Computer Based Modeling Tools
For complex models, analysts can choose computer-based modeling tools that use _____, which includes standard shapes and symbols to represent events, processes, workflows, and more.
electronic data interchange (EDI)
joint application development (JAD)
business process modeling notation (BPMN)
rapid application development (RAD)
_____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.
Instructional technology
Information technology
Assistive technology
Medical technology
The systems implementation phase of the systems development life cycle (SDLC) includes an assessment, called a _____, to determine whether the system operates properly and if costs and benefits are within expectation.
systems estimation
systems verification
systems validation
systems evaluation
When planning an information system, a company must consider how a new system will interface with older systems, which are called _____.
enterprise applications
network operating systems (NOS)
operating applications
legacy systems
In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system.
systems analysis phase
systems implementation phase
systems design phase
systems support and security phase
The _____ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.
web support
application development
systems support
database administration
Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specifications and software quality standards.
beta testing
quality assurance
alpha testing
acceptance verifier
A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.
process flow diagram
object model
data flow diagram
network model
_____ provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.
User support
Database administration
Systems support and security
Network administration
_____ controls the flow of data, provides data security, and manages network operations.
Enterprise software
System software
Application software
Legacy software
Business support systems _____.
provide job-related information support to users at all levels of a company
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied
process data generated by day-to-day business operations
include email, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems
Many hardware and software companies offer _____ for IT professionals, which verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.
spot identification
certification
education
accreditation
In a typical organizational model, top managers _____.
develop long-range plans, called strategic plans, which define a company’s overall mission and goals
provide direction, necessary resources, and performance feedback to supervisors and team leaders
oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people
include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs
Critical Thinking Questions
Case 1-2
Maddy has been performing at a very high level at a firm, and so when two of her colleagues who are currently leading other development efforts get sick or leave the company, she is asked to step in and help manage these two other efforts.
After leaving the first meeting, Maddy goes down the hall to meet with the outgoing manager of the second team. In that meeting, he shares with her the latest draft of the systems requirement document, which is nearly complete. In which phase is the second team currently?
Systems analysis
Systems design
Systems planning
Systems implementation
In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
property
class
message
instance
Critical Thinking Questions
Case 1-1
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems development method the team uses to create a new application for a major medical supplier.
It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client will throw them a curveball and want to make changes late in the game—but that they also will be unwilling to absorb the costs of those changes. For this reason, which of the following methods of development will Roark eliminate?
Structured analysis
Agile/adaptive methods
Object-oriented analysis
Rapid application development
Knowledge management systems use a large database called a(n) _____ that allows users to find information by entering keywords or questions in normal English phrases.
inference engine
knowledge base
knowledge database management system
inference manager
User productivity systems _____.
provide job-related information to users at all levels of a company
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied
process data generated by day-to-day business operations
include groupware programs that enable users to share data, collaborate on projects, and work in teams
In object-oriented design, built-in processes called _____ can change an object’s properties.
methods
functions
attributes
features
A _____ describes the information that a system must provide.
process model
data model
business model
network model
_____ technology uses high-frequency radio waves to track physical objects.
Redundant array of independent disks (RAID)
Radio frequency identification (RFID)
Enterprise resource planning (ERP)
Management information system (MIS)
A _____ graphically displays one or more business processes, such as handling an airline reservation, filling a product order, or updating a customer account.
business matrix model (BMM)
business process model (BPM)
business indexing model (BIM)
business strategic model (BSM)
In object-oriented analysis, objects possess characteristics called _____.
properties
orientations
classes
inheritances
During the _____ of the systems development life cycle (SDLC), the IT staff maintains, enhances, and protects the system.
systems support and security phase
systems implementation phase
systems analysis phase
systems planning phase
The _____ method of developing systems produces code that is modular and reusable.
object-oriented analysis
adaptive
structured analysis
rapid application development
A large concentration of servers working together is called a _____.
server window
server application
server ranch
server farm
Critical Thinking Questions
Case 1-2
Maddy has been performing at a very high level at a firm, and so when two of her colleagues who are currently leading other development efforts get sick or leave the company, she is asked to step in and help manage these two other efforts.
When Maddy sits down at the first meeting at which the first group is gathering, she hears them discussing the feasibility study in which they are currently engaged. She knows, then, in which phase of the systems development life cycle (SDLC) this team currently is. Which phase is it?
Systems analysis
Systems design
Systems planning
Systems implementation
In a(n) _____ model, the result of each phase is called a deliverable, which flows into the next phase.
interactive
iterative
waterfall
spiral
During the _____ of the systems development life cycle (SDLC), a new system is constructed.
systems planning phase
systems support and security phase
systems design phase
systems implementation phase
Identify a method of developing systems that is well-suited to traditional project management tools and techniques.
Object-oriented analysis
Adaptive method
Structured analysis
Rapid application development
One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change.
object-oriented analysis
agile
structured analysis
rapid application development
_____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
Scrum
Prototyping
Modeling
Rapid application development
Internet-based commerce is called _____ and includes two main sectors: B2C (business-to-consumer) and B2B (business-to-business).
electronic commerce
network-oriented commerce
virtual trading
online trading
A _____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.
business matrix
business profile
business index
business glossary
Structured analysis is a traditional systems development technique that uses a series of phases, called the _____, to plan, analyze, design, implement, and support an information system.
object-oriented (O-O) analysis
systems development life cycle (SDLC)
transaction processing (TP) system
enterprise resource planning system (ERP)
Transaction processing (TP) systems _____.
provide job-related information to users at all levels of a company
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied
process data generated by day-to-day business operations
include email, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems
A(n) _____ shows the data that flows in and out of system processes.
process model
object model
business model
network model
_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
Electronic data interchange (EDI)
Radio frequency identification (RFID)
Enterprise resource planning (ERP)
Object-oriented (O-O) analysis
Which of the following methods of system development stresses intense team-based effort and reflects a set of community-based values?
Object-oriented analysis
Agile method
Structured analysis
Rapid application development
In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all documented requirements for the system.
systems implementation phase
systems planning phase
systems analysis phase
systems design phase
In a typical company organizational model, middle managers _____.
develop long-range plans, called strategic plans, which define the company’s overall mission and goals
provide direction, necessary resources, and performance feedback to supervisors and team leaders
oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people
include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs
Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.
incremental model
extreme model
spiral model
evaluative model
_____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.
Prototyping
Rapid application development
Scrum
Modeling
Critical Thinking Questions
Case 1-1
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems development method the team uses to create a new application for a major medical supplier.
After Roark has spent a week getting to know the members of the team, including their strengths and weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme keeps recurring: the team has particularly weak communications skills. Which of the following methods is Roark least likely to use, given that he knows about the disadvantages of each method?
Structured analysis
Agile/adaptive methods
Object-oriented analysis
Rapid application development
Structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information.
iterative
process-centered
inferred
model-specific
A(n) _____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company’s information systems.
application developer
database administrator
network administrator
systems analyst
Examples of company-wide applications, called _____, include order processing systems, payroll systems, and company communications networks.
enterprise applications
network operating systems (NOS)
operating applications
legacy systems
_____ design and construct webpages, monitor traffic, manage hardware and software, and link web-based applications to a company’s information systems.
User support specialists
Database administrators
Web support specialists
Network administrators
A(n) _____ is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.
corporate culture
team guideline
mission statement
ongoing rule-set
A _____ answers questions, troubleshoots problems, and serves as a clearinghouse for user problems and solutions.
user support specialist
database administrator
web support specialist
network administrator
The _____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.
systems design phase
systems planning phase
systems support and security phase
systems analysis phase
Which of the following is one of the main sectors of ecommerce?
C2C (consumer-to-consumer)
B2C (business-to-consumer)
C2B (consumer-to-business)
BPM (business process model)
*******
_____ are advantages that are difficult to measure in dollars but are important to a company.
Tangible benefits
Intangible benefits
Tactile benefits
Real benefits
Many companies implement _____ systems that integrate all customer-related events and transactions.
CRM (Customer relationship management)
TCO (Total cost of ownership)
JIT (Just-in-time)
RFID (Radio frequency identification)
Systems development typically starts with a _____.
feasibility study, followed by a systems request, which includes a preliminary investigation
systems request, followed by a preliminary investigation, which includes a feasibility study
preliminary investigation, followed by a feasibility study, which includes a systems request
feasibility study, followed by a preliminary investigation, which includes a systems request
A popular technique for investigating causes and effects is called a _____ diagram.
causebone
fishbone
jawbone
crossbone
Determining the _____ means defining the specific boundaries, or extent, of a project.
project index
project matrix
project scope
project table
A(n) _____ is not as flexible as a series of interviews, but it is less expensive, generally takes less time, and can involve a broad cross-section of people.
fishbone
experiment
survey
research
Strategic planning starts with a _____ that reflects a firm’s vision, purpose, and values.
relationship diagram
feasibility study
performance assessment
mission statement
In a preliminary investigation report, the _____ section contains a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.
introduction
recommendations
expected benefits
time and costs estimates
CASE
Critical Thinking Questions
Case 2-1
Lara, managing director of an information technology firm, has received a big project from one of their highly valuable clients. However,
the project received is different from the usual projects they handle.
Lara performs certain analyses and ensures that the company’s image will not be at risk by taking this project. This is an example of _____.
operational feasibility
economic feasibility
technical feasibility
schedule feasibility
Of the measures of feasibility, questions such as “Does the proposed platform have sufficient capacity for future needs?” and “Will the hardware and software environment be reliable?” should be considered while assessing _____.
schedule feasibility
technical feasibility
economic feasibility
ethical feasibility
_____ includes ongoing support and maintenance costs, as well as acquisition costs.
CRC (Customer relationship costs)
TCO (Total cost of ownership)
JIT (Just-in-time costs)
RCT (Real cost of time)
The overall aim of a _____ is to avoid seeking goals that are unrealistic, unprofitable, or unachievable.
SWOT (Strength, Weakness, Opportunities, and Threats) analysis
CSF (Critical Success Factor) analysis
BCF (Business Case Factor) analysis
SWCT (Strategy, Weakness, Cost, and Technology) analysis
The objective of _____ is to gather data about project usability, costs, benefits, and schedules.
mediation
fact-finding
project execution
project maintenance
Projects where management has a choice in implementing them are called _____ projects.
discretionary
nondiscretionary
appended
concatenated
In a preliminary investigation report, the _____ section is included in the report if supporting information must be attached.
appendix
introduction
recommendations
findings
When assessing _____, a systems analyst must consider the interaction between time and costs.
resource feasibility
technical feasibility
schedule feasibility
market feasibility
Using _____, a supplier can use radio frequency identification (RFID) tags on each crate, case, or shipping unit to create a digital shipping list.
EPOD (Electronic proof of delivery)
PPOD (Physical proof of delivery)
RPS (Radio positioning system)
RDS (Radar detection system)
_____ components can provide automated response to sales inquiries, online order processing, and inventory tracking.
Just-in-time (JIT)
Customer relationship management (CRM)
Automatic teller machine (ATM)
Total cost of ownership (TCO)
To avoid the problem of _____, a project’s scope should be defined as clearly as possible.
project dilation
project expansion
project creep
project drift
The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.
computer resources committee
data storage committee
system networking committee
topology identification committee
When using a _____ to investigate the causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.
causebone diagram
fishbone diagram
jawbone diagram
crossbone diagram
In a preliminary investigation report, the _____ section contains the results of the preliminary investigation, including a description of the project’s scope, constraints, and feasibility.
appendix
introduction
recommendations
findings
A systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.
systems request
project scheduling report
systems validation
project staffing report
A _____ is an analysis tool that represents the possible causes of a problem as a graphical outline.
causebone diagram
fishbone diagram
jawbone diagram
crossbone diagram
Which of the following is an example of a tangible benefit?
A user-friendly system that improves employee job satisfaction
A sales tracking system that supplies better information for marketing decisions
A new website that enhances a company’s image
An online package tracking system that improves service and decreases the need for clerical staff
_____ technology uses radio frequency identification (RFID) tags to identify and monitor the movement of each individual product, from a factory floor to the retail checkout counter.
EPC (Electronic product code)
EPOD (Electronic proof of delivery)
MCC (Magnetic character code)
RTPD (Real-time product delivery)
_____ planning is the process of identifying long-term organizational goals, strategies, and resources.
Prospect
Pilot
Strategic
Vertical
_____ usually focus on long-term challenges and goals, the importance of a firm’s stakeholders, and a commitment to the firm’s role as a corporate citizen.
Performance assessments
Relationship assessments
Vision statements
Mission statements
_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.
Accessibility
Relationship
Feasibility
Performance
The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.
Pareto chart
Gantt chart
Scatter chart
XY chart
Of the measures of feasibility, questions such as “Does management support the project?” and “Will the new system require training for users?” would help predict a system’s _____.
schedule feasibility
technical feasibility
economic feasibility
operational feasibility
_____ means that a proposed system will be used effectively after it has been developed.
Operational feasibility
Technical feasibility
Schedule feasibility
Economic feasibility
Hardware-based security controls include _____.
password fields
online forms
system patterns
biometric devices
A _____ is a summary of a project request and a specific recommendation.
case for action
routine report
breakdown report
case for approval
Which of the following is an example of an intangible benefit?
A user-friendly system that improves employee job satisfaction
A new scheduling system that reduces overtime
An online package tracking system that improves service and decreases the need for clerical staff
A sophisticated inventory control system that cuts excess inventory
CASE
Critical Thinking Questions
Case 2-1
Lara, managing director of an information technology firm, has received a big project from one of their highly valuable clients. However,
the project received is different from the usual projects they handle.
Lara is involved in many other projects so she appoints a project manager for this project to ensure that the project is completed on time. This is an example of _____.
operational feasibility
economic feasibility
technical feasibility
schedule feasibility
The term _____ refers to the reasons, or justifications, for a proposal.
business case
use case
work statement
problem charter
Of the measures of feasibility, _____ assesses tangible and intangible benefits to a company in addition to costs.
schedule feasibility
technical feasibility
economic feasibility
operational feasibility
_____ refers to the practical resources needed to develop, purchase, install, or operate a system.
Operational feasibility
Technical feasibility
Schedule feasibility
Market feasibility
_____ means that a project can be implemented in an acceptable time frame.
Operational feasibility
Technical feasibility
Schedule feasibility
Economic feasibility
Electronic data interchange (EDI) enables _____ inventory systems, which rely on computer-to-computer data exchange to minimize unnecessary inventory.
CRM (Customer relationship management)
EPOD (Electronic proof of delivery)
JIT (Just-in-time)
RFID (Radio frequency identification)
A _____ must be achieved to fulfill a company’s mission.
key performance factor
core competency
critical success factor
vision competency
_____ are the benefits that can be measured in dollars.
Tangible benefits
Intangible benefits
Ethical benefits
Agile benefits
Projects that provide the _____ are assigned the highest priority when setting priorities for systems requests.
greatest benefit, at the lowest cost, in the shortest period of time
greatest benefit, at the highest cost, in the shortest period of time
least benefit, at the lowest cost, in the longest period of time
least benefit, at the highest cost, in the longest period of time
Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called _____.
project dilation
project creep
project expansion
project drift
_____ means that the projected benefits of a proposed system outweigh the estimated costs.
Economic feasibility
Schedule feasibility
Operational feasibility
Technical feasibility
Projects where management has no choice in implementing them are called _____ projects.
discretionary
nondiscretionary
appended
concatenated
Which of the following is an example of a discretionary project?
Creating a new report for a user
Adding a report required by a new federal law
Including annual updates to payroll and tax percentages
Updating quarterly changes in reporting requirements for an insurance processing system
_____ result from a decrease in expenses, an increase in revenues, or both.
Tangible benefits
Intangible benefits
Agile benefits
Ethical benefits
A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.
trigger
constraint
query
key
******
Effective project reporting requires _____.
strong communication skills
strong intervention skills
strong negotiation skills
strong leadership skills
A _____ chart displays complex task patterns and relationships.
Gantt
Pareto
Program Evaluation Review Technique (PERT)
Scatter
A(n) _____ is a series of tasks that, if delayed, would affect the completion date of the overall project.
critical path
dynamic path
absolute path
relative path
A _____ represents the work that one person can complete in one day.
person-day
work-day
work-duration
person-work
The three legs of a project triangle are _____, scope, and time.
requirements
resources
environment
cost
Microsoft’s risk management model includes _____, which represents the likelihood that the risk will happen.
category
probability
trigger
description
A _____ involves breaking a project down into a series of smaller tasks.
work breakdown structure (WBS)
value breakdown structure (VBS)
risk breakdown structure (RBS)
concept breakdown structure (CBS)
Two or more concurrent tasks often depend on a single prior task, which is called a _____.
predecessor task
wireframe task
beneficiary task
discrete task
A _____ is a review of a project team member’s work by other members of a team.
critical walk-through
foundational walk-through
baseline walk-through
structured walk-through
When several tasks can start at the same time, each is called a(n) _____ task.
model
asynchronous
baseline
concurrent
A _____ displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more detail.
semantic wireframe
mesh topology
ring topology
network diagram
A _____ is a series of events and activities with no slack time.
risk path
foundation path
baseline path
critical path
When maintaining schedules, if enough _____ and frequent checkpoints exist, problems will be detected rapidly.
activity diagrams
milestones
data flow diagrams
viewports
A continuous risk-tracking process can _____.
notice changes in existing risks
revert reported risks
prevent human resource turnover issues
prevent new issues
Project scheduling, an activity of a project manager, _____.
requires guiding, supervising, and coordinating a project team’s workload
includes monitoring the progress of a project, evaluating results, and taking corrective action when necessary to stay on target
involves staffing, which includes selecting the project team and assigning specific tasks to team members
includes budgeting a project based on the number of modules and their complexity in a project
_____ give the project managers an opportunity to seek input and conduct brainstorming sessions.
Status reports
Project review reports
Project status meetings
Board meetings
A _____ is a proactive effort to anticipate a risk and describe an action plan to deal with it.
risk identification plan
risk response plan
risk balance plan
risk management plan
_____ give team members of a project an opportunity to share information, discuss common problems, and explain new techniques.
Board meetings
Project status meetings
Project review reports
Status reports
A(n) _____ is a recognizable reference point that can be used to monitor progress.
event
notification
alert
task
Project planning, an activity of a project manager, _____.
involves requires guiding, supervising, and coordinating the a project team’s workload
includes monitoring the progress of the a project, evaluating results, and taking corrective action when necessary to stay on target
focuses on long-term challenges and goals, the importance of stakeholders, and a commitment to the firm’s role as a corporate citizen consists of staffing, which includes selecting the project team and assigning specific tasks to team members
includes identifying project tasks and estimating completion times and costs
A(n) _____ is a condition, restriction, or requirement that the system must satisfy.
constraint
index
milestone
viewport
The _____ is the most pessimistic outcome of a task.
best-case estimate (B)
probable-case estimate (P)
worst-case estimate (W)
dominant-case estimate (D)
When two or more concurrent tasks depend on a single prior task, each of the concurrent tasks is called a(n) _____.
successor task
discrete task
antecedent task
descendent task
When a project manager first recognizes that a project is in trouble, one of the options available to the manager includes _____.
delaying the project deadline
expanding the project requirements
reducing the project resources
eliminating controls and procedures
Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track.
absolute path
relative path
critical path
dynamic path
_____ can involve a modeling process called what-if analysis, which allows a project manager to vary one or more element(s) in a model to measure the effect on other elements.
Qualitative risk analysis
Quantitative risk analysis
Resource list analysis
Trigger analysis
Project reporting, an activity of a project manager, _____.
involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project
includes informing management, users, and the project team about the progress of a project
consists of staffing, which includes selecting the project team and assigning specific tasks to team members
includes identifying and arranging project tasks and estimating completion times and costs
The first step in creating a work breakdown structure (WBS) is to _____.
mark all recognizable events
determine time requirements
list all tasks
estimate task completion time and cost
A _____ cannot be started until a previous task is completed.
dependent task
predecessor task
precursor task
concurrent task
A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
Gantt chart
viewport
Scatter chart
wireframe
A(n) _____ is an event that could affect a project negatively.
issue
webinar
uncertainty
risk
A task that represents several activities is known as a _____.
task group
task name
task review
task ID
Adding more people to a project actually might increase the time necessary to complete the project because of a principle called _____.
Brooks’ Law
Bernoulli’s Law
Hooke’s Law
Moody’s Law
Using a(n) _____, a project manager can convert task start and finish times to actual dates by laying out the entire project on a calendar.
XY chart
Pedigree chart
Program Evaluation Review Technique (PERT) chart
Scatter chart
The first step in the creation of a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart is to _____.
the graphical planning aids to use
determine the logical order of project tasks identify
determine the status of all tasks
identify all the project tasks
A _____ might involve maximums for one or more resources, such as time, dollars, or people.
successor task
constraint
task ID
milestone
_____, a human resource issue, is a possible cause of cost overruns in an organization.
Inadequate training
Inaccurate demand forecast
Poor monitoring of progress
Unrealistic estimates
Microsoft claims that the Microsoft Project software can _____.
link risks with specific vendors
link risks with specific tasks and projects
eliminate risks
prevent risks
Two or more _____ depend on a predecessor task.
dependent tasks
concurrent tasks
ancestor tasks
precursor tasks
Microsoft’s risk management model includes _____, which specifies the risk type.
category
description
trigger
probability
Critical Thinking Questions
Mauricio, a project manager at a reputed firm, has been assigned to handle a new project that the firm has received. This project involves a lot of scheduling that has to be handled by Mauricio.
Mauricio has decided to use a project management tool for this project. He wants the tool to be free and cloud-based so that there is no need for software to be installed. Help Mauricio in identifying the project management tool that best fits the purpose.
Apptivo
Smartsheet
Microsoft Project
Gantter
A _____ negotiates with users who might have conflicting requirements or want changes that would require additional time or expense.
project coordinator
project reporter
software tester
software developer
Project monitoring, an activity of a project manager, _____.
requires guiding, supervising, and coordinating a project team’s workload
involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project
consists of staffing, which includes selecting the project team and assigning specific tasks to team members
includes identifying and arranging project tasks and estimating completion times and costs
A _____ includes a review of a project’s scope, stakeholders, budget, schedule, and any other internal or external factors that might affect the project.
change management plan
configuration management plan
debt management plan
risk management plan
_____ is a full-featured program that holds the dominant share of the project management software market.
Apptivo
GanttProject
Microsoft Project
Gantter
Program Evaluation Review Technique (PERT) is a _____ technique because it analyzes a large, complex project as a series of individual tasks.
top-down
bottom-up
three-point estimate
six-point estimate
_____ lists each risk and assesses the likelihood that it could affect a project.
Risk averting
Risk dominance
Risk identification
Risk analytics
*****
The _____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.
systems planning
systems analysis
systems design
systems implementation
Software such as Microsoft OneNote is a type of _____ software.
personal information manager (PIM)
personal data management
project data management
personal digital assistant (PDA)
Critical Thinking Questions
Case 4-1
John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder.
As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of documenting the results of the JAD session and preparing the report that will be sent to JAD team members?
Clark
Tom
Linda
His own
To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.
scalability
reliability
compatibility
applicability
_____ is a planned meeting during which a systems analyst obtains information from another person.
A survey
An interview
Sampling
Research
Using _____, an analyst can show business functions and break them down into lower-level functions and processes.
Unified Modeling Language (UML)
total cost of ownership (TCO)
functional decomposition diagrams (FDD)
Rapid Economic Justification (REJ)
_____ is a model that asks the traditional fact-finding questions in a systems development context.
A functional decomposition diagram
A class diagram
The Unified Modeling Language
The Zachman Framework for Enterprise Architecture
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select any 20 customers.
systematic sample
stratified sample
random sample
comprehensive sample
One of the main activities in the systems analysis phase is _____, which involves fact-finding to describe the current system and identification of the specifications for the new system.
objective modeling
requirements modeling
goal-based modeling
user-based modeling
In a use case diagram, the user becomes a(n) _____, with a specific role that describes how he or she interacts with a system.
agent
actor
interlocutor
master
In a(n) _____, team members prepare to lunge at each other to achieve their objectives.
pool
resequencing session
scrum
adaptation
Supporters of neutral locations for interviews believe that it _____.
makes the interviewee feel comfortable during the meeting
gives the interviewee easy access to supporting material that might be needed
keeps interruptions to a minimum so people can concentrate fully
gives the interviewee an opportunity to take calls during the interview
_____ are important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.
Problem solving skills
Artistic skills
Interpersonal skills
Confrontational skills
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select every tenth customer for review.
systematic sample
stratified sample
random sample
comprehensive sample
Which of the following is a typical example of a system requirement for the output category?
Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs.
The contact management system must generate a daily reminder list for all sales reps.
All transactions must have audit trails.
As the final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits and produce tax data required by the IRS.
Critical Thinking Questions
Case 4-1
John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder.
There have been some rumblings within the firm that this development project is not necessary so John and others feel it is important to explain the reason for the project at the outset. Whose name goes next to this point on the agenda?
His own
Jennifer
Alex
Tom
Which of the following is a general category of system requirements?
Daily reports
Inputs
Response time
Login security
The _____ is a top-down representation of a process.
Unified Modeling Language (UML)
total cost of ownership (TCO)
functional decomposition diagram (FDD)
Rapid Economic Justification (REJ)
Rapid application development (RAD) relies heavily on _____.
prototyping
management direction
agile methods
scrum
_____ is a fact-finding technique that can help a systems analyst understand how the current system is supposed to work.
Document review
Brainstorming
A systematic sample
Productivity software
In a(n) _____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.
spontaneous
unstructured
informal
open-ended
_____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.
Analytical skills
Artistic skills
Interpersonal skills
Confrontational skills
When studying an information system, illustrations of actual documents should be collected using a process called _____.
stratification
randomization
indexing
sampling
Critical Thinking Questions
Case 4-2
Jerry has inherited an Excel sheet that lists all of the system requirements for his team’s new project. But unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly. He needs to take care of this so the requirements can be sorted correctly.
Jerry knows that there were supposed to be three performance examples but he finds four in the spreadsheet. Which one of these is mislabeled as a performance example?
a. The system must automatically generate an insurance claim form.
b. Response time must not exceed four seconds.
c. The online inventory control system must flag all low-stock items within one hour after the quantity falls below a predetermined minimum.
d. The records system must produce key reports within five hours of the end of each fiscal quarter.
In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed version of the entire SDLC with users involved every step of the way.
agile method
sampling
rapid application development
brainstorming
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.
systematic sample
stratified sample
random sample
comprehensive sample
The primary advantage of rapid application development (RAD) is that _____.
systems can be developed more quickly with significant cost savings
a company’s strategic business needs are emphasized and the mechanics of the system are not stressed
the decelerated time cycle allows more time to develop quality, consistency, and design standards
systems are developed more slowly with fewer bugs
In the rapid application development (RAD) model, during the _____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs.
requirements planning
user design
construction
cutover
The _____ is a widely used method of visualizing and documenting software systems design.
Unified Modeling Language (UML)
total cost of ownership (TCO)
functional decomposition diagram (FDD)
Rapid Economic Justification (REJ)
Greater user involvement in the system development process usually results in _____.
poorer communication
more satisfied users
slower development times
lower quality deliverable
In the rapid application development (RAD) model, the _____ phase resembles the final tasks in the SDLC implementation phase.
requirements planning
user design
construction
cutover
The term _____ refers to a system’s ability to handle increased business volume and transactions in the future.
scalability
reliability
compatibility
applicability
A(n) _____ shows the timing of interactions between objects as they occur.
timing diagram
class diagram
orientation diagram
sequence diagram
A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.
personal information manager (PIM)
enterprise architecture
swim lane
fact-finding application
Critical Thinking Questions
Case 4-2
Jerry has inherited an Excel sheet that lists all of the system requirements for his team’s new project. But unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly. He needs to take care of this so the requirements can be sorted correctly.
Jerry has found one system requirement that he thinks could fit into a couple of different categories. The requirement is as follows: An employee record must be added, changed, or deleted only by a member of the human resources department. What is the best categorization of this requirement?
Performance
Control
Process
Input
Which of the following is a typical example of a system requirement for the control category?
The customer analysis system must produce a quarterly report that identifies changes in ordering patterns.
The system must maintain separate levels of security for users and the system administrator.
The data entry screens must be uniform, except for background color, which can be changed by the user.
The warehouse distribution system must analyze daily orders and create a routing pattern for delivery trucks.
In an interview, _____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.
open-ended questions
factual questions
leading questions
range-of-response questions
A(n) _____ is a characteristic or feature that must be included in an information system to satisfy business needs and be acceptable to users.
system requirement
property
questionnaire
object
Identify is a typical example of a system requirement for the performance category.
The purchasing system must provide suppliers with up-to-date specifications.
Each input form must include date, time, product code, customer number, and quantity.
The manager of the sales department must approve orders that exceed a customer’s credit limit.
The student records system must produce class lists within five hours after the end of registration.
If an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should _____.
switch to closed-ended questions
give the interviewee easy access to supporting material that might be needed
continue using open-ended questions
rudely conclude the meeting
Identify a typical example of a system requirement for the input category.
As a final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits.
Response time must not exceed four seconds.
The system must provide logon security at the operating system level and at the application level.
Student grades must be entered on machine-readable forms prepared by the instructor.
The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called _____.
brainstorming
sampling
engaged listening
fact-finding
In projects where it is desirable to obtain input from a large number of people, a(n) _____, can be a valuable tool.
observation
questionnaire
suggestion
title
In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.
requirements planning
user design
construction
cutover
In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____.
business process modeling notation
(BPMN)
total cost of ownership (TCO)
functional decomposition diagrams (FDD)
Rapid Economic Justification (REJ)
A _____ is a Unified Modeling Language (UML) technique that visually represents the interaction between users and an information system.
surface flowchart
scatter diagram
use case diagram
user-based flowchart
The kind of document shown in the accompanying figure starts with a heading, which should include _____.
a brief statement of purpose
your suggestions
your signature
your observations
In an interview, _____ encourage spontaneous and unstructured responses.
open-ended questions
closed-ended questions
leading questions
range-of-response questions
When phrasing interview questions, a systems analyst should avoid _____ that suggest or favor a particular reply.
range-of-response questions
open-ended questions
closed-ended questions
leading questions
43. Which of the following is a typical example of a system requirement for the process category?
The website must report online volume statistics every four hours and hourly during peak periods.
The system must be operated seven days a week, 365 days a year.
The equipment rental system must not execute new rental transactions for customers who have overdue accounts.
All transactions must have audit trails.
In an interview, _____ limit or restrict the response.
open-ended questions
closed-ended questions
leading questions
range-of-response questions
A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a _____.
flowchart
histogram
tree map
streamgraph
*****
Among the symbols in the accompanying figure, a _____ is used to represent data that a system stores because one or more processes need to use the data at a later time.
data store
data flow
process
gray hole
Many analysts follow _____, which means that they develop a physical model of the current system, a logical model of the current system, a logical model of the new system, and a physical model of the new system.
a four-model approach
a process description
the Zachman Framework
the Gane and Sarson symbol
Typical process description tools include _____.
context diagrams
decision trees
pseudocode
database tables
Critical Thinking Questions
The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client.
If they make use of the four-model approach, which of the following is a likely outcome?
Time taken to develop the model increases.
Costs needed to develop a logical and physical model of the current system will be less.
It will not be possible to get a clear picture of the current system functions before modifications are made.
The requirements of a new information system will always be different from the current information system.
In modular design, _____ also is called looping.
sequence
selection
iteration
process description
A _____ is a central storehouse of information about a system’s data.
data cube
data feed
data mart
data repository
A _____ shows how data acts through an information system but does not show program logic or processing steps.
data flow diagram
data tree diagram
data model diagram
data structure diagram
In a data dictionary, data elements are combined into _____ that are meaningful combinations of data elements that are included in data flows or retained in data stores.
fields
columns
records
decimals
In a data flow diagram (DFD), a gray hole is a process that has _____.
no input
at least one output and one input, but the output obviously is insufficient to generate the input shown
no output
at least one input and one output, but the input obviously is insufficient to generate the output shown
A data dictionary specifies a data element’s _____, which is the set of values permitted for the data element.
index
domain
array
record
In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an information system.
field
index
record
pixel
_____ maintains consistency among data flow diagrams (DFDs) by ensuring that input and output data flows align properly.
Balancing
Indexing
Adapting
Shipping
The selection structure is the completion of _____.
one or more process steps based on the results of a test or condition
steps in a chronological order, one after another
a process step that is repeated until a specific condition changes
a specific condition that is repeated until a process changes
Balancing _____.
uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system
ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD)
uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system
ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)
A data flow diagram (DFD) shows _____.
how data is related
what key fields are stored in the system
how a system transforms input data into useful information
what data is stored in the system
In a data flow diagram (DFD), the Gane and Sarson symbol for an entity is a ____.
rectangle with rounded corners
line with a single or double arrowhead
flat rectangle that is open on the right side and closed on the left side
rectangle, which may be shaded to make it look three-dimensional
The data dictionary usually records and describes a default value, which is the _____.
the set of values permitted for the data element
identification of the user(s) responsible for changing values for the data element
specification for the origination point for the data element’s value
value for the data element if a value otherwise is not entered for it
Which of the following provides a report of all data flows and data stores that use a particular data element?
Data dictionaries
Data types
Databases
Data warehouses
_____ is based on combinations of the three logical structures, or control structures, which serve as building blocks for the process.
Modular design
Interface design
Visual design
Product design
In a data flow diagram (DFD), the Gane and Sarson symbol for a data flow is a _____.
segment of a differentiable curve
line with a single or double arrowhead
flat rectangle that is open on the right side and closed on the left side
triangle, which may be shaded to make it look three-dimensional
Decision trees show the logic structure in a _____.
vertical form that resembles a tree with the roots at the bottom and the branches at the top
horizontal form that resembles a tree with the roots at the left and the branches to the right
vertical form that resembles a tree with the roots at the top and the branches at the bottom
horizontal form that resembles a tree with the roots at the right and the branches to the left
In a data dictionary, _____ is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.
domain
valence
length
index
Among the symbols in the accompanying figure, a _____ is a path for data to move from one part of the information system to another.
data store
data flow
process
gray hole
Among the symbols in the accompanying figure, a _____ receives input data and produces output that has a different content, form, or both.
data store
data flow
process
gray hole
In a data dictionary, some data elements have _____ rules. For example, an employee’s salary must be within the range defined for the employee’s job classification.
domain
range
validity
mastered
By showing processes as _____, an analyst can create data flow diagrams (DFDs) that show how the system functions but avoid unnecessary detail and clutter.
black boxes
process descriptions
business rules
decision tables
A _____ is logically impossible in a data flow diagram (DFD) because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.
spontaneous combustion
gray matter
black hole
server farm
The disadvantage of the four-model approach is that ____.
it gives an unclear picture of the current system functions before any modifications or improvements are made
the requirements of a new information system always are different from the current information system
additional time and cost are required to develop a logical and physical model of the current system
it does not take additional steps to avoid mistakes made earlier in systems development
Structured English might look familiar to programming students because it resembles _____, which is used in program design.
pseudocode
a decision tree
iterative code
decision code
The iteration structure is the completion of _____.
one or more process steps based on the results of a test or condition
steps in a chronological order, one after another
a process step that is repeated until a specific condition changes
a specific condition that is repeated until a process changes
Critical Thinking Questions
The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client.
Which of the following is a benefit if they use the four-model approach?
It will take less time to build a logical and physical model of the current system.
It will not incur additional costs to develop logical and physical model of the current system.
It will provide a clear picture of current system functions before any modifications or improvements are made.
It will provide time to create the current system models even for projects with tight schedules.
A _____ documents the details of a functional primitive, which represents a specific set of processing steps and business logic.
logical description
primitive description
process description
function-based description
If processes must be performed in a specific sequence, the information should be documented in the _____.
leveling guide
process descriptions
data dictionary
data flow diagram (DFD)
A _____ shows a logical structure, with all possible combinations of conditions and resulting actions.
pseudo table
database table
decision table
validation table
In a data dictionary, any name other than the standard data element name is called a(n) _____.
clone
cipher
alias
element
Using _____, an analyst starts with an overall view, which is a context diagram with a single process symbol, and then the analyst creates diagram 0, which shows more detail.
balancing
indexing
expanding
leveling
In a data flow diagram (DFD), a spontaneous generation process is a process that has _____.
no input
at least one output and one input, but the output obviously is insufficient to generate the input shown
no output
at least one input and one output, but the input obviously is insufficient to generate the output shown
In data and process modeling, a(n) _____ shows what the system must do, regardless of how it will be implemented physically.
organizational model
physical model
logical model
relational model
In a data flow diagram (DFD), the Gane and Sarson symbol for a data store is a _____.
rectangle with rounded corners
line with a single or double arrowhead
flat rectangle that is open on the right side and closed on the left side
rectangle, which may be shaded to make it look three-dimensional
In a data flow diagram (DFD), a black hole is a process that has _____.
no input
at least one output and one input, but the output obviously is insufficient to generate the input shown
no output
at least one input and one output, but the input obviously is insufficient to generate the output shown
In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.
pool
type
valence
domain
In a data flow diagram (DFD), the Gane and Sarson symbol for a process is a _____.
rectangle with rounded corners
line with a single or double arrowhead
flat rectangle that is open on the right side and closed on the left side
rectangle, which may be shaded to make it look three-dimensional
_____ is the process of drawing a series of increasingly detailed data flow diagrams (DFDs), until all functional primitives are identified.
Leveling
Balancing
Indexing
Looping
Since diagram 0 is a(n) _____ version of process 0, it shows considerably more detail than a context diagram.
contracted
exploded
condensed
extrapolated
Critical Thinking Questions
Nathan is an expert on all of the different kinds of process description tools. So, when his colleagues have questions, they know where to turn.
One of the firm’s trainee analysts is working on a financial process that will continue to print vendor payments until it reaches the end of the file. Which of the following processes will Nathan suggest the analyst to use?
Sequence
Selection
Concatenation
Iteration
In addition to the Gane and Sarson symbol set, another popular symbol set is _____.
Mantissa
Jira
Zachman
Yourdon
Data flow diagram (DFD) entities are also called _____ because they are data origins or final data destinations.
data stores
pseudocodes
terminators
gray holes
Critical Thinking Questions
Nathan is an expert on all of the different kinds of process description tools. So, when his colleagues have questions, they know where to turn.
Another of the firm’s analysts is unable to figure out what is wrong with some structured English he has been using to describe the processing logic. Nathan walks over and spots the problem in an instant. Which of the following can Nathan identify as the problem?
The structured English is indented.
The structured English is not using a sequence, selection, or iteration structure.
The structured English uses a limited vocabulary.
The structured English is used as a shorthand notation for actual code by programmers.
The major benefit of _____ is that it gives a clear picture of current system functions before any modifications or improvements are made.
the four-model approach
balancing
leveling
the Zachman Framework
A _____ is a graphical representation of the conditions, actions, and rules found in a decision table.
decision board
decision tree
decision element
decision point
Leveling _____.
uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system
ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD)
uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system
ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)
In data flow diagrams (DFDs), a process resembles a _____, where the inputs, outputs, and general functions of the process are known, but the underlying details are not shown.
black box
terminator
business rule
decision table
In the accompanying figure, the sequence structure is the completion of _____.
one or more process steps based on the results of a test or condition
steps in a chronological order, one after another
a specific condition that is repeated until a process changes
a process step that is repeated until a specific condition changes
*****
Object modeling requires many types of diagrams, creating which by hand is very time consuming and tedious, so systems analysts rely on _____ to speed up the process.
CRC modeling
extreme Programming (XP)
whiteboard sketches
CASE tools
In a sequence diagram, a _____ is identified by a line showing direction that runs between two objects.
message
procedure
method
response
_____ enable objects to communicate and interact as they perform business functions and transactions required by a system.
Aggregates
Relationships
Clusters
Linkages
Objects within a class can be grouped into _____, which are more specific categories within a class.
grids
units
subclasses
matrices
All objects within a(n) _____ share common attributes and methods.
catalog
register
index
class
_____ describes how instances of one class relate to instances of another class.
A modifier
A deliverable
Scope
Cardinality
The number of _____ needed to describe the characteristics of an object depends on the business requirements of the information system and its users.
attributes
packets
indices
keys
In a use case, the _____ is shown as a stick figure with a label that identifies its role.
actor
association
linkage
service request
An _____ shows the objects and how they interact to perform business functions and transactions.
object relationship diagram
object precedent chart
object antecedent chart
object interaction diagram
The black box concept is an example of _____, which means that all data and methods are self-contained.
polymorphism
inheritance
encapsulation
use case modeling
The line from the actor to the use case is called a(n) _____.
association
aggregation
lifeline
observation
In a class diagram, each class appears as a(n) _____, with the class name at the top, followed by the class’s attributes and methods.
rectangle
circle
oval
triangle
A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects.
dynamic
feasible
modular
linear
A(n) _____ is a group of similar objects.
aggregate
concatenation
class
packet
In a sequence diagram, a lifeline is identified by a _____ line.
solid
dashed
red
curved
A(n) _____ graphically documents a use case by showing the classes, the messages, and the timing of the messages.
state transition diagram
sequence diagram
data flow diagram
scatter diagram
An object, such as a bank account, can have a specific attribute called a(n) _____ that can be active, inactive, closed, or frozen.
state
grade
instance
status
In an object-oriented system, objects can _____ certain attributes from other objects.
broadcast
concatenate
inherit
reformat
Inheritance enables an object, called a _____, to derive one or more of its attributes from a parent.
child
user
package
suite
In a sequence diagram, a _____ represents the time during which an object above it is able to interact with the other objects in the use case.
focus point
schematic matrix
validity link
lifeline
A _____ is a visual summary of several related use cases within a system or subsystem.
use case description
use case diagram
use case schema
use case matrix
A _____ shows how an object changes from one state to another, depending on events that affect the object.
state transition diagram
case tools diagram
scatter diagram
business process diagram
The Unified Modeling Language (UML) notation _____ identifies a zero or many relation.
0..1
1..*
0..*
0..0
The _____ of an object is an adjective that describes the object’s current status.
polymorphism
encapsulation
resemblance
state
In a use case, an external entity, called a(n) _____,initiates a use case by requesting the system to perform a function or process.
beneficiary
user
domain
actor
A(n) _____ resembles a verb and defines specific tasks that an object can perform.
attribute
method
command
message
Critical Thinking Questions
Kevin, the trainee analyst at Lynach TechSystems, is in charge of allocating suitable Unified Modeling Language (UML) notations to a particular class diagram.
In a given diagram, Kevin is designing a relationship in which a given employee can have no payroll deductions or he/she can have many deductions. Which of the following notations should Kevin write to mark this relationship?
0..1
1
0..*
1..*
A(n) _____ is a specific member of a class.
key
index
file
instance
_____ allows objects to be used as modular components anywhere in a system.
Dynamic addressing
Technical feasibility
Encapsulation
Linear addressing
A car performs a(n) _____ called OPERATE WIPERS when it is sent a message with the wiper control.
method
role
command
objective
An object can be viewed asa(n) _____, because a message to the object triggers changes within the object without specifying how the changes must be carried out.
black box
class diagram
use case
activity diagram
A(n) _____ resembles a horizontal flowchart that shows the actions and events as they occur.
state transition diagram
sequence diagram
business model diagram
activity diagram
A(n) _____ represents the steps in a specific business function or process.
relationship diagram
use case
data flow unit
interaction diagram
The Unified Modeling Language (UML) represents an object as a _____ with the object name at the top, followed by the object’s attributes and methods.
circle
rectangle
pentagon
rhombus
In a sequence diagram, the _____indicates when an object sends or receives a message.
request link
focus
command line
lifeline
An object has certain _____,which are characteristics that describe the object, such as the make, model, and color of a car.
keys
attributes
indices
elements
A class can belong to a more general category called a _____.
superclass
register
subclass
catalog
For each use case, a _____ in the form of a table is developed to document the name of the use case, the actor, a description of the use case, and so forth.
use case description
use case diagram
use case schematic
use case outline
_____ is a widely used method of visualizing and documenting an information system.
Unified Modeling Language (UML)
Java Virtual Machine (JVM)
UNiplexed Information and Computing System (UNIX)
Multimedia Logic (ML)
_____ describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses.
Instances
Relationships
Aggregates
Clusters
When a use case diagram is created, the first step is to identify the system boundary, which is represented by a _____.
triangle
circle
rectangle
square
A _____ is a command that tells an object to perform a certain method.
dictum
message
pledge
pronouncement
Critical Thinking Questions
Kevin, the trainee analyst at Lynach TechSystems, is in charge of allocating suitable Unified Modeling Language (UML) notations to a particular class diagram.
Which of the following relationships corresponds to theUnified Modeling Language (UML) notation on the class diagram 0..1 that Kevin has written?
An employee can have no direct reports or many direct reports.
An employee can have no spouse or one spouse.
An office manager manages one and only one office.
One order can include one or many items ordered.
For a use case diagram, the _____ shows what is included in the system and what is not included in the system.
system design
system boundary
system layout
system matrix
A red Mustang is a(n) _____ of the CAR class.
index
key
metric
instance
An object’s _____ are the tasks or functions that the object performs when it receives a command to do so.
roles
utilities
instances
methods
The Unified Modeling Language (UML) symbol for a use case is a(n) _____ with a label that describes the action or event.
rectangle
triangle
dashed line
oval
A(n) _____represents a person, a place, an event, or a transaction that is significant to the information system.
object
instance
class
model
A(n) _____ shows the object classes and relationships involved in a use case.
class diagram
association diagram
use case diagram
modeling diagram
The concept that a message gives different meanings to different objects is called _____.
encapsulation
dynamic addressing
polymorphism
linear addressing
hihi
Want to order fresh copy of the Sample Template Answers? online or do you need the old solutions for Sample Template, contact our customer support or talk to us to get the answers of it.