunications lines is re$erred to as . A" electronic data interchange #" #2C C" .nternet module e,change D" transaction processing '5. )he systems are also re$erred to as e,pert systems. A" !usiness support #" user productivity C" )D" &nowledge management '1. re$ers to in$ormation systems that support company-wide operations and data management re8uirements. A" ED. #" 7e!Sphere strategy C" E-commerce D" Enterprise computing '2. )he most popular options $or developing in$ormation systems are structured analysis* o!9ectoriented analysis* and . A" data $low analysis #" networ& methods C" modeling D" agile methods ''. )he systems planning phase usually !egins with a $ormal re8uest to the .) department* called a . A" systems order #" client complaint C" planning re8uest D" systems re8uest

'(. A development method that >icroso$t calls so$tware development teams. A" Rational Ani$ied -rocess #" >icroso$t Application Development C" >icroso$t Solutions :ramewor& D" >icroso$t 6treme -rogramming

documents the e,perience o$ its own

Chapter 2 Review
1. An evaluation o$ the resources needed $or users to !e trained on a new system is part o$ $easi!ility. A" economic #" technical C" operational D" schedule 2. )he $irst step in evaluating $easi!ility is . A" setting priorities #" identi$ying systems re8uests that are not $easi!le or necessary C" conducting a preliminary investigation D" !uilding a prototype '. )he $irst step in a preliminary investigation is generally to A" evaluate $easi!ility #" per$orm $act-$inding C" understand the pro!lem or opportunity D" estimate pro9ect development time and cost (. An organi3ational chart does @%) show . A" $ormal reporting relationships #" an overview o$ the way each department $unctions C" the in$ormal alignment o$ a group D" the names o$ employees and their positions +. >any companies use A" printed #" $a,ed C" online D" o$$line 0. A company;s A" o!9ectives #" goals C" re8uirements D" inventory re8uest $orms that can !e $illed out and su!mitted electronically. .

are !ro&en down into one-year* three-year* and $ive-year categories.

1. )he coding o$ data to &eep it sa$e $rom unauthori3ed users is called A" prototyping #" encryption


C" password access D" &ey access 2. ED. re$ers to . A" e,ternal development interchange #" electronic data interchange C" e,ternal data interchange D" none o$ the a!ove 9. A ris& is an event that can a$$ect a pro9ect A" negatively #" positively C" !oth a. and !. D" neither a. nor !. .

15. Chapter 2 e,plained $our types o$ pro9ect $easi!ility tests that a systems re8uest must pass and did @%) include $easi!ility. A" technical #" mar&eting C" economic D" schedule 11. An e,amination o$ the relia!ility o$ the hardware and so$tware environment $or a new system is part o$ $easi!ility. A" economic #" technical C" operational D" schedule 12. A pro9ect where management has a yesBno choice to implement is called a A" nondiscretionary #" discretionary C" resource D" non-resource 1'. A popular techni8ue $or investigating causes and e$$ects is called a=n? A" .shi&awa diagram #" arrowhead diagram C" >oore diagram D" -ro!lemBSolution diagram . pro9ect.

1(. A $act-$inding method during the preliminary investigation includes all o$ the $ollowing E6CE-) . A" o!serving the current system in operation #" conducting a survey o$ users C" reviewing current system documentation D" $iguring out the costs o$ the solution 1+. $easi!ility means that a pro9ect can !e implemented in an accepta!le time $rame. A" )echnical #" )ime

C" Schedule D" %perational 10. A S7%) analysis does @%) include an e,amination o$ A" wea&nesses #" options C" strengths D" threats .

11. 4ital o!9ectives that must !e achieved $or the enterprise to $ul$ill its mission are considered . A" the SDCC #" critical success $actors C" critical !usiness issues D" CASE tools 12. Dardware-!ased security controls that can identi$y a person !y a retina scan or !y mapping a $acial pattern are re$erred to as . A" !iological devices #" encrypted devices C" strategic scanning devices D" !iometric devices 19. )he purpose o$ a=n? time. A" ED. #" CR> C" CASE D" <.) system is to provide the right product in the right place at the right

25. >icroso$t -ro9ect is a tool that is o$ten used !y A" end users #" pro9ect managers C" customer service personnel D" top managers 21. A systems re8uest $orm should not . A" have comple, instructions #" !e easy to understand C" include enough space $or all re8uired in$ormation D" indicate what supporting documents are needed


22. A=n" is a re8uirement or condition that a system must satis$y or an outcome that a system must achieve. A" condition #" constraint C" impediment D" o!stacle 2'. )o avoid the pro!lem o$ pro9ect creep* . A" de$ine pro9ect scope as vaguely as possi!le #" leave pro9ect scope unde$ined

C" de$ine pro9ect scope as clearly as possi!le D" e,pand the $ocus !eyond the pro!lem at hand 2(. considers 8uestions such as EDoes management support the pro9ectFG and E7ill the new system re8uire training $or usersFG A" schedule $easi!ility #" technical $easi!ility C" economic $easi!ility D" operational $easi!ility 2+. components can provide automated response to sales in8uiries* 7e!-!ased order processing* and online inventory trac&ing. A" >ission statement #" Customer relationship management =CR>? C" :easi!ility study D" )otal cost o$ ownership =)C%" 20. A $easi!ility study includes tests $or $easi!ility* which means that the pro9ected !ene$its o$ the proposed system outweigh the estimated costs. A" economic #" schedule C" operational D" technical 21. is an e,ample o$ a discretionary pro9ect. A" Creating a new report $or a user #" Adding a report re8uired !y a new $ederal law C" .ncluding annual updates to payroll and ta, percentages D" All o$ the a!ove 22. 7hen setting priorities $or systems re8uests* the highest priority goes to pro9ects that provide the . A" least !ene$it* at the highest cost* in the longest period o$ time #" least !ene$it* at the lowest cost* in the longest period o$ time C" greatest !ene$it* at the highest cost* in the shortest period o$ time D" greatest !ene$it* at the lowest cost* in the shortest period o$ time 29. -ro9ects where management has a choice in implementing them are called A" discretionary #" nondiscretionary C" appended D" concatenated '5. A systems analyst conducts a=n" recommend speci$ic action. A" preliminary #" appendi, C" systems D" transitional pro9ects.

investigation to study the systems re8uest and

Chapter ' Review
1. )he pro9ect handles administrative responsi!ilities $or the development team and negotiates with users you might have con$licting re8uirements. A" e,pediter

#" supporter C" coordinator D" leader 2. -ER)BC-> is considered to !e a A" side-to-side #" parallel tas& C" !ottom-up D" top-down techni8ue.

'. Analy3ing ris&s is a two-step process that includes !oth A" 8ualitative and 8uantitative #" pro$it and loss C" timing and critical path D" identi$ication and response


(. -ro9ect includes identi$ying pro9ect tas&s and estimating completion time and costs. A" planning #" scheduling C" monitoring and controlling D" reporting +. 7ith -ER)BC->* the A" time assignment #" time duration C" time length D" time pattern is the amount o$ time it will ta&e to complete a tas&.

0. A wal&-through is a review o$ a pro9ect team mem!er;s wor& !y other mem!ers o$ the team. A" status #" structured C" open D" private 1. -ro9ect involves the creation o$ a speci$ic timeta!le* usually in the $orm o$ charts that show tas&s* tas& dependencies* and critical tas&s that may delay a pro9ect. A" planning #" scheduling C" monitoring and controlling D" reporting 2. 7ith -ER)BC->* tas&s that must !e completed one a$ter the other* li&e a relay race* are called tas&s. A" dependent #" independent C" $ast D" tiered

9. 7al&-throughs that ta&e place throughout the SDCC are also called all o$ the $ollowing E6CE-) . A" code reviews #" design reviews C" testing reviews D" timing review 15. -ro9ect re8uires guiding* supervising* and coordinating the pro9ect team;s wor&load. A" planning #" scheduling C" monitoring and controlling D" reporting 11. )as& patterns can involve A" dependent #" multiple successor C" multiple predecessor D" all o$ the a!ove 12. -ro9ect managers can use on a pro9ect. A" change control #" pro9ect management C" pro9ect resource D" path management tas&s.

so$tware to help plan* estimate* schedule* monitor* and report

1'. -ro9ect tas&s include regular progress reports to management* users* and the pro9ect team itsel$. A" planning #" scheduling C" monitoring and controlling D" reporting 1(. 7hen several tas&s can start at the same time* each is called a A" concurrent #" successor C" predecessor D" dependent 1+. 7hen so$tware is A" $ree-source #" open-source C" private-source D" share-source tas&.

it is $ree* and supported !y a large group o$ users and developers.

10. A=n? * or activity* is any wor& that has a !eginning and an end and re8uires the use o$ company resources such as people* time* or money. A" event #" tas&

C" ha!it D" plan 11. %$ten* two or more concurrent tas&s* depend on a single prior tas&* which is called a A" concurrent #" successor C" predecessor D" dependent 12. )he most popular pro9ect management so$tware is A" AC) #" >icroso$t %$$ice -ro9ect 2551 C" %pen 7or&!ench D" -ro9ect Solution . .

19. A=n? * or milestone* is a recogni3a!le re$erence point that can !e used to monitor progress and manage the pro9ect. A" plan #" ha!it C" event D" tas& 25. .n the situation where concurrent tas&s depend on a predecessor tas&* each concurrent tas& is called a tas&. A" dependent #" successor C" predecessor D" dependent 21. A path includes all tas&s that are vital to the pro9ect schedule. A" vital #" !aseline C" critical D" $oundational 22. A=n" chart displays comple, tas& patterns and relationships. A" /antt #" inde, C" -ER)BC-> D" tas& 2'. .n developing time and cost estimates* pro9ect managers must consider A" pro9ect si3e and scope #" .) resources C" prior e,perience with similar pro9ects or systems D" all o$ the a!ove .

2(. A pro9ect managerHs scheduling $unction . A" involves guiding* supervising* and coordinating the pro9ect teamHs wor&load #" includes monitoring the progress o$ the pro9ect* evaluating results* and ta&ing corrective action when necessary to stay on target C" involves sta$$ing* which includes selecting the pro9ect team and assigning speci$ic tas&s to team mem!ers

D" includes identi$ying and arranging pro9ect tas&s and estimating completion times and costs 2+. A tas& is any wor& that re8uires the use o$ company resources including all o$ the $ollowing E6CE-) . A" controlling capital #" people C" time D" money 20. A ris& management plan includes a review o$ all o$ the $ollowing E6CE-) A" employees #" pro9ect scope C" sta&eholders D" !udget 21. -ro9ect scheduling involves all o$ the $ollowing E6CE-) A" de$ining pro9ect constraints #" sta$$ing the pro9ect team C" arranging $or necessary resources D" assigning speci$ic tas&s to team mem!ers . .

22. >icroso$tHs ris& management model includes all o$ the $ollowing E6CE-) . A" category* which speci$ies the ris& type #" pro!a!ility* which indicates the degree o$ adverse e$$ect should the ris& occur* on a scale o$ 1 to 15 C" mitigation plan* which identi$ies plans to control or limit the ris& D" trigger* which identi$ies a condition that would initiate the contingency plan 29. A pro9ect managerHs planning . A" involves guiding* supervising* and coordinating the pro9ect teamHs wor&load #" includes monitoring the progress o$ the pro9ect* evaluating results* and ta&ing corrective action when necessary to stay on target C" consists o$ sta$$ing* which includes selecting the pro9ect team and assigning speci$ic tas&s to team mem!ers D" includes identi$ying pro9ect tas&s and estimating completion times and costs '5. All o$ the $ollowing are versions o$ >icroso$t %$$ice -ro9ect 2551 E6CE-) A" Standard #" Enterprise C" -ro$essional D" Server .

Chapter ( Review
1. )he sales trac&ing system must produce a daily $ast-moving-item report* listing all products that e,ceed the $orecasted sales volume grouped !y style* color* si3e* and reorder status is an e,ample o$ a=n? re8uirement. A" output #" input C" processes D" per$ormance

2. Response time must not e,ceed $our seconds is an e,ample o$ a=n? A" control #" input C" process D" per$ormance '. 8uestions encourage spontaneous and unstructured responses. A" %pen-ended #" Closed-ended C" Range-o$-response D" Ceading


(. A is a document containing a num!er o$ standard 8uestions that can !e sent to many individuals. A" 8uestionnaire #" survey C" !oth a. and !. D" neither a. nor !. +. .$ you want to ensure that the sample is !alanced geographically* you could use a to select $ive customers $rom each o$ $our 3ip codes. A" random #" systematic C" strati$ied D" structured 0. .n !rainstorming* each participant spea&s when it is his or her turn* or passes. A" unstructured #" structured C" random D" systematic 1. A * such as >icroso$t %utloo& or Cotus %rgani3er* can help manage those tas&s and provide a personal calendar and a to-do list* with priorities and the capa!ility to chec& o$$ completed items. A" -DA #" D-A C" -.> D" ->. sample

2. Chapter ( descri!es * which involves $act-$inding to descri!e the current system and identi$ication o$ the re8uirements $or the new system* such as outputs* inputs* processes* per$ormance* and security. A" output design #" re8uirements modeling C" re8uirements design D" output modeling 9. re$er to the logical rules that are applied to trans$orm the data into meaning$ul in$ormation. A" %utputs

#" .nputs C" -rocesses D" -er$ormance 15. analysis identi$ies the data $lowing into a process* the !usiness rules that trans$orm the data* and the resulting output data $low. A" Structured #" Data C" Enterprise D" -rocess 11. s&ills are especially valua!le to a systems analyst who must wor& with people at all organi3ational levels* !alance con$licting needs o$ users* and communicate e$$ectively. A" Data processing #" -ersonal C" Analytical D" .nterpersonal 12. methods represent a recent trend that stresses intense interaction !etween system developers and users. A" Co-op #" %!9ect C" :low D" Agile 1'. )he end product o$ A" <AD #" RAD C" !oth a. and !. D" neither a. nor !. is the new in$ormation system.

1(. During the phase* users interact with systems analysts and develop models and prototypes that represent all system processes* outputs* and inputs. A" so$tware design #" so$tware rollout C" user design D" user rollout 1+. A $unctional decomposition diagram =:DD" is a top-down representation o$ a $unction or process. :DDs also are called charts. A" structure #" pie C" $low D" modeling 10. A diagram visually represents the interaction !etween users and the in$ormation system. A" data case #" re8uirements case C" use case D" design case

11. A re8uirement is a characteristic or $eature that must !e included in an in$ormation system to satis$y !usiness re8uirements and !e accepta!le to users. A" management #" system C" program D" data 12. )he department head must enter overtime hours on a separate screen is an e,ample o$ a=n? re8uirement. A" output #" input C" processes D" per$ormance 19. All transactions must have audit trails is an e,ample o$ a=n? A" control #" input C" process D" per$ormance re8uirement.

25. Iour primary responsi!ility during an interview is to listen care$ully to the answers* concentrate on what is said and notice any nonver!al communication that ta&es place. )his process is called listening. A" closed #" trac&ed C" open D" engaged 21. A common tool $or showing the distri!ution o$ a 8uestionnaire or sampling results is a vertical !ar chart called a=n? . A" $lowchart #" histogram C" agile method D" 4enn diagram 22. A=n? A" A>C #" )C% C" :DD D" RE< is a top-down representation o$ a $unction or a process.

2'. All o$ the $ollowing are categories o$ system re8uirements E6CE-) A" outputs #" dynamics C" per$ormance D" controls


2(. )he term re$ers to a systemHs a!ility to handle increased !usiness volume and transactions in the $uture. A" scala!ility #" relia!ility C" compati!ility D" applica!ility

2+. >icroso$t has developed a method $or measuring a systemHs total costs and !ene$its* called * which is a $ramewor& to help .) pro$essionals analy3e and optimi3e .) investments. A" )C% #" RE< C" :DD D" A>C 20. ena!le a systems analyst to identi$y a pro!lem* evaluate the &ey elements* and develop a use$ul solution. A" Analytical s&ills #" Artistic s&ills C" .nterpersonal s&ills D" Con$rontational s&ills 21. is a typical e,ample o$ a system re8uirement $or the output category. A" >anu$acturing employees must swipe their .D cards into data collection terminals that record la!or costs #" )he contact management system must generate a daily reminder list $or all sales reps C" )he student records system must allow record access !y either the student name or the student num!er D" )he system must support 2+ users simultaneously 22. %ne o$ the main activities in the systems analysis phase is modeling* which involves $act$inding to descri!e the current system and identi$ication re8uirements $or the new system. A" o!9ective #" re8uirements C" goal-!ased D" user-!ased 29. Asing a=n? * an analyst can show !usiness $unctions and !rea& them down into lowerlevel $unctions and processes. A" A>C #" )C% C" :DD D" RE< '5. A=n? diagram shows the timing o$ interactions !etween o!9ects as they occur. A" timing #" ordering C" orientation D" se8uence

Chapter + Review
1. 7hether to use a decision ta!le or a decision tree o$ten is a matter o$ A" personal pre$erence #" data re8uirements C" cycle times D" num!er o$ domains 2. A set o$ D:Ds provides a A" control #" data .

model that shows what the system does* not how it does it.

C" logical D" physical '. )he sym!ol $or an entity is a A" circle #" triangle C" rectangle D" s8uare * which may !e shaded to ma&e it loo& three dimensional.

(. maintains consistency among a set o$ D:Ds !y ensuring that input and output data $lows align properly. A" Diverging #" #alancing C" Cooping D" Decomposing +. )he data A" dictionary #" store C" diagram D" partition serves as a central storehouse o$ documentation $or an in$ormation system.

0. English is a su!set o$ standard English that descri!es logical processes clearly and accurately. A" Cogical #" Structured C" Simple D" Dictionary

1. A model descri!es how the system will !e constructed. A" physical #" dictionary C" structured D" logical 2. A process is a process that has input* !ut produces no output. A" !lue !o, #" !lac& !o, C" gray hole D" !lac& hole 9. 7hen you e,plode a D:D* the higher-level diagram is called the parent diagram* and the lowerlevel diagram is re$erred to as the diagram. A" su!set #" child C" pet D" su!ordinate 15. re$ers to whether the data element contains numeric* alpha!etic* or character values. A" Domain

#" )ype C" Category D" Rules 11. .teration also is called A" looping #" se8uencing C" partitioning D" decomposing .

12. .n D:Ds* a process sym!ol can !e re$erred to as a * !ecause the inputs* outputs* and general $unctions o$ the process are &nown* !ut the underlying details and logic o$ the process are hidden. A" !lue !o, #" !lac& !o, C" gray hole D" !lac& hole 1'. )o draw a conte,t diagram* you start !y placing a single process sym!ol A" in the center o$ the page #" at the top o$ the page C" at the !ottom o$ the page D" anywhere on the page 1(. Data elements are com!ined into A" domains #" records C" s&eletons D" iterations * also called data structures. .

1+. >odular design is !ased on com!inations o$ three logical structures that does @%) include . A" se8uence #" source C" selection D" iteration 10. )he only disadvantage o$ the $our-model approach is the added logical and physical model o$ the current system. A" time #" cost C" !oth a. and !. D" neither a. nor !. needed to develop a

11. D:Ds use $our !asic sym!ols that represent all E6CE-) the $ollowing A" data $lows #" data stores C" entities D" attri!utes


12. D:D entities also are called A" pseudocode #" terminators C" originators D" sin& holes

* !ecause they are data origins or $inal destinations.

19. also is called e,ploding* partitioning* or decomposing. A" #alancing #" Ceveling C" -rocessing D" Se8uencing 25. A documents the details o$ a $unctional primitive* and represents a speci$ic set o$ processing steps and !usiness logic. A" diagram description #" physical model C" data structure D" process description

Chapter 0 Review
1. A is a command that tells an o!9ect to per$orm a certain method. A" note #" tag C" action D" message 2. %-% methodology is popular !ecause it integrates easily with o!9ect-oriented programming languages such as . A" <ava #" Smalltal& C" -erl D" all o$ the a!ove '. %!9ects within a class can !e grouped into class. A" su!-states #" mini-states C" su!classes D" mini-classes * which are more speci$ic categories within a

(. )he line $rom the actor to the use case is called a=n? use case. A" association #" partition C" instance D" relationship

* !ecause it lin&s a particular actor to a

+. <ust as structured analysis uses D:Ds to model data and processes* systems analysts use the to descri!e o!9ect-oriented systems.

A" A>C #" <ava C" :)D" %%D 0. )he shows what is included in the system =inside the rectangle? and what is not included in the system =outside the rectangle?. A" system diagram #" system !oundary C" system !order D" system template 1. 7hen you identi$y use cases* try to group all the related transactions into A" a single use case #" several use cases C" either a. or !. D" neither a. nor !. 2. All possi!le states must !e documented in the A" state transition #" use case C" o!9ect-model D" logical-model diagram. .

9. Ci&e a D:D* a class diagram is a=n? model* which evolves into a physical model and $inally !ecomes a $unctioning in$ormation system. A" static #" logical C" random D" o!9ect 15. )he end product o$ o!9ect-oriented analysis is an o!9ect A" diagram #" model C" !o, D" use case .

11. A is identi$ied !y a dashed line and represents the time during which the o!9ect a!ove it is a!le to interact with the other o!9ects in the use case. A" li$eline #" timeline C" interaction line D" sa$e line 12. .$ o!9ects are similar to nouns* attri!utes are similar to A" ad9ectives #" ver!s C" adver!s D" punctuation .

1'. A=n? diagram resem!les a hori3ontal $lowchart that shows the actions and events as they occur. A" activity #" action C" movement D" process 1(. )he concept that a message gives di$$erent meanings to di$$erent o!9ects is called A" multi-use #" state versatility C" action $le,i!ility D" polymorphism 1+. All o!9ects within a class share common A" attri!utes #" methods C" !oth a. and !. D" neither a. nor !. . .

10. A class can !elong to a more general category called a A" pseudoclass #" superclass C" su!class D" case


11. 7hen the outcome o$ one use case is incorporated !y another use case* we say that the second case the $irst case. A" uses #" incorporates C" needs D" pairs with 12. A represents the steps in a speci$ic !usiness $unction or process. A" tas& $low #" tas& case C" use $low D" use case 19. .n a class diagram* each class appears as a=n? !y the class;s attri!utes and methods. A" rounded rectangle #" rectangle C" oval D" circle * with the class name at the top* $ollowed

25. A use case diagram is a visual summary o$ several related use cases within a A" system #" su!system C" either a. or !. D" neither a. nor !.


21. is a widely used method o$ visuali3ing and documenting an in$ormation system. A" A>C #" <ava C" A@.6 D" D:D 22. %!9ects can have a speci$ic attri!ute called a=n? status. A" state #" cycle C" instance D" status 2'. A=n? is a group o$ similar o!9ects. A" aggregate #" concatenation C" class D" pac&et 2(. Se8uence diagrams include sym!ols that represent all o$ the $ollowing E6CE-) A" classes #" indices C" li$elines D" messages . * which descri!es the o!9ectHs current

2+. )he num!er o$ needed to descri!e an o!9ect depends on the !usiness re8uirements o$ the in$ormation system and its users. A" attri!utes #" pac&ets C" indices D" &eys 20. 7hen you create a use case diagram* the $irst step is to identi$y the system !oundary* which is represented !y a . A" triangle #" circle C" rectangle D" s8uare 21. .nheritance ena!les an o!9ect to derive one or more o$ its attri!utes $rom a=n? A" user #" precedent C" antecedent D" parent 22. ena!les an o!9ect to derive one or more o$ its attri!utes $rom another o!9ect. A" Concatenation #" Encapsulation C" .nheritance D" -olymorphism 29. An o!9ect has certain A" &eys #" attri!utes C" indices D" pac&ets * which are characteristics that descri!e the o!9ect. .

Chapter 1 Review
1. Another term $or .#S is host. A" managed hosting #" direct hosting C" outside hosting D" enterprise hosting * !ecause system operations are managed !y the outside $irm* or

2. )he choice !etween developing versus purchasing so$tware o$ten is called a A" ma&e or !uy #" !uild or !uy C" either a. or !. D" neither a. nor !.


'. A so$tware pac&age that can !e used !y many di$$erent types o$ organi3ations is called a=n? application. A" vertical #" hori3ontal C" limited D" unlimited (. was @%) listed as a reason that companies would develop so$tware in-house versus !uying it $rom an outside source. A" >eet constraints o$ e,isting systems #" Develop internal resources and capa!ilities C" Cower costs D" Satis$y uni8ue !usiness re8uirements +. Some user applications have power$ul screen and report own data entry $orms and reports. A" generators #" creators C" templates D" $iles that allow users to design their

0. )he o$ a pro9ect is the total value o$ the !ene$its minus the total value o$ the costs* with !oth costs and !ene$its ad9usted to re$lect the point in time at which they occur. A" R%. #" @-4 C" E-S D" .RR 1. 7hen you use an * you already &now the speci$ic product or service you want and you need to o!tain price 8uotations or !ids. A" R:#" R:J C" @-4 D" )C%

2. )he goal o$ systems design is to !uild a system that is A" e$$ective #" relia!le C" maintaina!le D" all o$ the a!ove


9. is a model o$ so$tware deployment where an application is hosted as a service provided to customers over the .nternet. A" SAS #" SaaS C" SSA D" SSaa 15. 7e!-!ased so$tware usually re8uires additional layers* called e,isting so$tware and legacy systems. A" hu!s #" portals C" channels D" middleware 11. )he outsourcing o$ a !asic !usiness process is o$ten called A" #-% #" #%C" .S# D" .#S . * to communicate with

12. A model has a varia!le $ee !ased on the num!er o$ users or wor&stations that have access to the application. A" managed #" su!scription C" service D" cloud computing 1'. )he ma&es* !uilds* and develops in-house so$tware. A" company;s .) department #" company;s ASC" company;s .#S D" all o$ the a!ove 1(. An accounting pac&age is a good e,ample o$ a=n? application !ecause it can !e utili3ed !y many di$$erent !usinesses* or separate divisions that e,ist in large* diversi$ied companies. A" vertical #" hori3ontal C" limited D" unlimited 1+. )he $ollowing is @%) one o$ the three ways the chapter listed as a way to customi3e a so$tware pac&age" . A" Iou can merge two e,isting pac&ages into one solution #" Iou can purchase a !asic pac&age that vendors will customi3e to suit your needs.

C" Iou can purchase the pac&age and ma&e your own modi$ications* i$ this is permissi!le under the terms o$ the so$tware license. D" Iou can negotiate directly with the so$tware vendor to ma&e enhancements to meet your needs !y paying $or the changes. 10. Read-only properties means that users can A" view the data #" change the data C" either a. or !. D" neither a. nor !. .

11. )he Systems Analyst;s )ool&it e,plains how to use three main cost analysis tools that do @%) include . A" pay!ac& analysis #" R%. C" @-4 D" E-S 12. Another valua!le resource is the .nternet !ulletin !oard system that contains thousands o$ $orums* called * that cover every imagina!le topic. A" gatherings #" newsgroups C" social groups D" $eeds 19. )he two ma9or 7e!-!ased development environments are .#>;s 7e!Sphere and >icroso$t;s . A" .@E) #" <avaScript C" %$$ice D" Access 25. development treats the 7e! as the plat$orm* rather than 9ust a communication channel. A" .nternet-!ased #" )raditional C" !oth a. and !. D" neither a. nor !. 21. Although the traditional model o$ so$tware ac8uisition still accounts $or more so$tware ac8uisition* a new model called is changing the picture dramatically. A" Dardware as a Delp #" So$tware as a Service C" -rocessing as a -roduct D" Storage as a Solution 22. A measures the time a pac&age ta&es to process a certain num!er o$ transactions. A" newsgroup #" parameter C" !enchmar& D" de$ault

2'. A user utili3es standard !usiness so$tware* such as >icroso$t 7ord or >icroso$t E,cel* which has !een con$igured in a speci$ic manner to enhance user productivity. A" application #" con$iguration C" inter$ace D" interpolation 2(. * li&e that illustrated in the accompanying $igure* produces an early* rapidly constructed wor&ing version o$ a proposed system.

A" -rototyping #" %utsourcing C" Coding D" #enchmar&ing 2+. .#>Hs is one o$ the ma9or 7e!-!ased development environments. A" 7e!Sphere #" .@E) C" @etSphere D" .7E# 20. A=n" model is an outsourcing $ee model that charges a varia!le $ee !ased on the volume o$ transactions or operations per$ormed !y the application. A" method #" administrative C" transaction D" interpolated 21. .n com!ination* the power$ul tools that systems analysts use to provide a $ramewor& $or rapid* e$$icient so$tware development* is called a environment. A" 2/C #" '/C C" (/C D" +/C 22. .n addition to con$iguring so$tware* an .) sta$$ can create a user * which includes screens* commands* controls* and $eatures that ena!le users to interact more e$$ectively with the application. A" montage #" inde, C" inter$ace D" pac&age 29. /uidelines to $ollow when determining data entry and storage considerations include all o$ the $ollowing e,cept . A" data should !e entered into the system where and when it occurs #" data should !e veri$ied when it is entered C" data duplication should !e encouraged D" data should !e entered into a system only once

'5. Reports that trace the entry o$ and changes to critical data values are called essential in every system. A" audit trails #" protective pathways C" !ac&trac&s D" value trac&s

and are

Chapter 2 Review
1. A chec& tests data items to veri$y that they $all !etween a speci$ied minimum and ma,imum value. A" process-control #" toggle !utton C" data validation D" range 2. 7e!-!ased logs* called A" wogs #" 9ogs C" !logs D" logs * are 9ournals written $rom a particular point o$ view.

'. interaction descri!es the relationship !etween computers and people who use them to per$orm !usiness-related tas&s. A" Duman-computer #" -erson-computer C" Duman--C D" -erson--C (. Companies use various methods to maintain output integrity and security. :or e,ample* every report should include an appropriate title* report num!er or code* printing date* and time period covered. A" output reporting #" output listing C" output control D" output chec&ing +. includes the necessary measures to ensure that input data is correct* complete* and secure. A" %utput control #" .nput control C" either a. or !. D" neither a. nor !. 0. 7hen designing a report* you should prepare a sample report* which is called a to review. A" moc&-up #" prototype C" either a. or !. D" neither a. nor !. 1. An option !utton* or A" television #" D4D player !utton* represents one choice in a set o$ options. * $or users

C" stereo D" radio 2. A report produces one or more lines o$ output $or each record processed. A" summary #" highlights C" control D" detail 9. A chec& identi$ies values that are 8uestiona!le* !ut not necessarily wrong. A" reasona!leness #" process-control C" data validation D" range 15. A is a specially $ormatted digital audio $ile that can !e downloaded !y .nternet users $rom a variety o$ content providers. A" songcast #" podcast C" listencast D" voicecast 11. A inter$ace uses icons* graphical o!9ects* and pointing devices. A" green screen #" 7e! 1.5 C" human-computer D" graphical user 12. %utput protects privacy rights and shields the organi3ation;s proprietary data $rom the$t or unauthori3ed access. A" reporting #" prototyping C" security D" sa$ety 1'. %nce data is entered* the company should store source documents in a sa$e location $or some speci$ied length o$ time according to their policy. A" records retention #" records sa$ety C" records $iling D" records scanning 1(. A$ter a report design is approved* you should document the design !y creating a report $orm* which contains in$ormation a!out the $ields* data types and lengths* and report $re8uency. A" system #" analysis C" design D" prototype 1+. )he main part o$ the $orm* called the 3one* usually ta&es up at least hal$ o$ the space on the $orm and contains captions and areas $or entering varia!le data. A" !ody #" heading C" $ooter D" authori3ation

10. Each line o$ output printed is called a A" detail #" in$ormation C" data D" control


11. A chec& is used $or data items that must have certain values. A" process-control #" reasona!leness C" validity D" range 12. An automated $acsimile or system allows a customer to re8uest a $a, using e-mail* via the company 7e! site* or !y telephone. A" $a, $ast #" $a, mail C" $a, now D" $a,!ac& 19. A chec& improves input 8uality !y testing the data and re9ecting any entry that $ails to meet speci$ied conditions. A" data resources #" data dependency C" data validation D" data 8uality 25. A wor&station is a networ& terminal that supports a $ull-$eatured user inter$ace* !ut limits the printing or copying o$ data* e,cept to certain networ& resources that can !e monitored and controlled. A" dis& #" dis&less C" either a. or !. D" neither a. nor !. 21. Sensitive data can !e coded* in a process called can read it. A" $iltering #" conte,t sa$ety C" spam D" encryption * so only users with decoding so$tware

22. A popular security solution is the use o$ a networ& !ased application* o$ten called a controls access to and $rom wor&station inter$aces. A" port cop #" port protector C" wor&station cop D" wor&station protector 2'. A report displays only those records that meet a speci$ic condition or conditions. A" e,ception #" error C" end D" estimation

* that

2(. /ood $orm ma&es the $orm easy to complete and provides enough space* !oth vertically and hori3ontally* $or users to enter the data.

A" layout #" processing C" data entry D" output 2+. is o$ten used !y large $irms to scan and store images o$ original documents to provide high-8uality records management and archiving. A" C%: #" C%C C" C%S D" C%> 20. Asing input* data entry usually is per$ormed on a speci$ied time schedule* such as daily* wee&ly* monthly* or longer. A" !atch #" intermittent C" se8uence D" com!ination 21. Every page should include a page column headings that identi$y the data. A" $ooter #" header C" control D" signature 22. )he $orm. A" control #" heading C" $ooter D" !ody * which appears at the top o$ the page and includes the

3one usually contains the company name or logo and the title and num!er o$ the

29. Although the vast ma9ority o$ reports are designed graphically* some systems still produce one or more character-!ased reports that use a character set with spacing. A" $i,ed #" varia!le C" either a. or !. D" neither a. nor !. '5. 7hen the value o$ a control $ield changes* a control A" !rea& #" miss C" mista&e D" error occurs.

'1. A chec& is per$ormed on two or more $ields to ensure that they are consistent or reasona!le when considered together. A" dual #" two-time C" com!ination D" readiness '2. design $ocuses on user needs $or screen and printed $orms o$ output. A" %utput #" Aser inter$ace

C" !oth a. and !. D" neither a. nor !. ''. A descri!es how users interact with a computer system* and consists o$ all the hardware* so$tware* screens* menus* $unctions* output* and $eatures that a$$ect two-way communications !etween the user and the computer. A" user scope map #" user inter$ace C" user path D" user process '(. A document is a $orm used to re8uest and collect input data* trigger or authori3e an input action* and provide a record o$ the original transaction. A" report #" se8uence C" source D" output '+. .n addition to !uilt-in design tools* popular so$tware pac&ages such as Reports o$$er power$ul $eatures that help designers deal with pro$essional-level design issues across the enterprise. A" Crystal #" Diamond C" /old D" -latinum '0. )he 3one contains codes* identi$ication in$ormation* num!ers* and dates that are used $or storing completed $orms. A" $ooter #" control C" !ody D" heading '1. Data!ase programs such as >icroso$t Access include a variety o$ report design tools* including a * which is a menu-driven $eature that designers can use to create reports 8uic&ly and easily. A" Data 7i3ard #" Data /enerator C" Report 7i3ard D" Report /enerator '2. A !o, can display messages or provide a place $or a user to enter data. A" option #" te,t C" graphics D" story!oard '9. .n a user-centered system* the distinction !lurs !etween A" input #" output C" !oth a. and !. D" neither a. nor !. and the inter$ace itsel$.

(5. A sales manager might want to &now total sales $or each sales representative* !ut not want a detail report listing every sale made !y them. .n that case* a report is appropriate. A" summary

#" highlights C" error D" regression analysis (1. A control !rea& usually causes speci$ic actions* such as printing su!totals $or a group o$ records. )hat type o$ detail report is called a report. A" control output #" control series C" control !rea& D" control error (2. Companies use various methods to maintain output integrity and security. :or e,ample* every report should include an appropriate title* report num!er or code* printing date* and time period covered. A" output reporting #" output listing C" output control D" output chec&ing ('. Data is the process o$ manually entering data into the in$ormation system* usually in the $orm o$ &eystro&es or mouse clic&s. A" entry #" chec&ing C" layout D" switching ((. #atch A" controls #" 3ones C" !uttons D" tags are totals used to veri$y !atch input.

(+. Data policies and procedures protect data $rom loss or damage* which is a vital goal in every organi3ation. A" control #" process C" security D" integrity (0. /ood inter$ace design is !ased partly on re8uired to carry out the design o!9ectives. A" aesthetics #" inter$ace technology C" ergonomics D" output security (1. 7hen designing data entry screens* provide an on-screen instruction to let users &now the date $ormat* and provide an e,ample i$ the user must enter . A" veri$iers #" clones C" separators D" mas&s (2. A &ey physical design element is the computer system. * which descri!es how users interact with a * which provides the operational structure

A" DC. #" -C. C" A. D" -. (9. .n a well-designed detail report* a $ield called a=n? A" !rea& #" inde,ed C" dominant D" control $ield controls the output.

+1. .n older systems* o$ten the user inter$ace mainly consisted o$ allowed a user to send commands to the system. A" physical #" process C" input D" command

-control screens that

+2. .n a source document* i$ totals are included on a $orm* they appear in the A" calculated #" control C" totals D" heading +'. .nitial screen designs can !e presented to users in the $orm o$ a=n? shows the general screen layout and design. A" story!oard #" turnaround document C" $a,!ac& D" output control


* which is a s&etch that

+(. A com!ination chec& is a data validation chec& that . A" tests data items to veri$y that they $all !etween a speci$ied minimum and ma,imum value #" identi$ies values that are 8uestiona!le* !ut not necessarily wrong C" is per$ormed on two or more $ields to ensure that they are consistent or reasona!le when considered together D" is used $or mandatory data items ++. .n a data entry screen* a=n? is a control $eature that is used to represent on or o$$ status and switches to the other status when clic&ed. A" command !utton #" option !utton C" toggle !utton D" radio !utton

Chapter 9 Review
1. A is a set o$ one or more $ields that can occur any num!er o$ times in a single record* with each occurrence having di$$erent values. A" loop #" repeating group C" variety group D" com!ination $ield 2. * which record details o$ all accesses and changes to the $ile or data!ase* can !e used to recover changes made since the last !ac&up.

A" -rimary ta!le $iles #" Audit log $iles C" #ac&up encryption $iles D" Data warehouse records '. A $ile is created $or archiving purposes. A" wor& #" ta!le C" security D" history (. During the system design phase* you use structures. A" &ey $iles #" &ey records C" &ey $ields D" &ey ta!les to organi3e* access* and maintain data

+. descri!es the numeric relationship !etween two entities and shows how instances o$ one entity relate to instances o$ another entity. A" Cardinality #" ERD C" )he primary &ey D" @ormali3ation 0. codes distinguish items !y using a series o$ su!groups o$ digits. A" Signi$icant digit #" Action C" Derivation D" Cipher 1. A=n? date is the total num!er o$ days $rom some speci$ic !ase date. A" arithmetic #" control C" a!solute D" varia!le 2. Data pro!lems can occur i$ updates are not applied in every $ile. A" structure #" security C" integrity D" redundancy 9. #ecause intranets and e,tranets use the same protocols as the .nternet* they are called A" protocol-centric #" clientBserver $ocused C" middleware $ocused D" 7e!-centric .

15. A=n? relationship e,ists when e,actly one o$ the second entity occurs $or each instance o$ the $irst entity. A" one-to-one #" one-to-many C" many-to-many D" none o$ the a!ove

11. Some a!!reviation codes are called letters that are easy to remem!er. A" mnemonic #" harmonic C" rhyming D" alpha!etic 12. E#CD.C and ASC.. re8uire eight !its* or A" one #" two C" three D" $our

codes !ecause they use a speci$ic com!ination o$

!yte=s?* $or each character.

1'. A language controls data!ase operations* including storing* retrieving* updating* and deleting data. A" data manipulation #" data 8uery C" data in$ormation D" data communication 1(. A &ey is a $ield in one ta!le that must match a primary &ey value in another ta!le in order to esta!lish the relationship !etween the two ta!les. A" primary #" secondary C" $oreign D" re$erential 1+. A ta!le is i$ it does not contain a repeating group. A" $irst normal $orm #" second normal $orm C" concatenated D" considered invalid 10. Data so$tware loo&s $or meaning$ul patterns and relationships among data. A" process #" validation C" mart D" mining 11. $ields are special $ields within data records to provide additional control or security in$ormation. A" -rimary #" Audit C" Chec& D" Cimit 12. )he inherent e$$iciency o$ high-volume processing on larger computers is called A" $le,i!le data sharing #" data independence C" controlled redundancy D" economy o$ scale 19. A record* also called a A" tuple #" couple C" ta!le .

* is a set o$ related $ields that descri!es one instance o$ an entity.

D" la!el 25. A D#>S is usually managed !y a person called a A" data!ase administrator #" $ile administrator C" system administrator D" security administrator 21. Any $ield that could serve as a primary &ey is called a A" candidate #" summary C" potential D" primary .


22. A speci$ies the $ields and identi$ies the primary &ey in a particular ta!le or $ile. A" output design #" mar&et !as&et design C" ta!le design D" diagram design 2'. A is an integrated collection o$ data that can include seemingly unrelated in$ormation* no matter where it is stored in the company. A" data warehouse #" data storehouse C" data!ase D" data!ase set 2(. .n the event o$ a $ile catastrophe* procedures can !e used to restore the $ile or data!ase to its current state at the time o$ the last !ac&up. A" recovery #" reinstatement C" !ac&-up D" security 2+. A $ile stores records that contain day-to-day !usiness and operational data. A" master #" ta!le C" transaction D" wor& 20. A=n? A" ta!le #" entity C" $ield D" record is a person* place* thing* or event $or which data is collected and maintained.

21. A relationship e,ists when one instance o$ the $irst entity can relate to many instances o$ the second entity* and one instance o$ the second entity can relate to many instances o$ the $irst entity. A" one-to-one #" one-to-many C" many-to-many D" none o$ the a!ove 22. codes com!ine data $rom di$$erent item attri!utes* or characteristics* to !uild the code. A" Signi$icant digit #" Action

C" Derivation D" Cipher 29. A $ormat uses only 10 !its to represent the num!er 12*'(+ in !inary $orm. A" integer #" !inary storage C" long integer D" character-!ased '5. A consists o$ lin&ed ta!les that $orm one overall data structure. A" data!ase structure #" data!ase system C" open structure D" open system '1. A is a te,t document written in D)>C. A" 7e! !rowser #" 7e! page C" 7e! site D" 7e! server '2. 7ithout re$erential integrity* you might have a sales order called a=n? related customer. A" orphan #" loop C" gap D" error ''. A A" &ey #" state C" code D" unit is a set o$ num!ers or letters that represent a data item. * !ecause it has no

'(. storage re$ers to data that a user can view* understand* and access* regardless o$ how or where that in$ormation actually is organi3ed or stored. A" Cogical #" -hysical C" either a. or !. D" neither a. nor !. '+. A is a view o$ the data!ase used !y one or more systems or users. A" schema #" su!schema C" class D" su!class '0. A non&ey $ield is any $ield that is @%) a A" primary &ey #" candidate &ey C" !oth a. and !. D" neither a. nor !. .

'1. :ield 6 is on $ield I i$ the value o$ $ield 6 depends on the value o$ $ield I. A" $unctionally independent #" $unctionally dependent

C" either a. or !. D" neither a. nor !. '2. Di$$erent privileges* also called system. A" passwords #" user .Ds C" $ilters D" permissions * can !e associated with di$$erent users o$ a computer

'9. A=n? is a graphical model o$ an in$ormation system that depicts the relationships among system entities. A" SJC #" %CE C" %D#C D" ERD (5. 7ith a=n? A" SJC #" .DE C" J#E D" interpolated language* the user provides an e,ample o$ the data re8uested.

(1. %ne common method o$ indicating is called crow;s $oot notation !ecause o$ the shapes* which include circles* !ars* and sym!ols that indicate various possi!ilities. A" scala!ility #" compati!ility C" cardinality D" $unctionality (2. 7hen a system reads a physical record* it loads the data $rom storage into a segment o$ computer memory. A" client #" ta!le C" password D" !u$$er * which is a

Chapter 15
1. A $orm o$ wireless transmission called is very popular $or short-distance wireless communication that does not re8uire high powe A" #luetooth #" AS# C" R:.D D" >!ps 2. .n the section in a typical system design speci$ication* startup processing* initial data entry or ac8uisition* user training re8uirements* and so$tware test plans are speci$ied. A" System Environment #" E,ecutive Summary C" System Components D" .mplementation Re8uirement

'. )he A" #SS #" ESS C" .SS D" >.>%

technology is compati!le with earlier 252.11 versions

(. A * such as that illustrated in the accompanying $igure* has a central networ&ing device that manages the networ& A" hierarchical networ& #" star networ& C" !us networ& D" ring networ&

+. .n the %S. =open system interconnection" model* the application layer . A" de$ines speci$ic methods o$ transmitting data over the physical layer #" provides networ& services re8uested !y a local wor&station C" de$ines control structures that manage the communications lin& !etween computers D" contains physical components that carry data 0. )he ma,imum speed $or wireless networ& standards is measured in A" #ps #" /!ps C" >!ps D" )!ps 1. )o increase !andwidth* the .EEE created two improvement in transmission speed. A" amendments #" options C" CA@s .

to its initial standard to o$$er considera!le

D" versions 2. )he section in a typical system design speci$ication descri!es the constraints* or conditions* a$$ecting a system* including any re8uirements that involve operations* hardware* systems so$tware* or security. A" )ime and Cost Estimates #" System Environment C" E,ecutive Summary D" System Components 9. During !usiness hours* a salesperson can enter a sale on a terminal* which is part o$ an in$ormation system that handles daily sales transactions and maintains the online inventory $ile. A" -%S #" !atch C" topological D" portal 15. All o$ the $ollowing use access points e,cept A" #SS #" ESS C" .SS D" none o$ the a!ove .

11. 7hen using the con$iguration* a central wireless device called an access point is used to serve all wireless clients A" #asic Service Set #" E,tended Service Set C" .ndependent Service Set D" Dependent Service Set 12. An Service Set is made up o$ two or more #asic Service Set networ&s. A" Distri!uted #" E,tended C" Dependent D" .ndependent 1'. .n addition to 7i-:i* another $orm o$ wireless transmission called is very popular $or short-distance wireless communication that does not re8uire high power. A" #luetooth #" Redtooth C" #lueconnect D" Redconnect 1(. translates the logical design o$ an in$ormation system into a physical structure that includes hardware* so$tware* networ& support* processing methods* and security. A" @etwor& architecture #" System architecture C" %pen architecture D" Data architecture 1+. A speci$ic hardware and so$tware environment is also called a A" plat$orm #" master C" setting D" $oundation .

10. Scala!ility is also called A" e,tensi!ility #" switcha!ility C" sharing D" n-tier


11. .#> uses the term to descri!e .nternet-!ased solutions that allow sellers and !uyers to automate procurement processes and achieve su!stantial !ene$its. A" e-mar&etplaces #" e-resources C" e-sales$orce D" e-networ&ing 12. A is a computer that supplies data* processing services* or other support to one or more computers. A" server #" client C" either a. or !. D" neither a. nor !. 19. .n addition to centrali3ed data processing* early systems per$ormed all data input and output at a central location* o$ten called a data processing . A" mar&etplace #" portal C" center D" hu! 25. As technology !ecame availa!le* companies resolved the pro!lems o$ stand-alone computing !y 9oining clients into a that allows sharing o$ data and hardware resources. A" cloud networ& #" peer-to-peer networ& C" 7e!-centric networ& D" local area networ& 21. .n a design* also called a $ile sharing architecture* an individual CA@ client has a copy o$ the application program installed locally* while the data is stored on a central $ile server. A" $ile server #" data server C" independent server D" peer-to-peer server 22. )he stores the data and provides data access and data!ase management $unctions. A" client #" server C" either a. or !. D" neither a. nor !. 2'. A A" $at #" thin C" tall D" short client design locates all or most o$ the processing logic at the server.

2(. Iou can thin& o$ the middle layer in an n-tier design as a=n? application logic* or !usiness logic* re8uired !y the system. A" $unctional server #" application server C" data server D" $ile server

* !ecause it provides the

2+. <ust as processing can !e done at various places in a clientBserver design* data can !e stored in more than one location using a distri!uted . A" data!ase centric #" data!ase access C" data!ase gateway D" data!ase management 20. .n the past* a device &nown as a was used to connect star networ&s* !ut a switch o$$ers advanced technology and much !etter per$ormance. A" portal #" peer networ& C" gateway D" hu! 21. A local area networ& is relatively ine,pensive to install and is well-suited to wor&groups and users who are not anchored to a speci$ic des& or location. A" cordless #" metropolitan C" peer-!ased D" wireless 22. )he #asic Service Set =#SS? in also called the A" dependent #" independent C" structured D" in$rastructure mode.

Chapter 11 Review
1. .n a structure chart* a line* which has a diamond on one end* indicates that a control module determines which su!ordinate modules will !e invo&eD" A" method #" condition C" class D" attri!ute 2. During testing* programmers must test programs that interact with other programs and $iles individually* !e$ore they are integrated into the system. A" unit #" integrated C" lin& D" outcome

'. >any organi3ations re8uire a more $ormal type o$ des& chec&ing called a=n? A" design #" integrated C" code D" interpolated


(. )he o!9ective o$ testing is to identi$y and eliminate e,ecution errors that could cause a program to terminate a!normally* and logic errors that could have !een missed during des& chec&ing. A" unit #" integration C" user D" system +. is the process o$ reviewing the program code to spot logic errors* which produce incorrect results. A" Cogic review #" Code review C" Results wal&through D" Des& chec&ing 0. descri!es the relationships and interdependence among modules. A" Resolution #" >odularity C" Coupling D" Dynamism 1. .n programming* two programmers wor& on the same tas& on the same computer. A" parallel #" duo C" dou!le D" driver 2. )o achieve !etter* $aster* and less e,pensive methods o$ so$tware development* designed a Capa!ility >aturity >odel =C>>?K* which improves 8uality* reduces development time* and cuts costs. A" .S% =.nternational %rgani3ation $or Standardi3ation? #" SE. =So$tware Engineering .nstitute? C" %D#C =%pen Data!ase Connectivity? D" CA.) =Center $or the Application o$ .n$ormation )echnologies? 9. )he changeover method allows the new system to !e implemented in stages* or modules. A" phased operation #" parallel operation C" pilot operation D" direct cutover 15. A class diagram includes the class A" attri!utes #" events C" methods D" characters * which represent the program logiC"

11. %-% analysis ma&es it easier to translate an o!9ect model directly into an o!9ect-oriented programming language. )his process is called o!9ect-oriented . A" changeover #" development C" trac&ing D" cycling 12. measures a module;s scope and processing characteristics. A" Stimulation #" Cohesion C" Code review D" .ntegration 1'. A evaluation assesses the overall 8uality o$ the in$ormation system. A" pre-implementation #" post-implementation C" pilot-implementation D" testing-implementation 1(. A control couple shows a message* also called a another. A" cycle #" data C" status D" cutover $lag* which one module sends to

1+. )he cutover approach causes the changeover $rom the old system to the new system to occur immediately when the new system !ecomes operational. A" direct #" parallel C" pilot D" phased 10. )ypically* a higher-level module* called a A" control #" terminal C" iteration D" method module* directs lower-level modules.

11. )he environment $or the actual system operation is called the A" operational #" production C" either a. or !. D" neither a. nor v.


12. can !e used to model !usiness logic $or an in$ormation system. A" Decision ta!les #" Decision trees C" either a. or !. D" neither a. nor !. 19. De$ect trac&ing so$tware documents and trac&s replacement code* called A" stu!s #" units .

C" $lags D" patches 25. A module consists o$ related program code organi3ed into understand and maintain. A" small #" large C" either a. or !. D" neither a. nor !. units that are easy to

21. )esting two or more programs that depend on each other is called integration testing* or testing. A" stu! #" des& C" loop D" lin& 22. >ore recently* the So$tware Engineering .nstitute esta!lished a new model* called Capa!ility >aturity >odel * that integrates so$tware and systems development into a much larger $ramewor& called process improvement. A" .nternational #" Cohesion C" -rocess D" .ntegration 2'. %!9ects contain !oth data and program logic* called A" methods #" conditions C" attri!utes D" tests 2(. During systems implementation* the system. A" system design speci$ication #" R:J C" R:D" system structure chart .

serves as a !lueprint $or constructing the new

2+. A condition line indicates that a control module determines which invo&ed* depending on a speci$ic condition. A" parent #" peer C" su!ordinate D" pilot

modules will !e

20. )he operation changeover method re8uires that !oth the old and the new in$ormation systems operate $ully $or a speci$ied perioD" A" direct #" parallel C" pilot D" phased 21. A success$ul in$ormation system re8uires $or users* managers* and .) sta$$ mem!ers so people understand the system and &now how to use it e$$ectively. A" trac&ing

#" $lowcharting C" code reviews D" training 22. Structured application development usually involves a general design to a detailed structure. A" !ottom-up #" top-down C" parallel process D" parent-child approach* which proceeds $rom a

29. Compiling the program using a CASE tool or a language compiler detects synta, errors* which are errors. A" cycle #" math data C" testing D" language grammar '5. )he main o!9ective o$ A" systems implementation #" 8uality assurance C" status $lags D" partitioning is to avoid pro!lems or to detect them as soon as possi!le.

Chapter 12 Review
1. A is an unauthori3ed attempt to increase permission levels. A" privilege escalation attac& #" denial-o$-service attac& C" )ro9an horse D" identity management invasion 2. also can !e used to measure the 8uality o$ .) support or services !y measuring the time $rom a user re8uest $or help to the resolution o$ the pro!lem. A" #andwidth #" )urnaround time C" )hroughput D" Response time '. Ris& develops sa$eguards that reduce ris&s and their impact. A" assessment #" management C" identi$ication D" control (. )he is the con$iguration o$ a system documented at the !eginning o$ the pro9ect and consists o$ all necessary system re8uirements and design constraints. A" $unctional !aseline #" operational !aseline C" allocated !aseline D" product !aseline +. shi$ts the ris& to another asset or party* such as an insurance company* in ris& control. A" Acceptance #" Avoidance

C" >itigation D" )rans$erence 0. )he release methodology o$$ers all o$ the $ollowing advantages e,cept . A" all changes are tested together !e$ore a new system version is released #" costs are reduced !ecause only one set o$ system tests is needed C" documentation changes are coordinated and !ecome e$$ective simultaneously D" new $eatures or upgrades are availa!le more o$ten 1. prevents unauthori3ed users $rom creating* modi$ying* or deleting in$ormation. A" Availa!ility #" .ntegrity C" Con$identiality D" Ris& management 2. Depending on the system* !andwidth might !e measured in any o$ the $ollowing e,cept A" L!ps =&ilo!its per second. #" >!ps =mega!its per second. C" D!ps =deci!its per second. D" /!ps =giga!its per second. .

9. .n a typical system* the initial version o$ the system is 1.5* and the release that includes the $irst set o$ maintenance changes is version . A" 1.5 #" 1.1 C" 2.5 D" 2.1 15. means that nothing is done* in ris& control. A" Acceptance #" Avoidance C" >itigation D" )rans$erence 11. )he triangle has three main elements o$ system security" con$identiality* integrity* and availa!ility. A" C-A #" C.A C" CS. D" C.S 12. includes monitoring the system $or signs o$ trou!le* logging all system $ailures* diagnosing the pro!lem* and applying corrective action. A" Error analysis #" :ault analysis C" Error management D" :ault management 1'. 7hen a methodology is used* all noncritical changes are held until they can !e implemented at the same time. A" in-house development #" version control C" maintenance release D" !ug $i, 1(. )he maintenance team includes a system administrator and one or more .

A" systems analysts #" programmers C" !oth a. and !. D" neither a. nor !. 1+. include items such as supplies* e8uipment rental* and so$tware leases. A" >aintenance costs #" %perational costs C" Connection costs D" Aser costs 10. re$ers to copying data in prescri!ed intervals* or continuously. A" Security #" Classi$ying C" #ac&up D" Recovery 11. measures actual system per$ormance under speci$ic circumstances and is a$$ected !y networ& loads and hardware e$$iciency. A" #andwidth #" )hroughput C" Response time D" Answer time 12. A is a $ormal re$erence point that measures system characteristics at a speci$ic time. A" !aseline #" $oundation C" !ottom line D" core 19. A programmer concentrates on operating system so$tware and utilities. A" systems #" security C" applications D" data!ase 25. maintenance reduces the possi!ility o$ $uture system $ailure. A" Corrective #" Adaptive C" -er$ective D" -reventive 21. .$ signi$icant changes ta&e place in the e,isting system* the .) department might develop a that could include online support* a special 7e! site* and $ormal training sessions. A" user training pac&age #" management training pac&age C" !uyer training pac&age D" seller training pac&age 22. protects in$ormation $rom unauthori3ed disclosure and sa$eguards privacy. A" Con$identiality #" Availa!ility C" .ntegrity D" :le,i!ility

2'. )o measure system per$ormance* many $irms use tests to evaluate system per$ormance and capacity. A" $oundation #" !enchmar& C" comparison D" !aseline

testing* which uses a set o$ standard

2(. .n a typical system* the initial release version o$ the system is A" 5.5 #" 5.1 C" 1.5 D" 15.5 2+. A manages computer and networ& systems. A" system supervisor #" system administrator C" system analyst D" system programmer


20. activities include changing programs* procedures* or documentation to ensure correct system per$ormance. A" >aintenance #" %perational C" Connection D" Analyst 21. A networ& is a dedicated connection* similar to a leased telephone line. A" private #" pu!lic C" virtual D" protected 22. #andwidth re8uirements are made in A" !its per millisecond #" !its per second C" pac&ets per millisecond D" pac&ets per second .

29. )he !aseline documents the system at the end o$ the design phase. A" $unctional #" allocated C" product D" $ormal '5. A=n? programmer $ocuses on creating and supporting large-scale data!ase systems. A" systems #" security C" applications D" data!ase