Escolar Documentos
Profissional Documentos
Cultura Documentos
Chapter 1
Assuming the Role of the Analyst
True-False
1. Information along with financial, material, and human resources is now
regarded as a key resource in many organizations. T (p. 1)
2. A management information system departs from the traditional transaction
processing system in that it emphasizes the support of decision making in all
its phases. F (p. 3)
3. Knowledge work systems use common software tools to manipulate but not
create new information. F (p. 3)
4. Computer supported collaborative work might include groupware for teams
via networked computers. T (p. 4)
5. User involvement throughout the systems project is of little importance in
the successful development of business information systems. F (p. 7)
6. The three primary roles of the systems analyst are as consultant, supporting
expert, and change agent. T (p. 8)
7. When analysts are hired specifically from outside the business to address
information systems issues within a business, they are acting as supporting
experts. F (p. 8)
8. Each phase of the system development life cycle is accomplished as a
discrete, separate step. F (p. 10)
9. The first phase that the analyst enters into is that of determining information
requirements for the particular users involved. F (p. 10)
10. A systems proposal is prepared after the analysis of system needs. T (p.
12)
25. Open source software is distributed for free and then users pay for updates
to the software. F (p. 6)
Multiple Choice
26. Which of these systems processes large amounts of data for routine
transactions?
A.
B.
C.
D.
Data-processing systems
Decision support systems (p. 3)
Expert systems
Management information systems
Change agent
Consultant
Programmer (p. 8)
Supporting expert
Communicator
Problem solver (p. 9)
Programmer
Project manager
31. Which of these statements concerning the systems development life cycle is
true?
A.
B.
C.
D.
32. During which phase of the SDLC should the analyst determine the who,
what, where, when, and how of the current system?
A.
B.
C.
D.
33. In which phase of the SDLC are data flow diagrams constructed?
A.
B.
C.
D.
34. During which phase of the SDLC are structure charts most useful?
A.
B.
C.
D.
35. During which phase of the SDLC is the analyst concerned with determining
problems within the organization?
A.
B.
C.
D.
36. In which phase of the SDLC is the analyst most heavily involved in user
training?
A.
B.
C.
D.
38. Which of these is not an approach taken by the analyst when adopting
CASE tools?
A.
B.
C.
D.
39. An encyclopedia that is used to store all project information is called a(n):
A.
B.
C.
D.
data dictionary.
upper CASE tool.
repository. (p. 16)
lower CASE tool.
41. Which of the following methodologies uses rich pictures that capture
organizational narratives?
A.
ETHICS
B.
Project Champion
C.
Soft Systems (p. 20)
D.
Multiview
42. Which of the following is not an advantage of mounting an application on
the Web?
A.
It is easy to create a Web site to which different cultures can
relate. (p. 5)
B.
The possibility of 24-hour access for users
C.
Increasing awareness of the availability of a service, product, person,
industry, or group
D.
Standardizing the design of the interface
43. Enterprise resource planning systems integrate:
A.
B.
C.
D.
small-scale systems.
wcommerce.
mcommerce. (p. 6)
enterprise resource planning.
45. Program software distributed free with the code or computer instructions
available for anyone to modify is called:
A.
B.
C.
D.
freeware.
code independent software.
a distributed system.
open source software. (p. 6)
48. A standardized language in which a system is broken down into a use case
model is called:
A.
B.
C.
D.
artificial intelligence.
a distributed system.
the unified modeling language. (p. 19)
multiview.
50. Which of the following is not one of the four values of extreme
programming?
A.
B.
C.
D.
Communication
Expertise (p. 20)
Simplicity
Courage
Completion
51. Decision makers are beginning to understand that (information) is not just a
by-product of conducting business, but a critical factor in determining the
success or failure of a business. (p. 1)
52. (Transaction processing systems) are computerized information systems
developed to process large amounts of data for routine business transactions
such as payroll and inventory. (p. 2)
53. When groups of people need to work together to make decisions, a(n)
(group decision support system) may be used. (p. 4)
54. The (database) stores data and models that help the user interpret and use
the data. (p. 3)
55. A(n) (expert system), also called a knowledge-based system, effectively
captures and uses the knowledge of an expert for solving a particular
problem experienced in an organization. (p. 4)
56. When analysts perform any activities in the systems development life cycle
and are present in the business for an extended period of time, they are
acting as (change agents). (p. 9)
57. The most prominent quality of an analyst is that of a(n) (problem solver).
(p. 9)
58. (Opportunities) are situations that the analyst believes can be improved
through the use of information systems. (p. 10)
59. The (systems proposal) summarizes what has been found during the
systems analysis phase, provides cost/benefit analyses of alternatives, and
makes recommendations on what should be done. (p. 12)
60. The (program specifications packet) contains design information
necessary for programmers to construct programs. (p. 12)
61. (Implementation) involves training users to use the system and planning for
the smooth conversion of the old system to the new one. (p. 13)
62. One important justification for CASE tools is to increase analyst
(productivity). (p. 15)
63. CASE tools are useful in (integrating) life-cycle activities. (p. 16)
64. CASE tools help the analyst to increase productivity, (communicate) more
effectively with users, and integrate the systems life cycle work. (p. 15)
65. (Lower CASE) tools generate computer code. (p. 16)
66. The process of analyzing computer program source code and converting it
into repository entities is called (reverse engineering). (p. 18)
67. (Ecommerce) is mounting an application on the Web. (p. 4)
68. (Enterprise resource planning) is the integration of many information
systems existing on different management levels and within different
functions. (p. 5)
69. Wireless ecommerce is referred to as (mcommerce). (p. 6)
70. Software that is distributed free along with the program source code is called
(open source software) (p. 6)
71. The (Unified modeling language) is an industry standard for modeling
object-oriented systems. (p. 19)
72. (Extreme programming) takes good software development practices and
pushes them to the limit. (p. 20)
Chapter 2
Understanding Organizational Style and Its Impact on Information Systems
True-False
1. Subsystems are composed of systems. F (p. 27)
2. Systems and subsystems are interrelated and interdependent. T (p.
28)
3. The interface between a system and its environment is known as the
boundary. T (p. 28)
4. Feedback is a form of system control. T (p. 28)
5. Anything that affects the functioning of an organization is considered
to be an environment. F (p. 29)
6. Open systems are characterized by a free flow of ideas among
organizational members. T (p. 29)
7. A context-level data flow diagram includes many detailed processes
representing the computer programs within the system. F (p. 32)
8. In an entity-relationship diagram, rectangles represent entities, and
ovals represent relationships. F (p. 34)
9. The elements that make up an organizational system are referred to as
entities. T (p. 33)
10. A crows foot on each side of a relationship indicates a one-to-one
relationship. F (p. 34)
11. An associative entity joins two entities. T (p. 36)
12. Middle managers make decisions using predetermined rules that have
predictable outcomes when implemented correctly. F (p. 39)
Multiple Choice
26. Which of the following is most closely associated with system control?
A.
B.
C.
D.
Boundary
Environment
Feedback (p. 28)
Interface
27. The elements that make up an organizational system are called _____.
A.
B.
C.
D.
28. Which of the following symbols is not used on the context level data flow
diagram?
A.
B.
C.
D.
a person.
another department.
another computer system.
All of the above (p. 32)
Triangle
Square
Crows foot line (p. 34).
Rectangle
32. An organization with many employees and many cubicles, with each
employee having a unique phone extension is said to be a _____
relationship.
A.
B.
C.
D.
34. An entity that describes attributes, such as repeating groups is called a(n)
_______ entity.
A.
fundamental
B.
associative
C.
attributive (p. 36x
D.
external
35. An entity that joins two other entities is called a(n) ______ entity.
A.
B.
C.
D.
fundamental
associative (p. 36)
attributive
linking
entity to form
fundamental
associative (p. 37)
attributive
bipolar
37. Which level of management makes decisions using predetermined rules that
have predictable outcomes?
A.
B.
C.
D.
Operations
Middle
Strategic (p. 41)
None of the above
of little importance.
an environment. (p. 29)
an enterprise resource system.
an associative entity.
virtual organization.
open system.
interrelated external entity.
enterprise resource planning system. (p. 32)
attributive entity.
external entity.
co-variant entity.
gerund. (p. 36)
50. The group that has a high need for historical data along with information
that allows prediction of future events is _______ management.
A.
B.
C.
D.
operations
middle (p. 41)
strategic.
virtual
Completion
51. All systems are composed of interrelated (subsystems). (p. 27)
Chapter 3
Determining Feasibility and Managing Analysis and Design Activities
True-False
1. Feedback gives information about the gap between actual and intended
performance. T (p. 50)
2. Analysts should have little interest in improving worker satisfaction with the
system. F (p. 50)
3. Prospective projects should be examined from a systems perspective in
order to consider the impact of the proposed change on the entire
organization. T (p. 51)
4. Reducing errors of data input is a legitimate object of systems projects. T
(p. 53)
5. A feasibility impact grid is used to show how each system component
affects corporate objectives. T (p. 54)
6. The objectives for the project should be cleared formally on paper as well as
informally through talking to people in the business. T (p. 55)
7. Economic feasibility includes the cost of operating the system, but not the
cost of the systems analysis team. F (p. 56)
8. Technical feasibility is dependent upon determining human resources for the
project. F (p. 56)
9. Judging the feasibility of a proposed systems project is usually a clear-cut
decision. F (p. 57)
36. Two words that characterize a project done with the extreme programming
approach are interactive and incremental. T (p. 77)
37. During the productionizing stage, software versions are turned around in a
time span of about one month. F (p. 78)
Multiple Choice
38. One way to think about problems is to:
A.
B.
C.
D.
E.
think that they arise from bad programming and older technology.
visualize them as elements on a feasibility impact grid.
realize that we all make mistakes and not assign blame to anyone.
reflect on the lack of perfection within any team framework and avoid
the blame syndrome.
think about them as situations where goals have never been met
or are no longer being met. (p. 50)
39. Which of the following is not a specific criteria for project selection?
A.
Appropriate timing of project commitment
B.
Practicality in terms of resources for the analyst and organization
C.
Backing from programmers (p. 52)
D.
Worthwhile project compared with other ways the organization could
invest resources
E.
Possibility of improving attainment of organizational goals
40. Improvements to systems include all the following except:
A.
B.
C.
D.
E.
combining processes.
improving worker satisfaction with the system.
increasing redundant output. (p. 53)
reducing errors in input through changes of forms and display screens.
speeding up a process.
45. Which of the following is concerned with the current technical resources
that can be upgraded or added to in order to fulfill the requests under
consideration?
A.
B.
C.
D.
Economic feasibility
Operational feasibility
Tactical feasibility
Technical feasibility (p. 55)
46. Which of the following is concerned with the analysts time and the costs
for system development, hardware, and business employee time?
A.
B.
C.
D.
47. Which of the following is dependent upon determining human resources for
the project?
A.
Economic feasibility
B.
Operational feasibility (p. 56)
C.
Tactical feasibility
D.
Technical feasibility
48. Who has final responsibility for judging the feasibility of a systems project?
A.
B.
C.
D.
E.
Computer operators
Input personnel
Management (p. 57)
Programmers
Systems analysts
time
money
a description of the activities (p. 59)
precedence
slack time.
the precedent activity path.
maximum path time.
the critical path. (p. 61)
55. Which of the following is not an advantage of using a PERT diagram over a
Gantt chart?
A.
B.
C.
62)
D.
PERT diagrams
Timeboxing (p. 64)
Gantt charts
Critical path analysis
58. Which of the following is useful for storing phone and fax numbers,
planners and to-do lists?
A.
B.
C.
D.
60. Which of the following is not a reason that goal setting motivates team
members?
A.
It clarifies what must be done to get results.
B.
It makes explicit what is expected of team members.
C.
It portrays the operational technology in understandable terms.
(p. 66)
D.
Simply setting goals and monitoring them seems to motivate
individuals.
61. Which of the following is not a difference between managing ecommerce
projects and traditional projects?
A.
The data used in ecommerce is scattered all over the organization.
B.
The staff used for ecommerce has a unified set of skills. (p. 67)
C.
Ecommerce managers need to initially build internal and external
partnerships.
D.
Security in ecommerce is a must.
62. Which of the following is a reason given by programmers for failed
projects?
A.
B.
C.
D.
63. Which of the following is not one of the four variables that a systems
developer can control?
A.
B.
C.
D.
Cost
Quality
Scope
Errors (p. 68)
examining the time and cost of the project, along with required
functionality.
examining the user requirements within budget constraints.
creating diagrams that show the boundaries of the system.
listening to customers and getting them to write down their
stories. (p. 71)
Coach
Big boss
Tracker (p. 74)
Tester
Reducing turnover
Improving documentation quality (p. 76)
Minimizing scope creep
Keeping defects to a minimum
73. Which of the following is not one of the five extreme programming stages?
A.
B.
C.
D.
Exploration
Iterations to the first release
Productionizing
Documenting (p. 77)
Completion
74. (Feedback) gives information about the gap between actual and intended
performance. (p. 50)
75. A(n) (feasibility impact grid) is useful for understanding and assessing the
impacts improvements to the existing system can make. (p. 53)
76. (Operational) feasibility refers to projecting whether the system will be
used once it is installed. (p. 56)
77. (Planning) includes all the activities required to select a systems analysis
team, assign members of the team to appropriate projects, estimate time
required to complete each task, and schedule the project so that tasks are
completed in a timely fashion. (p. 57)
78. (Control) means using feedback to monitor the project. (p. 57)
79. A(n) (Gantt) chart uses bars to represent each task. (p. 59)
80. The longest path through a PERT diagram is referred to as the (critical)
path. (p. 61)
81. An advantage of (PERT diagrams) is that they allow easy identification of
the order of precedence and easy determination of slack time. (p. 62)
82. (Project scheduling) software is used to create PERT diagrams and Gantt
charts. (p. 63)
83. (Timeboxing) is the concept of implementing the most critical features of
the system on an absolute due date. (p. 64)
84. A team leader who is concerned with the social relationships between group
Chapter 4
Information Gathering: Interactive Methods
True-False
1. In an interview, opinions may be more important and more revealing than
facts. T (p. 90)
2. When deciding whom to interview, it is unnecessary to include all
organizational levels that will be affected by the system. F (p. 91)
3. A drawback of open-ended questions is the possibility of giving the
impression that the interviewer is unprepared. T (p. 92)
4. A bipolar question is a special kind of open-ended question. F (p. 93)
5. One drawback of closed questions is the possibility that they may bore the
interviewee. T (p. 93)
6. One benefit of a closed interview question is the richness of detail
provided. F (p. 93)
7. When the interviewer begins with a very detailed set of questions and then
expands the scope, the interview is said to have a funnel shape. F (p. 95)
8. A pyramid structure should be used if the analyst believes the interviewee
needs to warm up to the topic. T (p. 95)
9. A funnel-shaped question sequence is useful when the interviewee feels
emotionally about the topic and needs freedom to express those emotions.
T (p. 96)
10. The diamond structure has the advantage of taking less interviewer time.
F (p. 96)
11. The longer you wait to write up your interview, the more suspect the
quality of the data becomes. T (p. 97)
12. No more than one session should be conducted with an interviewee. F (p.
97)
13. A JAD session should be held at a comfortable location away from the
corporate headquarters. T (p. 99)
14. A drawback of holding JAD sessions is that the system usually takes
longer to implement. F (p. 100)
15. It is unimportant to read background information about the organization
prior to an interview because it adds to the expense of the project, and the
information may be obtained from early open-ended questions. F (p. 91)
16. When ending an interview, it is important to ask the interviewee if there is
anything else that they want to add that hasnt been covered. T (p. 96)
17. One advantage of JAD sessions is that it isolates the user from the analysis
and design process. F (p. 101)
18. Behavior is defined as "what people in the organization say they want." F
(p. 101)
19. Responses gained through questionnaires using open-ended questions are
relatively easy to quantify. F (p. 101)
20. Questionnaires are a quick way to gather massive amounts of data. F (p.
102)
21. A questionnaire is an excellent means of doing an in-depth analysis of a
manager's decision-making processes. F (p. 102)
22. Using questionnaires is useful for doing exploratory studies to gauge
overall opinion. T (p. 102)
Multiple Choice
36. Which of the following is most useful in understanding an organization's
culture more fully?
A.
B.
C.
D.
Goals
Feelings (p. 90)
Informal procedures
Opinions
39. Which of the following interview structures begins with the general and
ends with the specific?
A.
B.
C.
D.
Circle
Diamond
Funnel (p. 95)
Pyramid
C.
D.
should be avoided, because they may make the interviewee feel that
he/she is being interrogated.
are not used when interviewing business professionals because the
questioning should be strictly limited to understanding the system
and business situation.
are used to clarify, draw out and expand on the interviewees
point. (p. 94)
should be done using an investigative/reporter approach.
44. Which structure should be used when you want to warm up the
interviewee to a topic?
A.
B.
C.
D.
Funnel
Pyramid (p. 95)
Diamond
Oval
45. After an interview has been conducted, which of these is not a good idea?
A.
B.
C.
D.
A.
B.
C.
D.
user groups are restless and want something new. (p. 99)
organizational culture is very individualistic and the employees need
to learn how to relate to one another.
the users are pressed for time and cannot get away for the block of
time required for many interviews.
the questions are very closed and the analysts are not concerned
about idea generation.
52. Which of the following person(s) should not be included in a JAD session?
A.
B.
C.
D.
Observers
A scribe
A session leader
Clerical level users that are familiar with the data (p. 99)
Attitudes
Behavior (p. 101)
Beliefs
Characteristics
55. Which term is defined as what people in the organization say they want?
A.
B.
C.
D.
57. The biggest difference between the questions used for most interviews and
those on questionnaires is:
A.
B.
C.
D.
61. The degree to which the question measures what the analyst intends to
measure is called:
A.
B.
C.
D.
external consistency.
internal consistency.
factoring.
validity. (p. 107)
62. When the same questionnaire is administered twice and very similar
results are obtained, the questionnaire is said to have demonstrated:
A.
B.
C.
D.
63. The problem caused by respondents who are easy raters is called:
A.
B.
C.
D.
bipolarity.
central tendency.
halo effect.
leniency. (p. 107)
64. The problem that occurs when respondents rate everything as average is
called:
A.
B.
C.
D.
bipolarity.
central tendency. (p. 107)
halo effect.
leniency.
65. The problem of impressions carrying over from one question to the next is
known as:
A.
B.
C.
D.
bipolarity.
central tendency.
halo effect. (p. 107)
leniency.
67. What type of control (or element) should be included when the analyst
needs to obtain one or more paragraphs on a Web survey?
A.
B.
C.
D.
68. What type of control (or element) should be included when the analyst
needs a yes-no or a true-false answer on a Web survey?
A.
B.
C.
D.
E.
69. What type of control (or element) should be included when the analyst
needs obtain more consistent results by choosing an answer from a list on
a Web survey?
A.
B.
C.
D.
E.
Controversial
Demographic
Important (p. 109)
Trivial
Completion
71. During an interview, the analyst should get the (opinions) of the
interviewees, their feelings, organizational and personal goals, and
informal procedures. (p. 90)
72. An example of a(n) (open-ended) question is "Explain how you make a
purchasing decision." (p. 91)
73. A(n) (closed) question has a finite number of responses. (p. 93)
74. A question for which there are only two possible responses, e.g., yes or no,
is known as a(n) (bipolar) question. (p. 93)
75. An example of a(n) (probe) is the question "Why?" (p. 94)
76. An inductive organization of interview questions can be visualized as
having a(n) (pyramid) shape. (p. 95)
77. With a(n) (funnel) structure, the interviewer begins with generalized
questions and then narrows possible responses. (p. 95)
78. An interview that begins in a very specific way, then examines general
issues, and concludes very specifically is said to have a(n) (diamond)
shape. (p. 96)
79. (Joint Application Design) can replace a series of interviews with an
intensive session. (p. 97)
80. A(n) (scribe) is responsible for taking notes at a JAD session. (p. 99)
81. The (session leader) is responsible for keeping the JAD session on track
and for negotiating and resolving conflicts. (p. 99)
82. (Observers) offer technical explanations and advice during a JAD session.
(p. 99)
83. (Attitudes) are what people in the organization say they want. (p. 101)
84. (Beliefs) are what people think is actually true. (p. 101)
85. (Behavior) is what organizational members do. (p. 101)
86. (Characteristics) are properties of people or things. (p. 101)
87. A disadvantage of questionnaires with respect to interviewing is the lack of
(interaction) regarding the questions and their meaning. (p. 102)
88. (Open-ended) questions leave all possible response options to the
respondent. (p. 103)
89. (Closed) questions limit response options available to the respondent. (p.
105)
90. (Scaling) is the process of assigning numbers to an attribute for the
purpose of measuring that attribute. (p. 106)
91. (Nominal) scales are used to classify things. (p. 106)
92. (Validity) is the degree to which the question measures what the analyst
intends to measure. (p. 107)
93. One quality questionnaires must possess is (reliability), a measure of
consistency. (p. 107)
94. (Leniency) is a problem caused by respondents who are easy raters. (p.
107)
95. (Central tendency) is a problem caused by respondents who rate
everything as average. (p. 107)
96. The (halo effect) is a problem that arises when the impression formed in
one question carries into the next question. (p. 107)
97. Administrating a questionnaire (electronically) is one way to reach current
users with minimal duplication costs. (p. 111)
98. A(n) (radio button) is used to obtain a yes-no or true-false answer on a
Web survey. (p. 109)
Chapter 5
Information Gathering:
Unobtrusive Methods
True-False
1. Sampling helps accelerate the process by gathering selected data rather than
all data for the entire population. T (p. 123)
2. Data gathering bias can be reduced by sampling. T (p. 124)
3. When the systems analyst asks an opinion of a permanent feature of the
installed information system, the executive interviewed may provide an
unbiased evaluation because there is little possibility of changing it. F (p.
124)
4. Stratification is the process of identifying subpopulations (or strata) and then
selecting objects or people for sampling within these subpopulations. T (p.
125)
5. It is necessary to set a sample size greater than one but less than the size of
the population itself. T (p. 126)
6. The absolute number is more important in sampling than the percentage of
the cluster. F (p. 126)
20. Executives who enclose a visitor in a tight space with his/her back to the
wall is in an insecure, weak power position. F (p. 138)
21. Stationary office equipment include equipment like file cabinets,
bookshelves, and other storage equipment. T (p. 138)
22. Offices distributed along the perimeter of the building often result in reports
being held up in one of the offices. T (p. 138)
23. An executive who positions his or her desk facing the wall with a chair at
the side for a visitor is in the strongest possible power position. F (p. 138)
24. Trade journals and newspaper clippings observed in an office indicate that
the manager has an interest in external information. T (p. 139)
25. The presence of calculators and PCs suggests that the decision maker is
more likely to use it personally. T (p. 138)
26. Executives in warmly lit offices tend to gather information more informally
than other executives do. T (p. 139)
27. The formal two-piece suit for a man and a skirted suit for a woman
represents the maximum authority. T (p. 139)
28. There is little truth to the idea that casual dressing in traditional
organizations results in some loss of credibility. F (p. 139)
29. An anecdotal list uses five shorthand symbols to evaluate the elements of
STROBE. T (p. 141)
Multiple Choice
30. Which of the following is a reason why a systems analyst would want to
perform sampling?
A.
B.
C.
D.
31. Which of the following is not a key question on which the systems analyst
must make a decision?
A.
Which should the systems analyst pay attention to, among many
reports, forms, output documents, and memos?
B.
Which should the systems analyst ignore?
C.
Which people should the systems analyst interview?
D.
Which people should the systems analyst seek information from via
questionnaires?
E.
Which people should the systems analyst observe in the process of
carrying out their mission? (p. 123)
32. Which of the following is not one of four steps that a systems analyst must
follow to design a good sample?
A.
B.
C.
D.
Unrestricted samples
Non-probability samples
The most difficult samples that could be set up (p. 125)
The most unreliable samples
35. Which of the following is not an approach for complex random samples?
A.
Random Sampling (p. 125)
B.
Systematic sampling
C.
Stratified sampling
D.
Cluster sampling
36. Which sampling technique is usually the most important to the systems
analyst?
A.
B.
C.
D.
Random sampling
Systematic sampling
Stratified sampling (p. 125)
Cluster sampling
Cluster itself
What we know about the sample itself
Population
Systems analyst (p. 126)
38. Which is the formula of the necessary sample size (n), where p is the
proportion of the population having the attribute and p is the standard error
of the proportion?
A.
B.
C.
D.
n = p (1-p) / p + 1
n = p (1-p) / p2 + 1 (p. 126)
n = p (1-p) / p2
n = p (1-p) / p2 - 1
39. The overriding variable that determines how many people the systems
analyst should interview in depth is:
A.
the number of analysts interviewing.
B.
the number of users in an organization.
C.
the number of departments and the number of users in an
organization.
D.
the time an interview takes. (p. 128)
40. A good rule of thumb is to interview at least ______ on every level of the
organization and at least ____ from each functional area directly involved in
the system.
A.
B.
C.
D.
Performance reports
Records (p. 130)
Reports used for decision making
Data capture forms
43. Which of the following is not a way that the analyst can inspect a record?
A.
B.
C.
D.
44. Which of the following is not a way to proceed when creating a catalog of
forms to help you understand the information flow currently in use in
business?
A.
B.
C.
D.
45. Which of the following is not a guideline that can help analysts to take a
systematic approach to analysis?
A.
Examine documents for key or guiding metaphors
B.
Look for insiders versus outsiders or "we against them" mentally in
documents
C.
List terms that characterize good or characterize evil, which
appear once in documents (p. 133)
D.
Recognize a sense of humor, if present
46. Which of the following is the most common information flow?
A.
B.
C.
D.
47. Which of these recording techniques has a decision maker who is observed
in the left column and all of his/her actions in the right-hand column?
A.
Adjective pairs
B.
Categories
C.
Scales
D.
Analysts playscript (p. 135)
48. Which of these is not an organizational element of interest with the
STROBE technique?
A.
B.
C.
D.
E.
51. If file cabinets and bookshelves are not present in the decision makers
office:
A.
they have little seniority and a restricted budget.
B.
it is likely that they store and value internal information.
C.
they are not very active within the corporation and do not have a
handle on the business.
D.
it is likely that they store very few items of information
personally. (p. 138)
52. The presence of small equipment such as calculators and PCs indicates that
the decision maker:
A.
B.
C.
D.
53. If a decision maker has trade journals and newspaper clippings about other
companies, they tend to work with:
A.
B.
C.
D.
formal communication.
gathering information from memos.
personal communication. (p. 139)
a person that is interested in external information.
55. The clothing for men that indicates maximum authority, according to some
researchers, is a:
A.
B.
C.
D.
56. The clothing for women that indicates maximum authority, according to
some researchers, is a:
A.
B.
C.
D.
floor-length dress.
pants suit.
small black dress.
skirted suit. (p. 139)
58. The shorthand symbol used in conjunction with STROBE to indicate that
narrative is reversed is:
A.
B.
C.
D.
E.
69. Assessing use of (humor) provides a quick and accurate barometer of many
organizational variables. (p. 133)
70. Examining (manuals) systematically will give a picture of the way things
ought to happen. (p. 134)
71. Examining (policies) allows the systems analyst to gain an awareness of the
values, attitudes, and beliefs that are guiding the corporation. (p. 134)
72. (Observation) is an information gathering technique that allows the analyst
to see firsthand how managers process and use information. (p. 135)
73. (Playscript) is an organized and systematic approach that demands that
analysts understand and articulate the action taken by decision makers being
observed. (p. 136)
74. A form of structured observation having roots in film criticism is known as
(STROBE). (p. 137)
75. (Accessible offices) tend to increase interaction frequency and informal
messages. (p. 138)
76. Placement of a desk in the office can provide clues to the exercise of
(power) by the decision maker. (p. 138)
77. When using the STROBE technique, small equipment used to process
information, e.g., pens, calculators, etc., are referred to as (props). (p. 138)
78. If an office contains trade journals and newspaper clippings about other
companies, the decision maker is more likely to be interested in (external)
information. (p. 139)
79. An office lighted with warm, incandescent lighting indicates a tendency
toward more (personal) communication. (p. 139)
80. Casual dressing by leaders may result in some loss of (credibility) if the
predominant organizational culture values traditional, conservative clothing.
(p. 139)
81. A method of recording STROBE using meaningful shorthand symbols is
Chapter 6
Prototyping, RAD, and
Extreme Programming
True-False
1. Prototyping is best applied late in the systems development life cycle. F (p.
151)
2. Prototyping is very useful for eliciting user suggestions about changing the
prototyped system. T (p. 151)
3. User reactions to prototyping can be gathered through observation,
interviews, and questionnaires. T (p. 152)
4. A disadvantage of prototyping is the relatively large expense associated with
redirecting system plans. F (p. 157)
5. A prototype that works but is inefficient is referred to as a "first of a series
prototype." F (p. 153)
6. Some prototypes are nonworking models. T (p. 153)
7. Prototypes that are full-scaled and installed at one location with the
intention of later implementation at other locations are referred to as
"selected features prototypes." F (p. 153)
8. Models that include some of the features of the final system are thought of
as "mock-ups." F (p. 153)
9. Prototyping may be used as a replacement for the systems development life
cycle. T (p. 154)
10. One reason that prototyping is useful is that user requirements are likely to
change over time. T (p. 154)
11. An advantage of prototyping is that systems will be more thoroughly
understood before the system is shaped. F (p. 154)
12. Some experts suggest that prototyping be integrated with the system
development life cycle. T (p. 155)
13. Generally speaking, prototypes should be built rapidly. T (p. 159)
14. Prototyping can help protect against over committing resources to a project
that proves to be unworkable. T (p. 156)
15. Prototyping modules should be highly interdependent. F (p. 156)
16. One disadvantage of prototypes is that an inadequate prototype may be
adopted as a completed system. T (p. 157)
17. User feedback on the prototype should be obtained only one time. F (p.
158)
18. A disadvantage of prototyping is the difficulty in changing the system early
in its development. F (p. 157)
19. An advantage of prototyping is the possibility of abandoning systems that
prove unworkable. T (p. 157)
20. Most COTS software is too limited to be used for prototyping. F (p. 158)
21. One role of the analyst is to encourage criticism of the prototype. T (p.
160)
22. RAD can be thought of as a specific implementation of prototyping. T (p.
161)
23. Users and analysts meet to identify objectives of the application or system in
the RAD design workshop phase. F (p. 161)
24. During the requirements planning phase, users respond to actual working
prototypes and analysts refine designed modules based on user responses. F
(p. 162)
25. One way that RAD tools differ from one another is in their capabilities to
support client/server applications. T (p. 163)
26. The implementation phase of RAD is in many ways less stressful than other
phases. T (p. 164)
27. Extreme programming uses long feedback cycles during software
development. F (p. 165)
28. Projects that are subject to constant updating are prone to
miscommunication. T (p. 166)
29. Extreme programming projects should begin with the simplest possible
tasks. T (p. 166)
30. Courage is the quality that is used when customers create functional tests for
all of the stories that programmers have subsequently implemented. F (p.
167)
31. Feedback gives the analyst the strength to be able to throw out code and
rethink solutions. F (p. 167)
32. Only 70 percent of problems can be solved with utter simplicity. F (p. 168)
33. Sweeping change is one of the guiding principles of extreme programming.
F (p. 168)
34. Extreme programming means doing programming quickly without undue
concern about quality. F (p. 168)
35. Source code is the basis for a living system. T (p. 169)
36. In extreme programming, onsite customers write stories and communicate
with the team. T (p. 170)
37. Pair programming means that you work with another programmer assigned
by management or the team leader. F (p. 170)
38. In extreme programming, the activities are often done concurrently. T (p.
172)
39. Stories in extreme programming are on spoken interaction between
developers and users, not on written communication. T (p. 172)
40. Many of the tools used in extreme programming are inexpensive or free. T
(p. 174)
41. Pair programming speeds up development, but does not enhance overall
quality. F (p. 176)
42. The 40-hour work week advocated by extreme programming improves
effectiveness. T (p. 176)
43. Agile modeling uses all the values of extreme programming as well as
humility. T (p. 176)
44. The word "agile" in Agile modeling implies maneuverability. T (p. 177)
Multiple Choice
45. Which of the following is not a good use of prototyping?
A.
B.
C.
D.
151)
interviews.
observation.
questionnaires.
All of the above (p. 152)
None of the above
47. When several very similar systems are to be developed by the same
organization, which kind of prototyping is most likely?
A.
First of a series prototype (p. 153)
B.
Model bearing some essential features
C.
Nonworking scale model
D.
Patched-up prototype
48. Which prototyping method is set up to test certain aspects of the design?
A.
B.
C.
D.
49. Which prototype includes some, but not all, of the components of the final
system?
A.
B.
C.
D.
controversial.
inefficient. (p. 153)
nonworking.
standardized.
52. The two main complaints about going through the systems development life
cycle are:
A.
the time that it takes to build a system and that user requirements
change over time. (p. 154)
B.
the time that it takes to build a system and the users noninvolvement
in the process.
C.
the users noninvolvement in the process and that user requirements
change over time.
D.
the amount of inaccuracies that manifest during the long life cycle and
the lack of a method for quick implementation.
53. Which of the following is a potential disadvantage of prototyping?
A.
B.
C.
D.
design input/output.
estimate costs. (p. 155)
modify interfaces.
obtain user feedback.
full-scale.
independent. (p. 156)
interdependent.
unstructured.
59. Which of the following is not a way users can be expected to help in
prototyping?
A.
B.
C.
D.
60. Which of the following is not one of the three broad phases of RAD?
A.
B.
C.
D.
Requirements planning
Analysis (p. 162)
Design workshop
Implementation
users design the system interfaces, the components that they are going
to work with on a day-to-day basis.
under the guidance of analysts, users receive training and construct
simple screen and report prototypes.
users respond to actual working prototypes and analysts refine
designed modules based on the responses. (p. 162)
users and analysts work to come up with the requirements that must
be included in the system.
Requirements planning
User design
Cutover
Programming (p. 163)
64. One way the tools used for constructing RAD systems differ from each other
is:
A.
B.
C.
D.
65. Which of the following is not a situation that should use RAD?
A.
The team includes programmers and analysts who are experienced
with RAD.
B.
When users are relatively simple and are detail-oriented and
usually not very involved with organizational goals (p. 165)
C.
There are pressing business reasons for speeding up application
development.
D.
Working with a novel ecommerce application
66. Which of the following is a disadvantage of RAD?
A.
B.
C.
values.
principles.
practices.
All of the above (p. 165)
69. Systems that require constant updating and technical design are prone to
which kind of error?
A.
B.
C.
D.
70. Which of the following is not one of the four values of extreme
programming?
A.
B.
C.
D.
Communication
Technical skill (p. 166)
Simplicity
Courage
71. Which of the following extreme programming values is being used when
customers create functional tests for all of the stories that the programmers
have subsequently implemented?
A.
Feedback
B.
Simplicity
C.
Courage (p. 167)
D.
Communication
72. What percent of problems can be solved with utter simplicity?
A.
B.
C.
D.
less than 50 %
50 %
70 %
90 % (p. 168)
Coding
Listening
Documenting (p.168)
Designing
74. Which of the following can be used to communicate ideas that would
otherwise remain fuzzy or unshaped?
A.
B.
C.
D.
Testing
Documenting
Scope
Coding (p. 169)
75. Which of the following is not a variable that can be adjusted to complete the
project by its due date?
A.
B.
C.
D.
Time
Testing (p. 170)
Quality
Scope
design
documentation
feedback
stories (p. 172)
78. Agile modeling uses all the values of extreme programming plus:
A.
B.
C.
D.
Travel light
Model with a purpose
Code for tomorrow (p, 176)
Software is your primary goal
Product backlog
Daily scrum
Spring (p. 177)
Demo
Completion
81.
82.
83.
84.
A system for which only input and output are prototyped is called a(n)
(nonoperational prototype). (p. 153)
85.
86.
The best approach to development for eliciting user feedback about the
proposed system is (prototyping). (p. 155)
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
(Feedback) occurs when customers create functional tests for all of the
stories that the programmers have subsequently implemented. (p. 167)
97.
(Ninety) percent of problems can be solved with utter simplicity. (p. 168)
98.
99.
100. In extreme programming, the activities are often done (concurrently). (p.
172)
101. Many of the tools used in (extreme programming) are inexpensive or free.
(p. 174)
102. One of the lessons learned from extreme programming is that short releases
allow systems to (evolve). (p. 175)
103. Agile modeling uses all the values of extreme programming plus (humility).
(p. 176)
104. (Modeling) is a keyword in Agile methods. (p. 177)
105. (Scrum) is an agile approach based on rugby. (p. 177)
Chapter 7
Using Data Flow Diagrams
True-False
1. The data flow diagram graphically characterizes data processes and flows in
a business system. T (p. 191)
2. The biggest advantage of the data flow approach lies in the conceptual
freedom found in the use of the four symbols. T (p. 192)
3. The data flow diagram may be used to analyze the proposed system. T (p.
192)
4. An arrow is used to depict an external entity that can give and receive data
from the system. F (p. 193)
5. Each external entity is labeled with a noun. T (p. 193)
6. A rectangle with rounded corners is used to show the occurrence of a
transforming process. T (p. 193)
7. Processes in a rectangle with rounded corners sometimes denote something
other than a change in or transformation of data or a system/subsystem. F
(p. 193)
8. Processes that transform data should be indicated with a noun. F (p. 193)
9. In logical data flow diagrams, the type of physical storage is unspecified. T
(p. 193)
10. The name of the data flow coming out of a process should be different from
the name of the data flow going into the process. T (p. 193)
11. The top of the process symbol may be used later on in analysis when
physical implementation has been chosen. F (p. 192)
12. The systems analyst needs to conceptualize data flows from a top-down
perspective. T (p. 194)
13. The highest level data flow diagram is called Diagram 0. F (p. 194)
14. With a top-down approach, the diagrams move from specific to general. F
(p. 194)
15. More detail is achievable through using a process called exploding the
diagrams. T (p. 195)
16. Data flow diagrams must be drawn working from left to right on the page. F
(p. 195)
17. All data flow must either originate or terminate on a process. T (p. 198)
18. Data stores may be directly connected to each other by a data flow. F (p.
198)
19. Linear data flow from process to process is normal in higher level data flow
diagrams. F (p. 199)
20. Unbalanced decomposition means that the data flow to or from a parent
process does not match the data flow in or out of a child diagram. T (p.
199)
21. A logical data flow diagram shows how the business operates. T (p. 199)
22. A physical data flow diagram shows how the system will be implemented.
T (p. 199)
23. Transaction files are used to link all logical data flow diagram processes. F
(p. 203)
24. Partitioning is used to create a set of computer programs and manual
procedures from a data flow diagram. T (p. 207)
25. A CRUD matrix is a tool used to represent where master files are read,
updated, created, and deleted within the system. T (p. 203)
26. A use case summarizes an event and defines one activity. T (p. 207)
27. Partitioning may be used to show which Web pages are placed on a secure
server and which are on a non-secure server. T (p. 207)
28. Each time data must be obtained from a data store or an external partner,
there should be a unique Web form and process to validate the data. T (p.
221)
29. Having separate Web forms means that the forms will become more
complex. F (p. 221)
Multiple Choice
Wh
30.
Data dictionary
Data flow diagrams (p. 191)
Structured analysis
Design
31. Which of the following is the biggest advantage of the data flow approach
over narrative explanations?
A.
Freedom from committing to the technical implementation of the
system too early
B.
Further understanding of the interrelatedness of systems and
subsystems
C.
Communicating current system knowledge of users through data flow
diagrams
D.
Conceptual freedom found in the use of the four symbols (p. 192)
32. Which of the following is not one of the four basic symbols used to chart
data movement on data flow diagrams?
A.
B.
C.
D.
Process sequence
Identifying number
Process description (p. 192)
Process implementation
35. Which of the following is not included in the context level diagram?
A.
B.
C.
D.
Basic inputs
Processes
Data store (p. 194)
Outputs
37. Which of the following is not an error when drawing a data flow diagram?
A.
B.
C.
D.
38. When the data flow in and out of a parent process do not match the data
flow in or out of a child diagram, it is called:
A.
B.
C.
D.
a primitive process.
a disordered pair.
a logical data flow diagram.
unbalanced decomposition. (p. 199)
are used when interface data flow exist on data flow diagrams.
may be used to link processes that execute at different times. (p.
are included to store all derived elements.
are required to implement all on-line processes.
44. Which of the following is not a reason for partitioning processes into
separate programs?
A.
The processes represent different user groups.
B.
The processes execute at different times.
C.
To control system security.
D.
To maintain consistency of data. (p. 207)
45. A CRUD matrix is used to show:
A.
B.
C.
D.
46. In a CRUD matrix, each row represents the data stores used for each:
A.
B.
C.
D.
The
47.
process.
database table.
data flow child diagram.
activity. (p. 203)
The process of creating a simple data flow diagram fragment for each
unique system trigger is called:
A.
B.
C.
D.
48. The advantage of building data flow diagrams based on events is that:
A.
B.
C.
D.
events are small scale and easy to analyze for input and output.
users are familiar with the events within their business and know how
the events drive other activities. (p. 206)
events fall into one of four categories: read, update, create, delete.
events are predictable and lend a high degree of stability to the data
flow diagram.
50. Partitioning on a data flow diagram for an ecommerce Web site may be used
to show:
A.
B.
C.
D.
external events.
triggers.
security. (p. 207)
derived elements.
51. Which of the following is a goal of dividing a Web site into a series of Web
pages?
A.
B.
C.
D.
52. What should be created each time data must be obtained from a data store or
an external partner?
A.
B.
C.
D.
53. Having separate Web forms to collect transaction data means that:
A.
B.
C.
D.
55. A method that provides conceptional freedom for representing processes and
flows in a business system is the (data flow diagram). (p. 191)
56. (Data flow diagrams) depict the broadest possible overview of system
inputs, processes, and outputs. (p. 191)
57. By using combinations of only four symbols, the systems analyst is able to
create a pictorial depiction of data flows that eventually can provide solid
system (documentation). (p. 191)
58. The data flow approach enables the systems analyst to better understand the
interrelatedness of the (system) and its (subsystems). (p. 192)
59. An external entity is called a source or (destination) of data, and is
considered to be external to the study. (p. 193)
60. Data flows occurring simultaneously can be depicted doing just that through
the use of (parallel) arrows. (p. 193)
61. The data store symbol is simply showing a depository for data that allows
addition or (retrieval) of data. (p. 193)
62. With a(n) (top-down) approach, the diagrams move from general to
specific. (p. 194)
63. Although the first diagram helps the systems analyst grasp basic data
(movement) , its general nature limits its usefulness. (p. 194)
64. When the first diagram is made, (inputs) and (outputs) are specified and
these remain constant throughout all of the following diagrams. (p. 195)
65. Effective (naming) is required for a person unfamiliar with the system to
understand the data flow diagram. (p. 193)
66. A(n) (primitive process) is one that does not explode to a child diagram.
(p. 197)
67. When a process has all input or all output data flow, it means that a(n)
(arrowhead) is pointing in the wrong direction or there is a missing (data
flow). (p. 197)
18. Each level of a data flow diagram should use data appropriate for the level.
T (p. 259)
19. It is important that data flow names on a child data flow diagram are
contained within the parent process data flow. F (p. 259)
20. A starting point for creating data dictionary entries is to identify and
categorize system input and output data flow. T (p. 260)
21. The ideal data dictionary is automated, interactive, online, and evolutionary.
T (p. 262)
22. To have maximum power, the data dictionary should be entirely independent
from other programs. F (p. 262)
23. The data dictionary may be used to generate computer source code. T (p.
263)
24. The data dictionary is the one common source in the organization for
answering questions and settling disputes about any aspect of data definition.
F (p. 264)
25. One of the rules for analyzing a data dictionary is that elements present on a
data flow coming or going to a data store must be contained within the data
store. T (p. 264)
26. Extensible markup language (XML) is a language that can be used to
exchange data between businesses. T (p. 264)
27. XML is used when other systems or external organizations use the same
software. F (p. 264)
28. XML is a way to define, sort, filter, and translate data into a universal data
language. T (p. 265)
29. In XML, tags become the metadata. T (p. 265)
30. A document type definition is used to determine validity is the hardest part of
creating an XML document because of its cryptic nature. F (p. 265)
Multiple Choice
31. What is a reference work of data about data compiled by systems analysts?
A.
B.
C.
D.
32. What become(s) important for large systems that produce several thousand
data elements requiring cataloging and cross-referencing?
A.
Data dictionary
B.
Structured analysis
C.
Data flow diagrams
D.
Automated data dictionaries (p. 245)
E.
Design
33. Which of the following is not contained in the repository?
A.
B.
C.
D.
procedural logic
project management information
generated computer code (p. 246)
screen and report design
34. A data flow that contains data that are used between processes is called:
A.
B.
C.
D.
relational
metadatic
geometric
algebraic (p. 249)
either/or alternative.
optional.
iteration. (p. 249)
selection.
39. Which of the following entails working with the smallest meaningful
components of the system?
A.
Processes
B.
Data flows
C.
Data structure
D.
Data elements (p. 249)
40. A base element is one that:
A.
B.
C.
D.
look at what the current length of data is and use that value.
use values that other corporations have for similar elements.
determine the amount of a numeric element and add a few
characters for reasonable expansion. (p. 253)
keep the value for the length small to save file space.
eight digits.
eight alphanumeric characters. (p. 255)
a data structure or element that repeats eight times.
an element that is found within eight data structures.
drop-down lists.
radio buttons.
check boxes.
All of the above (p. 255)
algebraic notation.
structural records.
algebraic notation and structural records. (p. 259)
vertical expansion methodology.
49. The rule for vertical balancing between data flow diagrams is that:
A.
the data flow on a child diagram must be present within the structures
or elements on the parent diagram. (p. 259)
B.
the data flow on a parent diagram must have aliases to the child
diagram.
C.
the data flow into data stores on the parent diagram must be contained
within repetitive child diagram structures.
D.
the data flow on a parent diagram must contain all elements on a child
diagram.
screens.
reports.
forms.
All of the above (p. 262)
51. Which of the following is a flaw in the system design that is detected by
analyzing the data dictionary entries?
A.
All derived elements on an output flow must be present on an input
data flow.
B.
The data store may contain elements that are not present on any data
flow to or from the data store.
C.
All base elements on an output data flow must be present on a
data flow into the process. (p. 263)
D.
All elements that are discrete must have a table of codes definition.
52. Which of the following is a flaw in the system design that is detected by
analyzing the data dictionary entries?
A.
B.
C.
one process.
D.
All elements that are discrete must have a table of codes definition.
53. Elements on a data flow going into or out from a data store:
A.
B.
C.
D.
Automated
Efficient (p. 262)
Interactive
Online
Evolutionary
people.
programs.
aliases.
people and programs. (p. 264)
56. A language that can be used to exchange data between businesses is called:
A.
B.
C.
D.
59. A method for describing the data flows and data stores of a data flow
diagram is the data (dictionary). (p. 245)
60. A(n) (alias) is a synonym or another name for the element, used by different
users of systems. (p. 253)
61. A(n) (repository) is a large collection of information that is larger than a
data dictionary. (p. 246)
62. (Data flow) is usually the first component to be stored in the data dictionary.
(p. 247)
63. A(n) (data structure) is composed of related elements. (p. 249)
64. A(n) (structural record) is one that is contained within a larger data
structure and consists of further subdivisions. (p. 250)
65. (Physical) data structures include additional elements necessary for
implementing the system. (p. 251)
66. The correct determination of a(n) (element) length is important to avoid
truncation. (p. 254)
67. A(n) (discrete) value for an element is one that has certain fixed values. (p.
255)
68. A(n) (continuous) element is one that has a smooth range of values. (p.
255)
69. A (default) value for an element is one that is automatically displayed on a
screen to reduce the amount of keystrokes the user must make. (p. 255)
70. All (base elements) on an output data flow must be present on a data flow
coming into the process. (p. 263)
71. A(n) (derived element) must be output from at least one process that it is
not input to. (p. 264)
72. The data structure and elements are commonly used to generate (computer
language sourcecode). (p. 263)
73. (Extensible markup language) (XML) is a language that can be used to
exchange data between businesses. (p. 264)
74. XML is used when users have different computer (systems) and (software).
(p. 264)
75. XML is a way to define, sort, filter, and translate data into a(n) (universal
data) language. (p. 265)
76. In XML, (tags) become the metadata. (p. 265)
77. A(n) (document type definition) is used to determine if the XML document
content is valid. (p. 265)
Chapter 9
Describing Process Specifications and Structured Decisions
True-False
1. Process specifications show the decision-making logic and formulas
necessary to transform process input data into output. T (p. 284)
2. Although process specifications produce a precise description of what is
accomplished, they are not detailed enough to validate the system design. F
(p. 284)
3. Process specifications are always produced for input and output operations,
such as a read or write operation. F (p. 284)
4. Process descriptions may exist on a form but not within a CASE tool
repository. F (p. 284)
5. Process logic may be represented as either structured English, a decision
table, a decision tree, or a formula. T (p. 285)
6. Selection data dictionary entries become IF...THEN...ELSE structured
English statements. T (p. 291)
20. Use decision tables when there are many repetitious actions. F (p. 301)
21. Use decision trees when the sequence of conditions and actions is critical. T
(p. 302)
22. The logic of a parent process shows the execution sequence that the child
diagram processes must follow. T (p. 304)
23. All the process specifications for the entire data flow diagram are
consolidated and included in the specification packet given to the computer
programmer. F (p. 304)
24. Horizontal balancing means that all output elements must be on input data
flow. F (p. 305)
25. Business rules are the set of procedures, conditions or formulas that allow a
corporation to run its business. T (p. 285)
Multiple Choice
26. To determine the information requirements using a decision analysis
strategy, what must the systems analyst determine?
A.
B.
C.
D.
Necessary data
Objectives (p. 283)
Information
Data structure
29. When creating process specifications, what needs to be done for manual
tasks?
A.
Create well-defined procedures for employees performing the
tasks. (p. 285)
B.
Replace them with automated processes.
C.
Outline the decisions using a decision tree.
D.
Nothing, they are not part of processing specifications.
30. Which of the following is not a business rule?
A.
B.
C.
D.
Logical inferences
Mathematical and functional derivations
Programming language IF statements (p. 285)
Definitions of business terms
structured English.
a decision table.
a decision tree.
a formula.
All of the above (p. 285)
A.
B.
C.
D.
Quadrant
Content
upper-left
upper-right
lower-left
lower-right
condition alternatives
actions to be taken
condition
execution of actions (p. 292)
38. In order to build decision tables, what does the analyst not need to do?
A.
B.
C.
D.
39. How many columns would a table with seven conditions with yes or no
alternatives have?
A.
B.
C.
D.
64
128 (p. 294)
256
512
40. Which of the following is not one of the ways to reduce the complexity of
unwieldy decision tables?
A.
Use alternatives (p. 298).
B.
Use extended entries.
C.
Use ELSE rule.
D.
Construct multiple tables.
41. Unlike the decision tree used in management science, what doesn't the
analyst's tree contain?
A.
B.
C.
D.
Decisions
Conditions
Outcomes (p. 299)
Actions
42. When drawing the tree, systems analysts don't have to identify:
A.
B.
C.
D.
43. Which of the following is not one of three main advantages of a decision
tree over a decision table?
A.
B.
C.
D.
C.
D.
the process logic shows the order of execution for the child
diagram processes. (p. 304)
the process logic must be created using a decision table. Each process
on the child diagram is a PERFORM statement within the parent
decision table.
the process logic is depicted using a decision tree, with child data
flow appearing as the connecting lines on the tree.
process logic is not written.
48. Which of the following is not a problem when creating decision tables?
A.
B.
C.
D.
Impossible situations
Too many conditions (p. 297)
Redundancy
Contradictions
B.
C.
D.
51. (Process specifications) are created for primitive processes on a data flow
diagram. (p. 283)
52. One of the goals of producing (process specifications) is to validate the
system design, including the data flow diagram and the data dictionary. (p.
283)
53. Process descriptions may exist on a form or within a(n) (CASE tool)
repository. (p. 284)
54. When structured decisions are not complex, an appropriate technique for
analyzing the decision process is the use of (structured) English. (p. 286)
55. Structured English can be more complex if blocks of (instructions) are
nested within other blocks of (instructions). (p. 288)
56. (Selection) data dictionary entries become IF...THEN...ELSE structured
English statements. (p. 291)
57. (Iteration) data dictionary entries become DO WHILE, DO UNTIL, or
PERFORM UNTIL structured English statements. (p. 291)
58. One of the ways to reduce the complexity of unwieldy decision tables is to
use extended (entries). (p. 298)