Professional Documents
Culture Documents
System Analysis and Design
System Analysis and Design
Design Examination
Booklet
Contributed by:
1
1- Globalization and the increasing internet users around the world, give IT budgets
a) high priority
b) less important
c) more component
d) more productivity
a) server
b) information systems
c) system component
d) software systems
a) CASE
b) Modeling
c) Internet based application
d) All of the above
5.The development of database management systems helped shift the focus of systems
development from
6.The operating systems for computers moved away from line prompt interface to windows and
icon based interfaces in
a) 1960s
b) 1970s
c) 1980s
d) 1990s
2
7. now-a days The focus on developing systems for the
a) Non-Functional decomposition
b) Functional decomposition
c) Rules decomposition
d) Constraints decomposition
a) hardware
b) software
c) people
d) data
10. To do business process modeling the analyst needs business profile and.
a) business constraints
b) business rules
c) business models
d) business drivers
12. Which business driver require support of multiple languages, currency exchange rates,
business cultures
3
d) Knowledge Asset Management
13. Which business driver require Need to incorporate stringent security and privacy controls
14. _____________ a commercial exchange between businesses conducted over the internet.
a) C2C
b) B2B
c) C2B
d) B2C
17. A(n) ____________ focus on the overall business enterprise and use IT to set the
company’s course and directions
a) Operational
b) Top manager
c) Supervisor
d) Middle Manager
18. An information system that captures the expertise of workers and then simulates that
expertise to the benefit of none experts is.
4
19. A(n) ____________ Provide direction, necessary resources, and performance feedback to
supervisors
a) Operational
b) Top manager
c) Supervisor
d) Middle Manager
a) Structured Analysis
b) Prototyping
c) Joint Application Development
d) Process model
21. A(n) ____________ Framework for systems development and support a wide variety of
design methodologies
a)CASE
b)Modeling
c)Strategic planning
d)TP
22. A(n) __________ approach uses the organization’s management level as the base for the
information system.
a) bottom up approach
23. A(n) ____________ describes the design and protocols of telecommunications links.
a) object model
b) process model
c) network model
d) prototype model
a) System Planning
b) System Analysis
c) System Design
5
d) Systems Implementation
a) System Planning
b) System Analysis
c) System Design
d) Systems Implementation
a) System Planning
b) Logical design
c) Physical design
d) Systems Implementation
27. During system _________ phase users, managers, IT staff trained to operate and support the
system.
a) System Planning
b) System Analysis
c) System Design
d) Systems Implementation
28. An information system called a(n) ____________ is one that was developed by the company
that will use it.
a) in-house application
b) on-house application
c) CASE tools
d) software packages
a) server
b) system
c) component
d) IT
31. A company that manufactures and sells products is called a(n) ____________ company.
a) I-commerce
6
b) B2C
c) service-oriented
d) product-oriented
32. Knowledge management systems are called ___________ because they simulate human
reasoning by combining a knowledge base and inference rules that determine how the knowledge
is applied.
a) expert systems
b) enterprise systems
c) productivity systems
d) reasoning systems
32. Knowledge management systems are called ___________ because they simulate human
reasoning by combining a knowledge base and inference rules that determine how the knowledge
is applied.
e) expert systems
f) enterprise systems
g) productivity systems
h) reasoning systems
33. A(n) ____________ is usually manage a group of operational users and are responsible for
their performance
a) Operational
b) Top manager
c) Supervisor
d) Middle Manager
34. an information system that captures and processes data about business transactions
7
36. _____________ a commercial exchange between businesses and consumers conducted
over the internet.
a) C2C
b) B2B
c) C2B
d) B2C
37. ____________ is a technique that uses powerful software, to help systems analysts develop
and maintain information systems.
a) CASE
b) Modeling
c) Strategic planning
d) TP
38. A(n) ____________ describes the design and protocols of telecommunications links.
a) object model
b) process model
c) network model
d) prototype model
39. A(n) ____________ Describes the logic that programmers use to write code modules .
a) object model
b) process model
c) network model
d) prototype model
40. A(n) ____________ Describes the information that a system must provide.
b) process model
c) network model
d) prototype model
41. Which of the following focus on defining the activities associated with the system
a) Data-centered Methodologies
b) Process-centered Methodologies
c) Object-oriented Methodologies
d) Joint Application Development
8
42. Create a blueprint that will satisfy all documented requirements Would most likely be done
during:
a) System Planning
b) System Analysis
c) System Design
d) Systems Implementation
b) Prototyping
c) Object model
d) Process model
a) A Process-Centered methodologies
b) A Data-centered Methodologies
c) A Combination of Data and Process methodologies
d) An Object-oriented Methodologies
47.______________ created to radically decrease the time needed to design and implement
information systems.
a) JAD
b) RAD
9
c) Structured Analysis
d) Object-oriented (O-O) analysis
a) Improved service
b) Bad training
c) Low salary
d) Technology
a) Systems request
b) Feasibility study
d) Project definition
52. Which of the following is not an internal factor that will affect a project?
a) Strategic plan
b) Top managers
c) User requests
d) Competitors
10
53. Which of the following is considered when analyst analyze risk
a) Probability
b) scalability
c) durability
d) Reliability
54. _______________ feasibility determines if the human resources are available to operate the
system once it has been installed
a) Operational
b) Technical
c) Economic
d) Schedule
55. Which of the following is a Point to be considered when assessing technical feasibility?
a) Management support
b) Users training
a) Suppliers support
b) Users training
57. Application software maintenance, incremental data storage expense, and incremental
communications are examples of:
a) intangible costs
b) recurring costs
c) tangible benefits
d) one-time costs
58. System Development, new hardware and software purchases, and user training are
examples of.
a) intangible costs
11
b) recurring costs
c) tangible benefits
d) one-time costs
a) intangible costs
b) recurring costs
c) tangible benefits
d) one-time costs
60. Cost reduction and avoidance, error reduction, and increased speed of activity are examples
of:
a) intangible costs
b) tangible costs
c) tangible benefits
d) intangible benefits
61. Project management begins with a systems __________, and continues until the project is
completed or terminated
a) request
b) cost
c) analysis
d) design
12
62. A requirement or condition that a new system must satisfy or an outcome that it must achieve
is referred to as a _____.
a) goal
b) constraint
c) process
d) scope
63. In structured analysis and design ______________ maps the functional requirements to the
hardware and software
a) Environmental Model
b) Behavioral Model
c) Implementation Model
d) Initial model
64. The focus on defining the activities associated with the system is a __________
methodology.
a) data centered
b) life cycle
c) object-oriented
d) process centered
65. A formal step-by-step approach to the systems development life cycle that move logically
from on phase to the next is called _____.
a) ad hoc design
b) RAD design
c) agile development
d) structured design
66. The advantage of this development methodology is that, Results in solid, well-constructed
systems
a) Waterfall Development
b) Parallel Development
d) agile development
13
67. The advantage of this development methodology is that dramatic time savings the systems
development effort
a) Waterfall Development
b) Parallel Development
d) agile development
68. In structured analysis and design Data Flow Diagram is a (n) ____________.
a) Environmental Model
b) Behavioral Model
c) Implementation Model
d) Initial model
69. The disadvantage of this development methodology is that, the design must be completely
specified before programming begins.
a) Waterfall Development
b) Structured methodology
d) agile development
70. The disadvantage of this development methodology is that identifying the most important
subset of requirements at any stage is a tedious task.
a) Waterfall Development
b) Structured methodology
c) Prototyping methodology
71. ____________ methodology performs the analysis, design and implementation phases
concurrently.
a) Waterfall Development
b) Structured methodology
c) Prototyping methodology
14
72. Whose JAD participant provide enterprise level authorization and support for the project
a) user
b) analyst
c) top management
d) manager
73. _______ skills enable you to understand the organization and its functions, to identify
opportunities and problems, and to analyze and solve problems.
a) Analytical
b) Technical
c) Management
d) Interpersonal
74. _______ skills help you understand the potential and limitations of information technology.
a) Analytical
b) Technical
c) Management
d) Interpersonal
a) Analytical
b) Technical
c) Management
d) Interpersonal
76. Ability to anticipate what might go wrong in a project and minimize risk and/or minimize
damage that might result, is a __________
a) resource management
b) project management
c) risk management
d) change management
15
77. In fact finding Performance describes
a) hardware, software, and procedural controls that protect the system and
data from internal or external threats
d) the logical rules that are applied to transform the data into information
79. The automated software tool used by systems analysts to develop information systems are
called
a) CASE tools
b) CSAE tools
c) CESA tools
d) CSEA tools
a) Diagramming tools
b) Documentation generators
c) Code generators
16
82. The following question is an example of which system requirements ‘’The system must
support 25 users online simultaneously’’
a) Processes
b) Performance
c) Controls
d) Inputs
83. The following question is an example of which system requirements ‘’ The system must
provide log-on security at the operating system level and at the application level’’
a) Processes
b) Performance
c) Controls
d) Inputs
84. _______ skills help you manage projects, resources, risk, and change.
a) Analytical
b) Technical
c) Management
d) Interpersonal
85. _______ skills help you work with end users as well as with other analysts and programmers.
a) Analytical
b) Technical
c) Management
d) Interpersonal
17
87. The following question is an example of an/a _________ interview question:
“What added features would you like to have in the new system?”
a) closed-ended
b) open-ended
c) random
d) operational
d) May take too much time for the amount of useful information gained
c) titles and names of key individuals who have an interest in relevant existing
systems
18
92. The Simplest method of probability sampling is
a) Stratified sample
b) Systematic sample
c) Random sample
d) arranged sample
94. Which of the following is not a traditional method of collecting system requirements?
a) interviewing
b) RAD
c) observations
d) document analysis
c) titles and names of key individuals who have an interest in relevant existing
systems
19
97. The biggest difference between collecting data by questionnaire or by interview is:
a) Systematic sample
b) Stratified sample
c) Random sample
d) Biological sample
c) appropriate when you want to understand a larger process or draw out the
interviewee's opinions, attitudes, or suggestions
20
102. DFDs use _____ basic symbols
a) two
b) three
c) four
d) five
103. A (n) ________ is a path for data to move from one part of the information system to anther
a) process
b) data flow
c) data store
d) external entity
104. A (n)________ symbol is a rectangle, which may be shaded to make it look three-
dimensional
a) process
b) data flow
c) data store
d) external entity
105. A (n) ________ name identifies a specific function and consists of verb, and an adjective, if
necessary
a) process
b) data flow
c) data store
d) external entity
106. The context diagram is the _______ DFD in every business process
a) first
b) second
c) third
d) fourth
21
107. Processes that do not create a child diagram are called.
a) Functional primitive
b) functional diagram
c) child processes
a) diagram 1
b) diagram 2
c) context diagram
d) child diagram
109. ___________ maintains consistency among a set of DFDs by ensuring that input and output
data flows align properly.
a) Leveling
b) Balancing
c) Fronting
d) Iterating
a) Exploding
b) partitioning
c) decomposing
111. When a process can be accurately described by a single active verb with a singular object,
this indicates that
b) no need to diagram 0
22
112. A ____________ is the term used to describe a central storehouse of information about a
system's data.
a) data house
b) data base
c) data dictionary
d) data warehouse
a) using psuedocode
114. Which of these is included in the data dictionary entry for a data structure?
a) a list of all the data elements included in the data structure or record
c) Output format
d) Default values
115. The main purpose of a data dictionary is to provide a source of reference in which the
____________can look up & find out its content and any other relevant information.
a) analyst
b) user
c) designer
116. Which of these is included in the data dictionary entry for a data flow?
23
117. Many valuable reports can obtain from data dictionary including.
118. When you document the Processes, Process name or label means.
119. each data flow represent a group of related data elements called a
a) field
b) record
c) process
d) data store
a) DO WHILE statements.
d) IF..THEN...ELSE statements.
a) Action verbs
b) phrases
c) adjectives or adverbs
24
122. What is a benefit or advantage gained from using structured English to write process
specifications?
124. Assume condition one has four values, condition two has four values, and condition three
has two values. How many rules are required?
a) 5
b) 23
c) 32
d) 64
125. Which decision table variant that contains only the binary selectors (Y, N and -) in the
rules quadrant. In the action entries quadrant, indicators other than X appear.
a) two
b) three
c) four
d) five
25
a) a decision tree
b) a decision table
c) a structured English
128. Which decision structure you should use when the sequence of conditions and actions is
critical?
a) a decision tree
b) a decision table
c) a structured English
a) name of process
b) conditions
c) actions to be performed
d) rules.
130 . Which of these describes a use for the data flow diagrams of a system?
a) Data flow diagrams are generally incorrect once system development has
progressed into the programming stage.
b) Data flow diagrams are useful only for the very early, general stages of
defining a system.
c) Data flow diagrams are generally not saved once the system is built
131. A(n) ____________ shows how data moves through an information system.
a) entity
b) relationship
c) data flow
d) zero
26
132. A process that has no input is called a ____________ process.
a) spontaneous generation
b) black hole
c) gray hole
134. When each level of a Data Flow Diagram shows how one business process in more and
more detail, the levels of the DFD have been______.
a) Composed
b) Relationship Leveled
c) Contexted
d) Decomposed
135. A ____________ is the term used to describe a central storehouse of information about a
system's data.
a) data house
b) data base
c) data dictionary
d) data warehouse
27
137. What does the plus sign (+) symbol mean in a data structure definition?
a) iteration
b) optional
c) either/or
d) and
b) only the data elements on the data flows going out of the data store
d) all of the data elements on data flows going into or out of the data store
139. Which of these is included in the data dictionary entry for a data element?
140. Which of the following is not a logical structure upon which modular design is based?
a) Calculation
b) Sequence
c) Selection
d) Iteration
141. A tabular of conditions and actions and an indication under which conditions, which actions
must be performed, this is a description of.
a) Decision Tables
b) .
c) Decision tree.
d) Structured English
e) Pesudo codes
28
142. Which decision table variant that Contains only the binary selectors Y & N and the catch all
selector - in the rules quadrant. In the action entries, it contains only the action selector symbol X.
143.
a) Decision Tables
b) .
c) Decision tree.
d) Structured English
e) Pesudo codes
a) conditions
b) Actions to be performed
c) Name of process
146. What is one way to reduce the redundancy and complexity of a decision table?
a) Write the table in extended entry form when conditions are mutually-
exclusive.
29
c) Skip infrequently occurring actions.
a) use cases
b) class diagrams
c) actors diagrams
a) Instance
b) Attribute
c) Method
d) Message
149. If objects are similar to nouns, _______ are similar to adjectives that describe the
characteristics of an object
a) attributes
b) classes
c) Methods
d) Messages
a) classes
b) super-classes
c) subclasses
151. In a use case diagram action or event represents by an ______ with a label that describes
the action or event
a) oval
b) esquire
c) rectangle
d) circle
30
152. use case diagram Performed during the _______ phase
a) analysis
b) design
c) implementation
d) maintenance
153. In a class diagram, class is drawn as a _____ with the class name at the top.
a) circle
b) oval.
c) pentagon.
d) rectangle.
a) One or zero
b) One or many
155. A _______ is identified by a line showing direction that runs between two objects
a) Classes
b) Lifelines
c) Messages
d) Focuses
156. In a state transition diagram, the states appear as rounded rectangles with the state names
inside
a) circle
b) oval.
c) pentagon.
d) rounded rectangle.
31
157. A (n) ___________ is a command that tells an object or class to perform a creation method
a) Instance
b) Attribute
c) class
d) Message
a) object
b) subclass
c) super class
d) main class
159. A (n) __________ initiates a use case by requesting the system to perform a function or
process
a) case
b) event
c) actor
d) attribute
a) behaviour
b) relationships
c) semantics.
a) zero or one
b) zero or many
32
162. A software package that can be used by many different types of organizations is called a
____________ .
a) standard application
b) vertical application
c) horizontal application
d) VAR application
163. Which of the following is not a reason for purchasing a Software Package?
b) Lower costs
164. Which of the following is not a reason for developing in-house software?
b) Lower costs
165. Which of these tasks regarding ascertaining hardware and software needs should be done
first?
166. Which of the hardware acquisition methods is better only for the long run?
a) renting
b) leasing
c) buying
33
167. There are _____ options for obtaining computer equipment.
a) two
b) three
c) four
d) five
168. The advantage of ______ hardware decision is that; provide tax advantages of accelerated
deprecation.
a) renting
b) leasing
c) buying
169. The environment that analysts and programmers use to develop and maintain programs is
called the _______________ environment.
a) operational
b) test
c) management
d) analyst
170. Using a _______________ strategy to train users, you can select knowledgeable users who
then conduct sessions for others.
a) tutorial
b) classroom
c) operational
d) train-the-trainer
171. The environment for the actual system operation is called _____.
a) operational environment
b) production environment
c) both a. and b.
34
d) neither a. nor b.
172. The process in which existing data is loaded into a new system is referred to as _____.
a) data conversion
b) data addition
c) data direction
d) data exchange
173. The ____________ approach for a system changeover causes the new system to be used
immediately as soon as it becomes operational.
a) parallel operation
b) smooth cutover
c) direct cutover
d) pilot operation
174. The ____________ changeover method allows you to implement the new system in stages,
or modules.
a) phased operation
b) staged operation
c) parallel operation
d) horizontal operation
175. The _____ assesses the overall quality of a new information system.
a) post-cutover evaluation
b) post-implementation evaluation
c) post-integration evaluation
176.The process of putting the new information system online and retiring the old system is
described as _____.
a) system renewal
35
b) system shutdown
c) system changeover
d) system initiative
a) direct cutover
b) pilot operation
c) parallel operation
d) phased operation
178. A reusable module that can be invoked from more than one point in a structure chart is a
_____.
a) subordinate module
b) library module
c) repeat module
d) couple module
a) Coupling
b) Transference
c) Cohesion
d) Transaction properties
a) control module
b) sub-control module
c) subordinate module
d) level 2 module
181. Testing each module alone in an attempt to discover any errors in its code best describes:
a) module testing
b) integration testing
36
c) unit testing
d) function testing
a) Syntax errors
b) Symantec errors
c) design errors
d) software errors
183. A review of a project team member's work by other members of the team is called.
a) Desk checking
b) Structured walkthrough
c) analysts walkthrough
d) project walkthrough
184. ______________________ is the process of bringing together all of the modules that a
program comprises for testing purposes.
a) integration testing
b) system testing
c) control testing
d) stub testing
185. Written or other visual information about an application system, how it works, and how to
use it best describes:
a) System documentation
b) Operations Documentation
c) Message documentation
d) User documentation
37
187. A successful information system requires training for
a) users
b) managers
c) IT staff members
188. The environment for the actual system operation is called the _______________
environment.
a) operational
b) test
c) management
d) analyst
189. Systems analysts and programmers should not have access to the _________ environment
except to correct a system problem or to make authorized modification or enhancements
a) operational
b) test
c) management
d) analyst
a) direct cutover
b) pilot operation
c) parallel operation
d) phased operation
191. You might talk to ___________ to learn how the system functions on day-to-day basis
a) operational personal
38
d) customers
192. A(n) _______________ describes a company for its stakeholders and briefly states the
company's overall purpose, services, and values.
a) Mission statement
b) Objectives
c) Strategic planning
d) A company goals
a) Object
b) Operation
c) Objections
d) Opportunities
a) Community
b) Suppliers
c) Employees
d) all of the above
196. The coding of data to keep it safe from unauthorized users is called ___________
a) locking
b) hiding
c) shading
d) encryption
196. Which of the following is not an external factor that will affect a project?
a) Customers
b) Existing Systems
39
c) Economy
d) Technology
197. Which of the following is not a main reason for a system request?
a) Improved service
198. Which of the following is not considered when analyst analyze risk
a) Probability
a) Tangible benefits
b) Intangible benefits
c) Projected sales
d) Future growth
200. _______________ feasibility refers to the technical resources needed to develop, purchase,
install, or operate a system.
a) Operational
b) Technical
c) Economic
d) Schedule
201. An analyst has identified the costs for hardware repairs to the system. This will be
categorized as a _____.
a) tangible benefit
b) intangible benefit
c) operational cost
d) development benefit
202. Faster decision making, information processing efficiency, and improved asset utilization are
examples of:
a) intangible costs
b) tangible costs
c) tangible benefits
40
d) intangible benefits
203. The process of assessing the degree to which the potential time frame and completion
dates for all major activities within a project meet organizational deadlines and constraints for
affecting change best describes:
a) Operational feasibility
b) Technical feasibility
c) Economic feasibility
d) Schedule feasibility
a) Management support
b) Users training
c) Performance decline in some system parts
d) Cost reduction and avoidance
a) preliminary investigation
b) strategic planning
c) feasibility study
d) risk analysis
a) Group interview
b) user survey
c) official observation
d) unofficial observation
b) Evaluate Feasibility
c) Perform Fact-Finding
d) Present Results and Recommendations to Management
41
209. Representing the systems concept as a set of storage containers and how the contents are
organized is a _____ methodology.
a) data centered
b) life cycle
c) object-oriented
d) process centered
a) ERP
b) RFP
c) 4GL
d) ROI
211. A(n) _____________ is a document that can involve outright purchase or a verity of
leasing or renting options and can include maintenance or technical support terms
a) RFQ
b) RFP
c) 4GL
d) ROI
212. A test that evaluates the time a package takes to process a certain number of
transactions is a _____ test.
a) milestone
b) standard
c) production
d) benchmark
213. The FIRST thing that should be included in a presentation to management at the
completion of the systems analysis phase is a _____.
42
d) none of the above
216. The ____________ design of an information system is a plan for the actual
implementation of the system.
a) physical
b) logical
c) vertical
d) horizontal
217. Report that trace the entry of and changes to critical data values are called
_________ and are essential in every system
a) audit trails
b) undo transactions
c) ROI
43
218. The focus on defining the activities associated with the system is a __________
methodology.
a) data centered
b) life cycle
c) object-oriented
d) process centered
219. A formal step-by-step approach to the systems development life cycle that move
logically from on phase to the next is called _____.
a) ad hoc design
b) RAD design
c) agile development
d) structured design
220. The advantage of ______ hardware decision is that; provide tax advantages of
accelerated deprecation.
a) renting
b) leasing
c) buying
d) all methods are the same
a) negatively
b) positively
c) in any way
222. A project where management has a yes/no choice over implementation is called a ____
project.
a) nondiscretionary
b) discretionary
c) resource
44
d) non-resource
a) setting priorities
a) evaluate feasibility
b) perform fact-finding
226. When interacting with users about a new system, _____ is the most effective approach
toward building a positive relationship with users.
b) asking users about additional capabilities they would like to have with the
system
227. A report to management that results from a preliminary investigation does NOT need to
include _____.
45
d) a list of the expected benefits of the system
228. To obtain information about a systems request, initial fact-finding should include _____.
b) performing interviews
c) observing operations
229. A(n) _______________ describes a company for its stakeholders and briefly states the
company's overall purpose, services, and values.
a) Mission statement
b) Objectives
c) Strategic planning
d) A company goals
231. The disadvantage of this development methodology is that it may have inconsistent internal
designs within and across systems
a) Waterfall Development
b) Structured methodology
d) agile development
232. The advantage of this development methodology is that most important functionalities are
considered as and when they arrive
a) . a. Waterfall Development
b) Prototyping methodology
d) agile development
46
233. The creation of a quick program that provides a minimal amount of features is performed
during this development methodology.
a) object-oriented
b) parallel
c) prototyping
d) structured
234. Whose JAD participant provide operational level input on current operations
a) user
b) analyst
c) top management
d) manager
235. _________ analysis and design, blend analysis and design in evolutionary process
a) Waterfall Development
b) object oriented
c) Structured
d) spiral
a) Environmental Model
b) Behavioral Model
c) Implementation Model
d) Initial model
237. The term _____ refers to the additional layers required by Web-based software to
communicate with existing software and legacy systems.
a) transware
b) connective software
c) middleware
d) all of the above
238. A ____________ determines how long it takes an information system to pay for itself
through reduced costs and increased benefits.
47
a) net present value
b) return on investment
c) payback analysis
d) Information Systems analysis
239. The advantage of this development methodology is that dramatic time savings the systems
development effort
a) Waterfall Development
b) Parallel Development
c) Rapid Application Development
d) agile development
is a (n) ____________.
a) Environmental Model
b) Behavioral Model
c) Implementation Model
d) Initial model
241. The disadvantage of this development methodology is that identifying the most important
subset of requirements at any stage is a tedious task.
a) Waterfall Development
b) Structured methodology
c) Prototyping methodology
d) object oriented analysis and design
242. ____________ methodology performs the analysis, design and implementation phases
concurrently.
a) Waterfall Development
b) Structured methodology
c) Prototyping methodology
d) object oriented analysis and design
243. Whose JAD participant provide enterprise level authorization and support for the project
a) user
b) analyst
c) top management
d) manager
48
b) Listen to feedback from customers
c) Listen to feedback from suppliers
d) All of the above
245. The following question is an example of which system requirements ‘’The system must
support 25 users online simultaneously’’
a) Processes
b) Performance
c) Controls
d) Inputs
a) Systematic sample
b) Stratified sample
c) Random sample
d) Biological sample
249. Which of these describes a use for the data flow diagrams of a system?
a) Data flow diagrams are generally incorrect once system development has
progressed into the programming stage.
b) Data flow diagrams are useful only for the very early, general stages of
defining a system.
c) Data flow diagrams are generally not saved once the system is built
d) Data flow diagrams can serve as an excellent documentation of the final
system.
250. A(n) ____________ shows how data moves through an information system.
a) entity
b) relationship
49
c) data flow
d) zero
a) spontaneous generation
b) black hole
c) gray hole
d) negative data flow
253. A ____________ is the term used to describe a central storehouse of information about a
system's data.
a) data house
b) data base
c) data dictionary
d) data warehouse
255. What does the plus sign (+) symbol mean in a data structure definition?
a) iteration
b) optional
c) either/or
d) and
256. A (n) ___________ is a command that tells an object or class to perform a creation method
a) Instance
b) Attribute
c) class
d) Message
50
257. A class can belong to a more general category called
a) object
b) subclass
c) superclass
d) main class
258. A (n) __________ initiates a use case by requesting the system to perform a function or
process
a) case
b) event
c) actor
d) attribute
a) behaviour
b) relationships
c) semantics.
d) all of the above.
260. A software package developed to handle information requirements for a specific type of
business
a) standard application
b) vertical application
c) horizontal application
d) VAR application
b) Lower costs
c) Require less time to implement
d) Future upgrades provided by the vendor
a) control
b) culture
c) communication
d) all of the above
51
263. The advantage of ______ hardware decision is that; easy to change systems.
a) renting
b) leasing
c) buying
d) all methods are the same
b) on time
c) available in unlimited quantity
d) using the most effective output method
a) printer
a) flexibility
b) durability
c) distribution
d) all of the above
268. If the output is intended to be a report created to attract shareholders to the business,
_______________is desirable
a) microfilms
b) audio
c) send by e-mail
d) printed output
52
a) word processor,
b) a report generator
c) a printer spacing chart
d) all of the above
270. A ____________ usually causes specific actions, such as printing subtotals for a group of
records.
a) control break
b) file break
c) detail break
d) output break
271. A(n) ____________ displays only those records that meet a specific condition or conditions.
a) conditional report
b) exception report
c) work report
d) summary file
a) Category codes
b) Alphabetic codes
c) Block sequence codes
d) Sequence codes
273- ____________ combine data from different item attributes, or characteristics, to build the
code.
a) Category codes
b) Alphabetic codes
c) Derivation codes
d) Sequence codes
274- ____________ use a specific combination of letters that are easy to remember.
a) Category codes
b) Alphabetic codes
c) Derivation codes
d) mnemonic codes
53
275. A natural extension of the object-oriented analysis process is the _____.
a) relational database
b) hierarchical database
c) object compatible database
d) OODB
276- The _____ model was introduced during the 1970's and three decades later is still the
predominant model.
a) relational
b) OODB
c) hierarchical
d) none of the above
277. Which type of database has become increasingly widespread because it can run on many
platforms?
a) process-oriented databases
b) networked databases
c) hierarchical databases
d) relational databases
278. Make sure that the data dictionary entities for all ______________________are
documented completely and correctly
a) data stores
b) records
c) data elements
279. The two popular database models now-a day are ________________.
54
a) a simple database query.
d) Data mining looks for meaningful patterns and relationships among data
281. A _________________ is the smallest unit of data that is accessed by the operating
system.
a) physical record
b) logical record
c) physical file
d) logical file
282. ____________ refers to information as seen through a user’s eyes, regardless of how or
where the information actually is organized or stored.
a) Physical storage
b) Logical storage
c) Data storage
d) Information storage
283. A ____________ is a set of field values that describes a single person, place, thing, or
event.
a) physical record
b) report record
c) logical record
d) page record
284. An integrated collection of data that can include seemingly unrelated information, no matter
where it is stored in the company is a _____.
a) data dictionary
b) network warehouse
c) data warehouse
285. Files record details of all accesses and changes to a file or database and can be used to
recover changes made since the last backup, are.
55
a) rollback files
b) commit files
a) System environment
c) Executive summary
d) Appendices
287. The section that contains the complete design for the new system, is called.
a) System components
b) System environment
c) Implementation requirements
d) Executive summary
288. The section that describes the constraints, or conditions, affecting the system is called.
a) System components
b) System environment
c) Implementation requirements
d) Executive summary
289. Inaccurate requirements, coding errors, and faulty documentation highlight the need for
robust ____________________ .
a) quality assurance
b) software engineering
d) training
56
a) installation
b) support
c) coding
d) analysis
291. A set of guidelines that provide a quality assurance framework for developing and
maintaining software is _____.
a) ISO 9000-3
b) CMM
c) SEI 1000-3
292. When designing programs and code modules, it is helpful to refer to ____ created in prior
SDLC phases.
a) object models
b) class diagrams
c) ERDs
293. A message used by a module to signal a specific condition or action to another module is a
_____.
a) flag
b) trigger
c) tag
d) mark
57
a) a transfer symbol
b) a condition symbol
c) a loop symbol
a) a control module
b) a data couple
c) a library module
d) a transfer module
a) Tightly coupled
b) Loosely coupled
c) Strongly couples
d) Openly coupled
297. If modules are _______________, one module refers to internal logic contained in another
module.
a) tightly coupled
b) loosely coupled
c) data couple
d) control coupled
298. The pictorial representation of the programs or the algorithm is known as ________.
a) flowcharts
b) structured English
c) Pseudocode
a) hardware
58
b) software
c) algorithm
b) top-down approach
d) ODBC
301. In _____________, the programmer simulates each program outcome or result and displays
a message to indicate whether or not the program executed successfully.
a) integration testing
b) system testing
c) control testing
d) stub testing
302. The process of reviewing program code to spot logic errors is considered to be _____.
a) terminal checking
b) monitor checking
c) table checking
d) desk checking
303. _________________ is the process of bringing together of all the programs that a system
comprises for testing purposes.
a) integration testing
b) system testing
c) control testing
d) stub testing
305. The system's functions and how they are implemented is described in _____.
59
a) system documentation
b) user documentation
c) operations documentation
d) program documentation
306. The inputs, outputs, and processing logic for all program modules are found in _____.
a) system documentation
b) user documentation
c) operations documentation
d) program documentation
307. ____________ contains all the information needed for processing and distributing online
and printed output.
a) System documentation
b) Operations Documentation
c) Message documentation
d) Program documentation
309. The environment that analysts and programmers use to develop and maintain programs is
called the _______________ environment.
a) operational
b) test
c) management
d) analyst
310. Using a _______________ strategy to train users, you can select knowledgeable users who
then conduct sessions for others.
a) tutorial
60
b) classroom
c) operational
d) train-the-trainer
311. The environment for the actual system operation is called _____.
a) operational environment
b) production environment
c) both a. and b.
d) neither a. nor b.
312. The process in which existing data is loaded into a new system is referred to as _____.
a) data conversion
b) data addition
c) data direction
d) data exchange
313. The ____________ approach for a system changeover causes the new system to be used
immediately as soon as it becomes operational.
a) parallel operation
b) smooth cutover
c) direct cutover
d) pilot operation
314. The ____________ changeover method allows you to implement the new system in stages,
or modules.
a) phased operation
b) staged operation
c) parallel operation
d) horizontal operation
315. The _____ assesses the overall quality of a new information system.
a) post-cutover evaluation
61
b) post-implementation evaluation
c) post-integration evaluation
316. The process of putting the new information system online and retiring the old system is
described as _____.
a) system renewal
b) system shutdown
c) system changeover
d) system initiative
a) direct cutover
b) pilot operation
c) parallel operation
d) phased operation
318. Testing each module alone in an attempt to discover any errors in its code best describes:
a) module testing
b) integration testing
c) unit testing
d) function testing
a) Syntax errors
b) Symantec errors
c) design errors
d) software errors
320. A review of a project team member's work by other members of the team is called.
a) Desk checking
62
b) Structured walkthrough
c) analysts walkthrough
d) project walkthrough
321. ______________________ is the process of bringing together all of the modules that a
program comprises for testing purposes.
a) integration testing
b) system testing
c) control testing
d) stub testing
322. Written or other visual information about an application system, how it works, and how to
use it best describes:
a) System documentation
b) Operations Documentation
c) Message documentation
d) User documentation
a) Category codes
b) Alphabetic codes
c) Block sequence codes
d) Sequence codes
324. One of the rights cited by IBM usability expert Dr. Clare-Marie Karat is compliance,
compliance means?
a) the user has the right to a system that performs exactly as promised
325. One of the rights cited by IBM usability expert Dr. Clare-Marie Karat is scope, scope
means?
a) the user has the right to a system that performs exactly as promised
63
326. The main menu options that display at the top of the screen are collectively referred to as
the ____.
a) menu table
b) menu display
c) menu bar
d) none of the above
327. A ____________ can display messages or provide a place for a user to enter data.
a) display box
b) toggle box
c) text box
d) check box
a) users
b) managers
c) IT staff members
330 . The environment for the actual system operation is called the _______________
environment.
a) operational
b) test
c) management
d) analyst
a) direct cutover
b) pilot operation
64
c) parallel operation
d) phased operation
332. The ____________ changeover method involves implementing the complete new system at
a selected location of the company.
a) direct cutover
b) pilot operation
c) parallel operation
d) phased operation
b) commitment to change
65
Number of Question Answer
155 C
156 D
157 D
158 C
159 C
160 D
161 B
162 C
163 A
164 B
165 A
166 C
167 B
168 C
169 B
170 D
171 C
172 A
173 C
174 A
175 B
176 C
177 A
178 B
179 C
180 C
181 C
182 A
183 B
184 A
185 D
186 D
187 D
188 A
189 A
190 C
66
Number of Question Answer
118 A
119 B
120 D
121 A
122 C
123 D
124 C
125 B
126 C
127 C
128 A
129 B
130 D
131 C
132 A
133 D
134 D
135 C
136 A
137 D
138 D
139 A
140 A
141 A
142 A
143 B
144 C
145 A
146 A
147 D
148 C
149 A
150 D
151 A
152 A
153 D
154 B
Number of Question Answer
191 A
67
192 A
193 D
194 D
195 D
196 B
197 D
198 D
199 A
200 B
201 C
202 D
203 D
204 D
205 B
206 A
207 B
208 D
209 D
210 B
211 D
212 A
213 B
214 D
215 C
216 A
217 A
218 D
219 D
220 C
221 A
223 B
224 B
225 A
226 C
227 A
228 B
Number of Question Answer
229 C
230 D
231 A
68
232 A
233 D
234 A
235 C
236 C
237 B
238 B
239 C
240 A
241 B
242 A
243 C
244 C
245 C
246 B
247 C
248 C
249 C
250 D
251 B
252 D
253 D
254 C
255 C
256 D
257 A
258 D
259 C
260 A
261 D
262 D
263 C
264 C
265 D
69
NumberofofQuestion
Number Question Answer
Answer
266
303 DB
267
304 AA
268
305 AD
269
306 DA
270
307 BC
271
308 DC
272
309 BC
273
310 DD
274
311 CD
275
312 AD
276
313 CA
277
314 AB
278
315 BD
279
316 CD
280
317 AA
281
318 CB
282
319 AC
283
320 BC
284
321 AC
285
322 DC
286
323 DA
287
324 AB
288
325 CA
289
326 CB
290
327 CC
291
328 DA
292
329 DD
293
330 AA
294
331 CC
295
332 AB
296
333 DB
297 A
298 A
299 C
300 B
301 D
302 D
70
71