16 Jan

1. _(A)___ is a team-driven project management approach,
in which a project leader is more of a participant and
facilitator than a manager during the project. (623)
a. Extreme project management
b. The Rational Unified Process (RUP)
c. Phased conversion
d. Object modeling

2. A __(D)___ analyzes the time required to complete a task
and identifies the minimum time required for an entire
project. (624)
a. Gantt chart b. PERT chart
c. use case diagram d. none of the above

3. In larger organizations, users write a formal request for
a new or modified information system, which is called a
__(C)___. (626)
a. request for proposal (RFP)
b. joint-application design (JAD)
c. project request
d. data-flow design (DFD)

4. During the planning phase, the projects that receive the
highest priority are those __(A)___. (628)
a. mandated by management or some other
governing body
b. suggested by the greatest number of users
c. thought to be of highest value to the organization
d. proposed by the information technology (IT)

5. A(n) __(C)___ lists a variety of conditions and the actions
that correspond to each condition. (633)
a. object
b. DFD
c. decision table
d. ERD

6. The purpose of the __(D)___ is to assess the feasibility of
each alternative solution and then recommend the most
feasible solution for the project. (635)
a. project plan
b. system review
c. project request
d. system proposal

7. __(A)___ tools are designed to support one or more
activities of system development. (642)
a. Computer-aided software engineering (CASE)
b. Unified Modeling Language
c. Project management
d. Object modeling

8. A(n) __(D)___ test is performed by end-users and checks
the new system to ensure that it works with actual
data. (644)
a. integration
b. systems
c. unit
d. acceptance

__(F)___ 1. An information system supports daily, short-term, and long-range activities of systems analysts. (620)

__(T)___ 2. A systems analyst is responsible for designing and developing an information system. (622)

__(F)___ 3. Operational feasibility measures whether an organization has the hardware, software, and people needed to
support a proposed information system. (624)

__(F)___ 4. Documentation should be updated only after a project is complete. (625)

__(F)___ 5. In detailed analysis, the systems analysts develop the proposed solution with a specific hardware or software in
mind. (631)

__(T)___ 6. Structured English is a style of writing that describes the steps in a process. (633)

__(F)___ 7. Object modeling combines the data with the processes that act on that data into a single unit, called a method. (634)

__(F)___ 8. The only major activity of the design phase is the development of all of the details of the new or modified
information system. (638)

__(T)___ 9. Some VARs provide complete systems, known as a turnkey solution. (639)

__(T)___ 10. During program design, the systems analyst prepares the program specification package, which identifies
the required programs and the relationship among each program, as well as the input, output, and database
specifications. (641)

__(F)___ 11. With a pilot conversion, multiple locations in the organization use the new system. (644)

d. shows how actors interact with an information system
_____ 1. system developer (623)h. responsible for designing and developing an information system

_____ 2. project manager (623)e. controls the activities during system development

_____ 3. request for system services(626)a. becomes the first item in the project notebook and triggers the planning phase

_____ 4. process modeling (631)b. analysis and design technique that describes processes that transform inputs
into outputs

_____ 5. project dictionary (633)i. contains all the documentation and deliverables of a project

_____ 6. data dictionary (634)g. stores a name, description, and other details about each data item

_____ 7. object (634)f. an item that can contain both data and the procedures that read or
manipulate that data

_____ 8. packaged software (635)j. mass-produced, copyrighted, prewritten software available for purchase

_____ 9. prototype (641)c. working model of the proposed system

_____ 10. performance monitoring(645)k. determines whether the system is inefficient or unstable at any point

1. What is system development? System development is a set of activities used to build an information system.

Describe the five phases of the system development life cycle (SDLC). -planning
-operational,support, and security

2. What are four types of feasibility, and what does each measure?

-Operational feasibility measures how well the proposed information system will work.

-Schedule feasibility measures whether the established deadlines for the project are reasonable.

-Technical feasibility measures whether the organization has or can obtain the hardware,
software, and people needed to deliver and then support the proposed information system.

-Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime
benefits of the proposed information system will be greater than its lifetime costs.

What are six techniques used to gather data and information? -Review Documentation
-JAD Sessions

3. How is UML used? The UML is a graphical tool that enables analysts to document a system.

How is a use case diagram different from a class diagram? A use case diagram graphically shows how actors interact with the information system.
A class diagram graphically shows classes and subclasses in a system.

4. What are the three major activities of the operation, support, and security phase?
(1) perform maintenance activities,
(2) monitor system performance, and
(3) assess system security.

Describe each type of maintenance activity.
Corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
Adaptive maintenance is the process of including new features or capabilities in an information system.
perfective maintenance is a process to make the infor mation system more efficient and reliable.

5. What is a computer security plan?
A computer security plan summarizes in writing all of the
safeguards that are in place to protect an organization’s
information assets.

What three things should a computer security plan do?
1. Identify all information assets of an organization, including hardware, software,
documentation, procedures, people, data, facilities, and supplies.

2. Identify all security risks that may cause an information asset loss. Rank risks from
most likely to least likely to occur. Place an estimated value on each risk, including lost
business. For example, what is the estimated loss if customers cannot access computers
for one hour, one day, or one week?

3. For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: