You are on page 1of 6

Shows the timing of interactions between objects as they occur.

- Sequence Diagram

Dynamic model of a use case, showing the interaction among classes during a specified time
period.
- Sequence Diagram

When you phrase your questions, you should avoid leading questions that suggest or favor a
particular reply.(True/False)

- True

_________________ states that the number of transistors on an integrated circuit would double about
every _________ months

- Moore's Law, 24 months

Involves fact-finding to describe the current system and identification of the requirements for the
new system, such as outputs, inputs, processes, performance, and security

- Requirements Modeling

The black box concept is an example of _____________, which means that all data and
methods are self-contained.

- Encapsulation

When studying an information system, you should collect examples of actual documents using a
process called

- Sampling

Planned meeting during which you obtain information from another person.

- Interview

A _______________is an early working version of an information system.

- Prototype
Resembles a horizontal flowchart that shows the actions and events as they occur. It also show
the order in which the actions take place and identify the outcomes.

- Activity Diagram

Logical structure that shows every combination of conditions and outcomes.

- Decision Table

Reasons, or justification, for a proposal.

- Business Case

questions are closed-ended questions that ask the person to evaluate something by providing limited
answers to specific responses or on a numeric scale.

- Range-of-response

You must concentrate on what is said and notice any nonverbal communication that takes
place. This process is called ______________.

- Engage Listening

Refers to a systemâ s ability to handle increased business volume and transactions in the
future.

- Scalability

A subset of standard English that describes logical processes clearly and accurately.

- Structure English

Traditionally, a company either developed its own information systems, called ______________

- In-house Applications

Combines information technology, people, and data to support business requirements.

- information system

A ____________ is a top-level view of an information system that shows the systemâ s


boundaries and
scope.

- Context Diagram
Central storehouse of information about the systemâ s data.
- Data Dictionary

In DFDs, a process symbol can be referred to as a ____________

- Black Box

Enables an object, called a child, to derive one or more of its attributes from another object,
called a parent.

- Inheritance

_____________ is a set of related components that produces specific results.

- System

______________ produces a graphical representation of a concept or process that systems


developers can analyze, test, and modify.

- Modeling

Document containing a number of standard questions that can be sent to many individuals.

- Questionnaire

A _____________ is a visual summary of several related use cases within a system or


subsystem.

- Use Case Diagram

Technology that uses RFID tags to identify and monitor the movement of each individual
product, from the factory floor to the retail checkout counter. (Note: Answer should be in words
and not Abbreviation)

- Electronic Product Code

The concept that a message gives different meanings to different objects.


- Polymorphism

A ____________ is a top-level view of an information system that shows the systemâ s


boundaries and scope.

- Context Diagram
A requirement or condition that the system must satisfy or an outcome that the system must achieve.

- Constraints

company-wide applications are called ____________________

- Enterprise applications

BPMN stands for ____________.

- Business Process Modeling Notation

Describes how instances of one class relate to instances of another class.

- Cardinality

_________________ is data that has been transformed into output that is valuable to users.

- Information

Projects where management has a choice in implementing them.

- Discretionary Projects

Describes how users interact with a computer system

- User Interface

A _____________, describes the information that a system must provide.

- Business Model

Shows how data moves through an information system but does not show program logic or
processing steps.

- Data Flow Diagram

describes the relationship between computers and people who use them to perform their jobs

- HCI
Meaningful combination of related data elements that is included in a data flow or retained in a
data store.

- Record

Knowledge management systems are called _____________ because they simulate human reasoning.

- Expert System

A characteristic or feature that must be included in an information system to satisfy business


requirements and be acceptable to users.

- System Requirement

When studying an information system, you should collect examples of actual documents using a
process called __________

- Sampling

__________ questions are closed-ended questions that ask the person to evaluate something by
providing limited answers to specific responses or on a numeric scale.

- Range-Of-Response

Involves fact-finding to describe the current system and identification of the requirements for the
new system, such as outputs, inputs, processes, performance, and security.

- Requirement Modeling

______________manages the hardware components, which can include a single workstation or


a global network with many thousands of clients

- System Software

Shows how data moves through an information system but does not show program logic or
processing
steps.

- Data Flow Diagram


_________ is another agile approach. The name is derived from the rugby term.

- Scrum

graphical representation of the conditions, actions, and rules found in a decision table.

- Decision Tree

__________ questions encourage spontaneous and unstructured responses.

- Open Ended

Top managers develop long-range plans, called _____________, which define the company s
overall mission and goals.

- Strategic Plans

Refers to hardware, software, and procedural controls that safeguard and protect the system
and its data from internal or external threats.

- Security

The deliverable, or end product, of the systems analysis phase is a ____________

- Systems Requirement Document

Describes an information system by identifying things called objects

- None of the Choices

A characteristic or feature that must be included in an information system to satisfy business


requirements and be acceptable to users.

- System Requirement

Defines specific tasks that an object can perform.

- Methods

manages the hardware components, which can include a single workstation or a global network
with many thousands of clients

- System Software

You might also like