TEST BANK For Systems Analysis and Design 13th Edition by Scott Tilley All Chapters 1-13

Page 1


Test Bank for Systems Analysis and Design 13th Edition 2025 by Scott Tilley Chapter 1-1301: Introduction to Systems Analysis & Design Chapter Ch 01 Introduction to Systems Analysis & Design 1. Strong analytical and critical thinking skills are not a requirement for being a systems analyst. a. True b. False ANSWER: RATIONALE:

b

Strong analytical and critical thinking skills are required to be a systems analyst.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.1 - Describe the impact of information technology on society. TOPICS: Information Technology KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 2. Debbie is a systems analyst assigned to the marketing and sales team. She is working on two important

projects this week. Given the types of projects that a systems analyst would work on, what projects would she most likely be involved in? Choose all that apply. a. installing a NIC (Network Interface Card) into a new desktop computer for a sales team member b. delivering a presentation to the CEO regarding marketing strategies for the fourth quarter c. installing a VLAN (virtual LAN) so the marketing and sales team can have their own virtual network d. planning a new e-commerce website for the sales team ANSWER: RATIONALE:

b, d

Giving presentations and planning an e-commerce site are two of the many things that a systems analyst could be asked to do at any given time.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.1 - Describe the impact of information technology on society. TOPICS: Information Technology KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 3. Avi is working on a mission-critical system for Basel Group. Why is a mission-critical system important? a. It produces specific data results. b. It's vital to a company's operations. c. It transforms data into output for users. Page 1


d. It's how the company network works. ANSWER: RATIONALE:

b

A mission-critical system is vital to a company's operations because the company cannot do business without it.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 4. Mike is a systems software specialist. He maintains system software that manages hardware components.

Which of the following software is considered system software? Choose all that apply. a. Adobe Acrobat b. Windows 11 c. Microsoft Defender d. Outlook ANSWER: RATIONALE:

b, c

System software manages hardware components and includes operating systems, such as Windows 11, and security software, such as Microsoft Defender.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 5. Jessica is an application software specialist. She's a freelancer who works with both major corporations and

small businesses. Which of the following software would an application software specialist be responsible for? Choose all that apply. a. Excel b. SAP Enterprise Resource Planning (ERP) c. Norton (Symantec) d. Access ANSWER: RATIONALE:

a, b, d

POINTS: QUESTION TYPE:

1 Multiple Response

Excel and Access are Microsoft products. Excel is for spreadsheets, and Access is a database program. For clients who need an ERP solution, SAP offers finance, human resources, supply chain management, and other business functions.

Page 2


HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 6. Emily is getting ready to install a new Medical Health Record system for her client. The client has several

printers from the pre-Windows 7 era as well as 10-year-old MS office software. What are these older systems called? a. mixed systems b. general systems c. legacy systems d. horizontal systems ANSWER: RATIONALE:

c

Older systems are called legacy systems. When mixing new systems with legacy systems, Emily will have to be sure that the new system she installs will work with the legacy printer drivers and office software. Sometimes, legacy systems do not work with new systems and must be replaced.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 7. Processes describe the tasks and business functions that users, managers, and IT staff perform to achieve

specific results. a. true b. false ANSWER: RATIONALE:

a

Processes describe the tasks and business functions that users, managers, and IT staff perform to achieve specific results.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM Page 3


8. Tim is working on a mission-critical system for Maji Health Systems. There are many types of systems used

in a healthcare setting, but which systems below could be considered mission-critical? Choose all that apply. a. Access Database b. Electronic Health Record (EHR) Systems c. SQL Server d. Laboratory Information Systems (LIS) ANSWER: RATIONALE:

b, d

Mission-critical systems for a healthcare environment can include Electronic Health Record (EHR) Systems, which store and manage patient health records, and Laboratory Information Systems (LIS), which manage laboratory workflows, including test ordering, specimen tracking, and result reporting.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 9. Jirar is working with his client, the Bloomfeld Group, on some new enterprise applications. The company

sells widgets in the business-to-consumer (B2C) market. There are dozens of enterprise applications available. What applications might Jirar set up for his business-to-consumer client? Choose all that apply. a. office productivity suites b. pdf creation programs c. order processing systems d. payroll systems ANSWER: RATIONALE:

a, c, d

Jirar might use an office productivity suite: This software will allow employees to speak, keep in contact with customers, send email, and keep track of sales. He may also an order processing system so the company can keep track of orders placed, orders sent, and inventory. Finally, the company needs to keep track of payroll, so employees get paid on time.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 10. Sergio has his own business and works for a client that has fewer than 50 employees. The client sells

computers to businesses and is looking to Sergio to install a few horizontal systems to increase their team's efficiency. What type of systems should Sergio install to achieve this goal? Choose all that apply. Page 4


a. office productivity suite-Microsoft Office Professional b. collaboration and communication tools-Slack and Zoom c. Adobe products-Acrobat and Photoshop d. retail point-of-sale (POS) software ANSWER: RATIONALE:

a, b

To increase the team's efficiency, Sergio should install an office productivity suite so that employees can work on spreadsheets, documents, presentations, and email together. Installing Slack and Zoom can help employees collaborate on projects.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.2 - Describe the five main components of an information system. TOPICS: Information Systems KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 11. Gretchen manages supply chain software for Magna Corporation, which is a Fortune 1000 company, and

Linda manages the same software for a Magna Corporation vendor. What type of business model is this considered? a. business-to-consumer b. consumer-to-consumer c. business-to-business d. consumer-to-business ANSWER: RATIONALE:

c

Large companies use supply chain management software to manage all the materials up and down the supply chain that go into their products. Linda's company is a vendor of Magna corporation, so she must be aware when materials from her company are needed.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.3 - Explain Internet business strategies and relationships, including B2C and B2B. TOPICS: Internet Business Strategies KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 12. David is a consultant with APG Consulting Group. He has been asked to develop a business strategy for a

company that manufactures products and ships them to retail outlets. What type of business strategy will David use? a. The manufacturer and the retail outlet are both consumers. b. The manufacturer is the consumer, and the retail outlet is the business. Page 5


c. The manufacturer and the retail outlet are both businesses. d. The manufacturer is the business, and the retail outlet is the consumer. ANSWER: RATIONALE:

c

The business manufactures products and ships them to retail outlets. Both the manufacturer and the retail outlet are businesses. David will be using the business-tobusiness model for his strategy.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.3 - Explain Internet business strategies and relationships, including B2C and B2B. TOPICS: Internet Business Strategies KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 13. Fabio is developing a business model for a business client that sells to consumers. The client wants to know

what the main difference is between the business-to-consumer (B2C) and the consumer-to-consumer (C2C) business module. What does Fabio tell his client? a. The B2C model focuses on providing business-oriented products and services to other businesses,

while the C2C model facilitates direct exchanges for consumer-oriented products from other consumers. b. The C2C model focuses on providing consumer-oriented products to businesses, while the B2C model facilitates direct exchanges for consumer-oriented products from other consumers. c. The B2C model focuses on providing consumer-oriented products and services from a business to the consumer, while the C2C model facilitates direct exchanges for consumer-oriented products from individual consumers. d. There is no difference between the B2C and C2C models other than the size of the consumer base. ANSWER: RATIONALE:

c

Fabio tells his client that the B2C model focuses on providing consumer-oriented products and services from a business to the consumer, while the C2C model facilitates direct exchanges for consumer-oriented products from individual consumers.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.3 - Explain Internet business strategies and relationships, including B2C and B2B. TOPICS: Internet Business Strategies KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 14. A business profile is an overview of a company's mission, functions, organization, products, services,

customers, suppliers, competitors, constraints, and future direction. Page 6


a. true b. false ANSWER: RATIONALE:

a

A business profile is the starting point for the modeling process. It's an overview of a company's mission, functions, organization, products, services, customers, suppliers, competitors, constraints, and future direction.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.4 - Explain how to use business profiles and models. TOPICS: Modeling Business Operations KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/18/2024 1:10 PM 15. Betty works for a major corporation. Her company uses an enterprise resource planning (ERP) system.

Betty's friend asked her what ERP is and what type of services ERP systems provide. How does Betty reply? Choose all that apply. a. ERP provides customer demand forecasts. b. ERP provides inventory control information. c. ERP provides network infrastructure. d. ERP provides email management services. ANSWER: RATIONALE:

a, b

Two ERP functions are providing forecasting for customer demand and inventory control information.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.5 - Identify the seven types of information systems used in business. TOPICS: Business Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 16. Alyssa works for Gentron Corporation, and her job is in the Engineering Department. Each employee is

given a suite of user productivity tools to work with. So, which productivity tools would Alyssa be given to do her job effectively? Choose all that apply. a. email b. voicemail c. office productivity suite d. graphic design software ANSWER: RATIONALE:

a, b, c

Alyssa would be given email to send and receive messages, voice mail to receive messages, and an office productivity suite to communicate with colleagues. There is Page 7


no reason engineering would need a graphic design program since there is no need for them to design any graphics. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.5 - Identify the seven types of information systems used in business. TOPICS: Business Information Systems KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 17. Mary's job is to attach radio frequency identification (RFID) tags to retail goods to track them. There are

some products, however, that RFID tags may not work. Which of the following retail products may not be good candidates for RFID tags? a. a shirt b. perishable goods c. loose potatoes d. a box of candy ANSWER: RATIONALE:

c

Loose items, such as potatoes, are not individually packaged and are not uniform in shape so they would be impractical to tag.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.5 - Identify the seven types of information systems used in business. TOPICS: Business Information Systems KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 18. Miya's client is trying to decide between enterprise resource planning (ERP) and transaction processing (TP)

systems. The company almost has the technological need for ERP but wants to stick with simpler TP systems for now. The client wants Miya to explain the differences between ERP and TP systems. What is Miya's explanation? a. ERP systems tend to be more complex, have extensive integration capabilities, and offer advanced

analytical features, whereas TP systems are simpler, more transaction-oriented, and targeted at specific operational roles. b. TP systems tend to be more complex, have extensive integration capabilities, and offer advanced analytical features, whereas ERP systems are simpler, more transaction-oriented, and targeted at specific operational roles. c. Both ERP and TP are complex and have extensive integration capabilities. The difference is ERP is for larger organizations, and TP is for smaller organizations. d. Both ERP and TP are transaction-oriented and not simple to integrate. They are resource intensive and don't work well together. ANSWER:

a Page 8


RATIONALE:

Miya explains ERP systems tend to be more complex, have extensive integration capabilities, and offer advanced analytical features, whereas TP systems are simpler, more transaction-oriented, and targeted at specific operational roles.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.5 - Identify the seven types of information systems used in business. TOPICS: Business Information Systems KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 19. Reynaldo works as a top-level manager (Chief Strategy Officer) for Emron Corporation. His job is to

develop a five-year strategic plan for the company. How is a strategic plan used? Choose all that apply. a. Strategic plans define the company's product line. b. Strategic plans define the company's core management. c. Strategic plans define the company's competitive threats. d. Strategic plans define the company's mission and goals. ANSWER: RATIONALE:

c, d

The strategic plan defines the company's competitive threats-what company is in the position most likely to overtake them or take market share from them. The strategic plan also defines the company's mission and goals-what are the company's core competencies, what is its purpose for being in its chosen marketplace, and how will the company continue to grow over the next five years. Product lines can change within the five-year plan, and core management (C-Suite personnel) does not necessarily last five years anymore.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 20. Yuri is the middle manager (human resources manager) with the Stonehenge Group. It is his duty to hire

(on-board) and fire (off-board) employees. Yuri must enforce company HR policies and check in with supervisors and team leaders to determine their staffing needs. He must also check with top management about any changes in hiring policies. What are some of Yuri's primary responsibilities? Remember, he's human resources manager (middle manager). Choose all that apply. a. recruitment and hiring b. network management c. employee relations d. customer retention ANSWER:

a, c Page 9


RATIONALE:

Yuri's job includes recruitment, hiring, and employee relations.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 21. In a corporate structure, the top managers such as the CEO, CFO, CTO, and CIO (C-Suite) report to a board

of directors that the company's top managers elect. a. true b. false ANSWER: RATIONALE:

b

In a corporate structure, the top managers such as the CEO, CFO, CTO, and CIO (CSuite) report to a board of directors elected by the company's shareholders. Shareholders can be defined as people who own stock in the company.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 22. Barry is a knowledge worker. He's a market researcher for J.D. Driver research group, specializing in

automotive trends. Barry is one of five market researchers at the company that research the big three American automotive manufacturers (Ford, GM, and Chrysler). What type of information would Barry be gathering for those automotive manufacturers? Choose all that apply. a. market trends b. preferred internet provider c. consumer preferences d. preferred cable provider ANSWER: RATIONALE:

a, c

Barry would be researching market trends and consumer preferences on how consumers feel about the big three American automotive manufacturers.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Apply Page 10


DATE CREATED: DATE MODIFIED:

6/14/2024 7:22 PM 6/14/2024 7:22 PM

23. Destiny is an operational employee with Samba Corporation. She works in their customer service center.

She has been authorized to offer refunds, warranty replacement, returns, or exchanges without a manager's approval. What is this trend called? a. trust b. empowerment c. active listening d. giving the customer what they want ANSWER: RATIONALE:

b

The trend is called empowerment, which gives employees more responsibility and accountability for their actions with customers.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 24. Governmental rules and regulations do not impact strategic planning. a. true b. false ANSWER: RATIONALE:

b

Depending on the industry, governmental rules and regulations can have a major impact on strategic planning, especially if it is known that the rules regarding a company's product or product line are set to change within the five-year timeframe of the strategic plan.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 25. Imani is a team leader for Octagon Group. Her job as team leader is to collaborate with her team and higher-

level management to define objectives, set performance targets, and establish project or task timelines. For this new project, top-level management has given Imani a 12-week deadline and 10 employees to complete it. What steps should Imani take to get the project underway? Choose all that apply. a. Collaborate with team members to gather insights and suggestions in order to foster ownership and Page 11


commitment to the goals of the project. b. Define specific and measurable goals that are aligned with the organization's objectives. c. Break down goals into actionable tasks. d. Define top-level management's responsibilities. ANSWER: RATIONALE:

a, b, c

Imani must work with her team members to gather insight, define specific and measurable goals, and break down goals into actionable tasks. Imani should break the project down into manageable pieces so that each team member has a part to play in completing the project.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.6 - Describe the types of information the four classes of users need. TOPICS: Organizational Information Models KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 26. Kenneth is an IT manager with Thimble Accountancy Group. The CEO approached him to request a new

program to aid the company in tracking billable hours. The necessity for this arose due to the shortcomings of the current legacy program, which has not functioned properly since the upgrade to Windows 11. The systems request has been made. How must Kenneth proceed, now that the systems request has been made? a. a preliminary investigation followed by a data system diagram b. a preliminary investigation followed by research on existing off-the-shelf software c. a preliminary investigation followed by a feasibility study d. a preliminary investigation followed by business rules ANSWER: RATIONALE:

c

Kenneth first must complete a preliminary investigation because it will affect the entire development process, and then do a feasibility study.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.7 - Distinguish between structured analysis, object-oriented analysis, and agile systems development methods. TOPICS: Systems Development KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 27. Hana's company, Glen Aerospace, is developing a new engine for a prototype aircraft they have built. They

only have six months to develop the engine. Since they have a very short time to develop the engine, why would the agile method be the best to use in this type of situation? Choose all that apply. a. It follows a sequential and linear approach. b. It embraces change and allows for flexibility. Page 12


c. It divides the project into distinct phases and different teams work on each phase sequentially. d. It emphasizes collaboration and self-organization of teams. Cross-functional teams work together

throughout the project. ANSWER: RATIONALE:

b, d

Since the development of the project can only take 6 months, the agile model is best because it allows for changes and flexibility, and it emphasizes collaboration and the self-organization of teams. Although it has a defined structure, an agile method is not rigid like the waterfall method.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.7 - Distinguish between structured analysis, object-oriented analysis, and agile systems development methods. TOPICS: Systems Development KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 28. Kenneth has completed the system planning phase (feasibility study) on a new billable hour program for

Thimble Corp. (an accountancy corporation). He is now on to the system analysis phase (requirements modeling). How does requirements modeling differ from a feasibility study? a. Requirements modeling is a cost/benefit analysis and determines if the project should be approved,

and a feasibility study looks at how the system must work to satisfy users. b. A feasibility study is a cost/benefit analysis and determines if the project should be approved, and requirements modeling looks at how the new system must do to satisfy users. c. A feasibility study delivers the requirements document that describes management and user requests, whereas requirements modeling delivers the system design specification document. d. A feasibility study is used during the system's implementation phase, whereas requirements modeling is used during the system's operation phase. ANSWER: RATIONALE:

b

A feasibility study anticipates costs and benefits and recommends a course of action, whereas requirements modeling investigates the business process and documents what the new system must do to satisfy users.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.7 - Distinguish between structured analysis, object-oriented analysis, and agile systems development methods. TOPICS: Systems Development KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 29. Cho works in user support. Besides training users and managers on application software, he also answers

questions and troubleshoots problems. What is this user support function usually called? Page 13


a. system support desk b. help desk c. data support desk d. network support desk ANSWER: RATIONALE:

b

Cho functions as a help desk staff member. The help desk trains users and managers on application software. He also answers questions and troubleshoots problems along with other duties.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.8 - Explain the seven main functions of the information technology department. TOPICS: The Information Technology Department KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 30. Rai works for the team that tests all applications and systems changes to verify specifications and software

standards. What team does Rai work with? a. system support assurance b. database quality assurance c. network viability assurance d. quality assurance (QA) ANSWER: RATIONALE:

d

Rai works with the quality assurance (QA) team, which tests all applications and systems changes to verify specifications and software quality standards.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.8 - Explain the seven main functions of the information technology department. TOPICS: The Information Technology Department KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 31. Maria's job is to install and support operating systems, telecommunication software, and manage remote

clients. Which department does Maria work in? a. network administration b. systems support and security c. user support d. quality assurance ANSWER:

b Page 14


RATIONALE:

Maria works in systems support and security. Some of the duties of this group are to support and install operating systems, telecommunications software, and work with remote clients.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.8 - Explain the seven main functions of the information technology department. TOPICS: The Information Technology Department KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 32. Kai is an expert on website troubleshooting and is troubleshooting errors with her company's website. On

certain browsers, users cannot log in through the paywall. She has noted this bug and reported it to the web support team. What technical support function is Kai performing? a. network support administrator b. web support specialist c. user support specialist d. systems support specialist ANSWER: RATIONALE:

b

Kai is troubleshooting and resolving issues with the company's website. She is a web support specialist.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.8 - Explain the seven main functions of the information technology department. TOPICS: The Information Technology Department KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:22 PM 33. Strong oral and written communication skills are not necessary for a systems analyst. a. true b. false ANSWER: RATIONALE:

b

A systems analyst needs strong oral and written communication skills, and the ability to interact with people at all levels, from operational staff to senior executives.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.9 - Describe the roles and responsibilities of a systems analyst within the enterprise. Page 15


TOPICS: The Systems Analyst KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:22 PM DATE MODIFIED: 6/14/2024 7:23 PM 34. Mateo must keep up with his technical knowledge. Where is the best place to go to learn about technical

developments, exchange experiences, and get answers to questions?

a. IEEE Computer Society (IEEE) b. International Council on Systems Engineering (INCOSE) c. International Information System Security Certification Consortium (ISC)2 d. Security Event and Incident Management (SEIM) ANSWER: RATIONALE:

b

The International Council on Systems Engineering (INCOSE) is one of the leading organizations offering systems analysts a wealth of information, news, training, support communities, and more.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.9 - Describe the roles and responsibilities of a systems analyst within the enterprise. TOPICS: The Systems Analyst KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM

35. Gabriela is a systems analyst with Sky Corporation. She is working on a project for the Engineering

Department that requires close contact with the IT Department. Why is it important that Gabriela have a good understanding of business processes and IT systems to do her job effectively? a. Gabriela needs to be able to understand the technical language of each department. b. Gabriela must act as a translator and speak the language of both the Engineering Department and the

IT Department so they may achieve the correct objectives. Page 16


c. It will help Gabriela when she works with upper management. d. It will help Gabriela understand how business networking works in the company. ANSWER: RATIONALE:

b

Gabriela must act as a translator and speak the language of both the Engineering Department and the IT Department, so that through Gabriela, each department can understand the other department's objectives.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.1.9 - Describe the roles and responsibilities of a systems analyst within the enterprise. TOPICS: The Systems Analyst KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED:

Page 17


Ch 02 Analyzing the Business Case 1. Strategic planning can be described as identifying long-term organizational goals, strategies, and resources. a. true b. false ANSWER: RATIONALE:

a

There are several key factors that are typically considered when developing a strategic plan including identifying long-term organizational goals, strategies, and resources.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.1 - Describe the strategic planning process. TOPICS: Strategic Planning KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 2. Luna is working on a SWOT analysis for her company, a major coffee chain. A new hire, Genevieve, asks

what some strengths of the company are. What does Luna tell Genevieve? Choose all that apply. a. major dependence on a single product line b. strong financial performance c. dependence on many company-operated stores d. industry-leading customer loyalty ANSWER: RATIONALE:

b, d

Luna tells Genevieve that strengths of their company include strong financial performance and industry-leading customer loyalty.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.1 - Describe the strategic planning process. TOPICS: Strategic Planning KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 3. Elena has been asked to write a SWOT analysis for her company. She has decided to start with opportunities

first. Which of the following should be considered an opportunity? Choose all that apply. a. recently upgraded network b. can be first to market with new software c. impact of new government rules d. high potential for B2B growth ANSWER: RATIONALE:

b, d

The opportunities can be first to market with new software and high potential for

Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 02 Analyzing the Business Case

B2B growth. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.1 - Describe the strategic planning process. TOPICS: Strategic Planning KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 4. Ana is working on her company's SWOT analysis, and she is considering weaknesses and threats. She is

contemplating if a weakness can also be a threat. It is determined that it can be, so what would an example be of a weakness becoming a threat? Choose all that apply. a. A weak financial position could make it difficult for the organization to withstand an economic

downturn. b. Strong brand reputation can enhance the organization's ability to enter new markets or expand product lines. c. Inadequate cybersecurity measures can expose the organization to the threat of data breaches or cyberattacks. d. Advanced technology capabilities can enable the organization to take advantage of innovative market solutions. ANSWER: RATIONALE:

a, c

There are two. A weak financial position (weakness) could make it difficult for the organization to withstand an economic downturn (threat) and inadequate cybersecurity measures (weakness) can expose the organization to the threat of data breaches or cyberattacks (threat).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.1 - Describe the strategic planning process. TOPICS: Strategic Planning KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 5. Isabel is using a CASE (Computer-Aided Software Engineering) tool for her company's strategic planning.

She chose a CASE tool for its sophisticated and integration capabilities. What is the benefit of using a CASE tool? a. more consistency, better quality, and less effort for the planners b. easy maintenance and support c. no need for critical thinking skills d. adaptability and compatibility with other tools ANSWER:

a

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 02 Analyzing the Business Case RATIONALE:

CASE tools offer more consistency, better quality, and less effort for the systems analyst.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.2 - Explain how tools can support strategic planning. TOPICS: Strategic Planning Tools KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 6. Xavier is an analyst and has been asked by his company to create a business case for a new website. What is

the purpose of a business case in this situation? a. A case needs to be made to justify freeing up time and money for the IT Department to build the

website. b. A case needs to be made to justify its financial impact. c. A case needs to be made to determine if there are enough people to work on the project. d. A case needs to be made to justify the website build and if it fits into the overall mission and objectives of the company. ANSWER: RATIONALE:

d

In this situation, a business case refers to the justification for a new website. In addition, Xavier must also consider the company's overall mission and objectives.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.3 - Explain the concept of a business case. TOPICS: Strategic Planning Tools KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 7. Kai has a project in development and needs IT's help. To receive help from IT, she must ask for it formally.

What is the formal request called? a. help request b. IT request c. systems request d. time request ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Kai must make a systems request when asking for IT support.

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 02 Analyzing the Business Case LEARNING OBJECTIVES: Tilley.SAD13e.25.2.4 - Summarize the six main reasons for systems requests. TOPICS: Systems Requests KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 8. Ami works in accounting for a company that uses independent contractors. The contractors submit their

invoices manually through email and receive an email response that their invoice was received. Ami would like to streamline this process so that vendors could submit their invoices online and see when Amy's company will pay the invoices. What is this system request for? a. better performance b. more information c. improved service d. reduced cost ANSWER: RATIONALE:

c

This is a request to improve service. Amy's idea will improve service by allowing vendors to add and track invoices and know when the invoices will be paid resulting in increased vendor satisfaction.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.4 - Summarize the six main reasons for systems requests. TOPICS: Systems Requests KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 9. Sofia is analyzing her company's website. The website is five years old and running on a patchwork of code

(the code is not cohesive). Her company sells to the public, and lately her IT Department has been getting calls about how slow the website has been to refresh. How should Sofia approach the IT Department? a. Go directly to the IT Department b. Create a systems request and submit it to the IT Department for review. c. Ask her manager to speak to the IT Department. d. Speak to the Chief Technology Officer and have them request the work. ANSWER: RATIONALE:

b

Any project that requires the IT Department's help must be detailed in accordance with a systems request.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.4 - Summarize the six main reasons for systems requests. TOPICS: Systems Requests KEYWORDS: Bloom's: Apply Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 02 Analyzing the Business Case DATE CREATED: DATE MODIFIED:

6/18/2024 1:07 PM 6/18/2024 1:07 PM

10. Omari just received a new system project for IT. The project is necessary due to errors and problems with

the existing website. Is this considered an internal factor or an external factor? a. internal factor b. external factor ANSWER: RATIONALE:

a

This is an existing systems and data issue due to problems with the existing website, so it is an internal factor.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.5 - Describe the two factors affecting systems projects. TOPICS: Factors Affecting Systems Projects KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 11. There are internal factors and external factors that affect systems projects. Matias is examining some of the

external factors involved in the latest IT project for his company. Which of the following would Matias consider an external factor? a. proper allocation of resources b. the ability to manage and adapt to change c. Government regulations changes to compliance rules d. identifying, assessing, and managing risks within the project ANSWER: RATIONALE:

c

Government regulations changes to compliance with regulations are an external factor because changes can occur during the project, meaning changes will have to be made while the project is in process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.5 - Describe the two factors affecting systems projects. TOPICS: Factors Affecting Systems Projects KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 12. Isabella works for the Taji Group. The company has decided to try and use the PESTEL framework to

analyze the external factors affecting their company. It is up to Isabella to do the research. Which of the following issues will Isabella consider as an external factor? Choose all that apply. Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 02 Analyzing the Business Case a. the political environment and its impact on the organization b. economic trends, conditions, and forces that can impact the organization c. technological trends encompassing the impact of technology and innovation on the organization and

its industry d. proper allocation of resources, financing, and equipment ANSWER: RATIONALE:

a, b, c

Political, economic, and technological trends are all external factors. Proper allocation of resources (resource allocation) is an internal factor.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.5 - Describe the two factors affecting systems projects. TOPICS: Factors Affecting Systems Projects KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 13. Lei works for a medium-sized company that is rapidly growing. They are having trouble keeping track of

their customers' needs and want to find a way to better manage and serve them. What would be the best software to install? a. a SQL database b. Excel for business c. a customer relationship management d. the Microsoft Office Suite with Access ANSWER: RATIONALE:

c

The best software to install would be customer relationship management (CRM) software, which could also be cloud based. CRM can integrate all customer-related events and transactions, including marketing, sales, and customer service activities.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.5 - Describe the two factors affecting systems projects. TOPICS: Factors Affecting Systems Projects KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 14. Santana is a member of his company's systems review committee. He's not too happy about other members'

personal views playing in the decision-making process. What are some of the issues that come up? Choose all that apply. a. A member favors projects for their own Department. b. There are internal political differences that could delay important decisions. Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 02 Analyzing the Business Case c. No one wants to be on the committee. d. The meetings are too long. ANSWER: RATIONALE:

a, b

Some drawbacks of using a committee are that some members may favor their own departmental projects, and there also could be politics within the departments that could delay important decisions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.6 - Explain how systems requests are processed. TOPICS: Processing Systems Requests KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 15. Mateo receives a systems request form. It seems that the Administration Building is only intermittently able

to receive email, and the Internet keeps crashing. How would Mateo categorize this ticket for the IT maintenance team? a. Low priority: Since the Administration Building can receive email, the fix can wait for now. b. Medium priority: It is the Administration Building, so they need access to their email. They have

intermittent email access so it should be fixed quickly. c. High priority: This issue must be fixed as soon as possible. d. Mission critical: Operations must be restored to normal immediately. It could be a symptom of an imminent larger problem, such as a hardware failure or a potential data breach. ANSWER: RATIONALE:

d

This is mission critical. Intermittent outages can be a sign that something bigger is imminent, such as a hardware failure or a potential data breach.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.6 - Explain how systems requests are processed. TOPICS: Processing Systems Requests KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 16. Diego is the IT manager for his company and the only one with the necessary skills and experience, so he

must evaluate all incoming systems requests. He has a request for four projects. One of which can be considered mission critical. Which one should he choose to do first? a. a new computer for the Marketing Department b. a new printer for the Sales Department c. A new network drop for accounting: They will be having someone new start next month. d. A new web server for their e-commerce site: One of their older ones frequently malfunctions, Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 02 Analyzing the Business Case

occasionally crashing before transmitting payments to the gateway, resulting in unprocessed customer orders." ANSWER: RATIONALE:

d

Since they are an ecommerce site, the new web server is considered mission critical. Without it, the company may lose business and therefore profit.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.6 - Explain how systems requests are processed. TOPICS: Processing Systems Requests KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 17. Nicolas is the head of the IT Department for his company. He is in the initial stages of assessing the

feasibility of the latest systems request. There are four benchmarks (yardsticks) used when assessing the feasibility of a systems request. What are some of those benchmarks? Choose all that apply. a. operational feasibility b. stakeholder feasibility c. economic feasibility d. environmental feasibility ANSWER: RATIONALE:

a, c

Operational and economic feasibility are two of the benchmarks (yardsticks) used when performing a feasibility study.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.7 - Explain how systems request feasibility is assessed. TOPICS: Assessing Request Feasibility KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 18. Intangible benefits are advantages that are difficult to measure in dollars but are important to the company. a. true b. false ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE:

1 Multiple Choice

While intangible benefits are difficult to measure in dollars, they are still important to the company. Areas such as improved customer service, enhanced brand image, and employee morale all fall under intangible benefits.

Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 02 Analyzing the Business Case HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.7 - Explain how systems request feasibility is assessed. TOPICS: Assessing Request Feasibility KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 19. Han is trying to see what conditions must be satisfied for a project to be completed. The project is a website,

and there are certain conditions that must be met for the project to go forward. What are some of the conditions Han is looking for to ensure a successful outcome? Choose all that apply. a. Security: The website must have the appropriate security measures in place to protect sensitive data

and mitigate potential threats. b. Performance: The website should perform effectively and meet benchmarks and expectations. c. Usability: The website should be easy to use and designed with the user in mind. d. Appearance: The website should be pretty and easy on the eyes. ANSWER: RATIONALE:

a, b, c

Security, performance, and usability are some of the conditions that must be satisfied during the development of a project, in this case, a company website.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.7 - Explain how systems request feasibility is assessed. TOPICS: Assessing Request Feasibility KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 20. Benjamin's project was submitted for review a year ago but was rejected because it was not technically

feasible. So, he decided to try submitting it again this year, and it was approved. What would be some of the reasons the project was rejected last year but approved this year? Choose all that apply. a. The company did not have the proper hardware last year. b. The company budget is the same as it was last year. c. The company did not have the technical expertise as it does now. d. The company's infrastructure was the same last year as it is this year. ANSWER: RATIONALE:

a, c

The project was approved because the company now has the proper hardware and, unlike last year, the company hired technical expertise to handle the project.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.7 - Explain how systems request feasibility is assessed. TOPICS: Assessing Request Feasibility Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 02 Analyzing the Business Case KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Apply 6/18/2024 1:07 PM 6/18/2024 1:07 PM

21. Tyrell has been appointed project manager on an infrastructure project for his company. He needs to keep

the team on time and on budget. He is assessing schedule feasibility and looking for issues that must be addressed before the project starts. What are some of the issues Tyrell should address to keep the project on time and on budget? Choose all that apply. a. Resource availability: Will all resources be available as the project gets underway? b. Realistic timeframe: Is the time frame for the project reasonable? c. External factors: Are there unrelated market trends at play? d. Political considerations: Is this influenced by the different political factions within the company? ANSWER: RATIONALE:

a, b

Resource availability and keeping a realistic time frame can both be factors that can keep a project on time and on budget.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.7 - Explain how systems request feasibility is assessed. TOPICS: Assessing Request Feasibility KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 22. Anvil Corporation is about to expand into Europe with a new ecommerce presence. However, Europe has

stricter privacy laws than the United States, called the General Data Protection Regulation (GDPR), due to its protections for privacy and security of personal data about individuals in the European Union. Companies can be penalized for not following the law's regulations. For Anvil Corporation to set up its new ecommerce site in Europe, it must comply with GDPR. As it turns out, this is a tangible benefit. What makes complying with GDPR a tangible benefit? a. Anvil Corporation will have a new customer base since they can now operate in Europe. b. Anvil Corporation will look like a good corporate citizen and enhance its reputation. c. Anvil Corporation will be in compliance with regulatory standards, avoiding penalties or legal

consequences that could affect their revenue. d. Anvil Corporation will enhance its brand recognition. ANSWER: RATIONALE:

c

Following regulatory standards avoids potential fines, penalties, and legal fees. It also minimizes the risk of financial loss due to lawsuits and government actions. These are just a few of the benefits of being in compliance with regulatory standards.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.7 - Explain how systems request feasibility is assessed. Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 02 Analyzing the Business Case TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Assessing Request Feasibility Bloom's: Analyze/Create/Evaluate 6/18/2024 1:07 PM 6/18/2024 1:07 PM

23. Von is in the IT management for a small paper company. His marketing team wants to create a report

template to track customer satisfaction. What type of project is this considered? a. nondiscretionary b. preliminary c. discretionary d. priority ANSWER: RATIONALE:

c

This project does not affect the bottom line and is not mandatory; therefore, it is a discretionary project.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.8 - Explain how systems requests are prioritized. TOPICS: Setting Priorities KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 24. Joaquin and his systems review committee are establishing priorities for the remaining projects. What

projects will Joaquin and his committee give the highest priority to? a. The project that provides a benefit, at a reasonable cost, in a reasonable time frame. b. The project that is guaranteed to increase the company's revenue. c. The project that provides the most significant benefit, at the lowest cost, in the shortest time. d. The project that is guaranteed to benefit customer satisfaction. ANSWER: RATIONALE:

c

Joaquin and his committee will give the highest priority to project requests that provide the most significant benefit, at the lowest cost, in the shortest time.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.8 - Explain how systems requests are prioritized. TOPICS: Setting Priorities KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 25. Many nondiscretionary projects are predictable, and Teven has come up with a list of nondiscretionary Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 02 Analyzing the Business Case

projects that must get done in the next year. Since these projects are considered mandatory, which of the following projects would be marked for approval? Choose all that apply. a. projects to strengthen the organization's position in the marketplace and enhance its brand image b. infrastructure maintenance involving routine repairs c. Server upgrade from MS Server 2012 (end of support as of 10/10/23 to MS Server 2022) d. process improvements to enhance employee efficiency ANSWER: RATIONALE:

b, c

Infrastructure maintenance and upgrades are considered nondiscretionary because they must be done in a timely manner. Upgrading the servers due to end of support is nondiscretionary since updates will no longer be offered. This issue can lead to catastrophic problems due to the servers being at risk for vulnerabilities and malware.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.8 - Explain how systems requests are prioritized. TOPICS: Setting Priorities KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 26. Daniela's new company has adopted the agile method (which emphasizes flexibility and adaptability) for

projects. This means request priorities as well as project priorities are prone to rapid changes. Agile promotes adaptive planning and embraces change, which can be a good thing. However, Daniela is finding fault with the agile method. What are some of the disadvantages of using the agile methodology? Choose all that apply. a. Acquisition costs might increase over time. b. Managers and users sometimes lose confidence in a project. c. There is transparency and collaboration between team members. d. There is a quick response to market demands and changes. ANSWER: RATIONALE:

a, b

Some of the disadvantages of using the agile method are that costs might increase over time, making the project too expensive, and it may have to be modified or abandoned. Managers and users may decide that the project is no longer a fit for the company, so they lose confidence in it, causing the project to be abandoned.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.8 - Explain how systems requests are prioritized. TOPICS: Setting Priorities KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 27. The preliminary investigation is required to study the systems request and recommend specific action. Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 02 Analyzing the Business Case a. true b. false ANSWER: RATIONALE:

a

The preliminary investigation is required to study the feasibility of the systems request and recommend specific actions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 28. Mari is about to start her preliminary investigation, so she is speaking to managers and users in the company

to let them know what she is doing. During conversations, Mari doesn't want to use the word problem when speaking with managers and key stakeholders because of the negative meaning. What should Mari say to get management and user buy-in for the project? a. She should ask managers and users what issues they're having. b. She should ask both managers and users about additional capabilities they would like to see. c. She should ask managers about problems they are having and ask users what capabilities they would

like. d. She should tell managers and users what capabilities the new systems will have. ANSWER: RATIONALE:

b

The addition of users and managers into the conversation and asking them what capabilities they would like to see builds trust with management and users, provides a better understanding of operations, and highlights ways to improving their jobs.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 29. Zahir is training Gina, an intern, and testing her on the difference between project scope and project creep.

What is the answer the intern is supposed to give? a. Project scope is the gradual expanding of a project without specific authorization. Project creep

defines the specific boundaries, or extent, of the project. b. Project scope is about what the project is, and project creep is about what the project is for. c. Project scope defines the specific boundaries, or extent, of the project. Project creep is the gradual Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 02 Analyzing the Business Case

expanding of a project without specific authorization. d. Project scope is how the project proceeds; project creep is how fast the project moves forward. ANSWER: RATIONALE:

c

The intern's answer should be: Project scope defines the specific boundaries, or extent, of the project. Project creep is the gradual expanding of a project without specific authorization.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 30. Luciana is conducting a preliminary investigation into her company. She has discovered a new law is going

into effect that makes it a mandatory present external constraint. Which of the following is considered a mandatory present external constraint? a. New IRS data must be used in the payroll system as soon as possible. b. We should build supply chain management capabilities into the next version of our purchasing

system. c. Management prefers that the project be completed now instead of next quarter. d. Starting next week, the marketing system must track all repeat visits to the website. ANSWER: RATIONALE:

a

An example of a mandatory present external constraint: New IRS data must be used in the payroll system as soon as possible.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 31. Gabriela is conducting a preliminary investigation for customer data management system for an online retail

company. She becomes aware of new data privacy regulations from Congress that will be enforced starting next year. These regulations introduce stricter requirements for handling and protecting customer data, including consent for data processing and security measures. The constraint is the data privacy regulation that will impact the system being developed. What type of constraint is this considered? a. mandatory internal future constraint b. mandatory external future constraint c. desirable present internal constraint Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 02 Analyzing the Business Case d. desirable external future constraint ANSWER: RATIONALE:

b

Gabriela and her project team will need to assess the impact on the system design and functionality to ensure those requirements for data handling, processing, and security measures are in place. This is about regulations (mandatory) taking effect next year (future), from a governing body (external), and there must be an assessment on the system for compliance; therefore, it is a mandatory external future constraint.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 32. What is the purpose of interviewing employees and undertaking a preliminary investigation into a systems

request? a. The purpose of interviewing and undertaking a preliminary investigation is to convince others of the

scope of the project. b. The purpose of interviewing and undertaking a preliminary investigation is to uncover facts regarding the project, such as assessing feasibility, viability, and project objectives. c. The purpose of interviewing and undertaking a preliminary investigation is to convince others of the constraints the project might have. d. The purpose of interviewing and undertaking a preliminary investigation is to convince others the project is justified. ANSWER: RATIONALE:

b

The purpose of interviewing and undertaking a preliminary investigation is to uncover facts regarding the project, such as feasibility, viability, and project objectives.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 33. Lin is examining an inventory system error. He has several tools to analyze the data. He wants to use the

best one for visualizing issues that need attention. Which tool should Lin use? a. Pareto chart b. scatter diagram Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 02 Analyzing the Business Case c. fishbone diagram d. SWOT analysis ANSWER: RATIONALE:

a

The Pareto chart is widely used for visualizing issues that need attention. It is drawn as a vertical bar graph, where the bars represent various causes of the problems and are arranged in descending order.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 34. Martin is looking at examples of how a good project scope statement should be written. There are four he is

looking at. Which of the four examples of project scope language are the best examples of how a project scope statement should be written? Choose all that apply. a. This project aims to update the company's hardware infrastructure by replacing obsolete desktop

computers, laptops, and peripherals. b. The project scope is to upgrade the hardware and software. c. This project involves upgrading the company's cybersecurity infrastructure to enhance protection against cyber threats. d. The project scope is to enhance cybersecurity. ANSWER: RATIONALE:

a, c

The project scope statements: "update the company's hardware infrastructure by replacing obsolete desktop computers, laptops, and peripherals" as well as "upgrading the company's cybersecurity infrastructure to enhance protection against cyber threats" are clear and concise. The other two statements are vaguely defined.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 35. Amy needs to speak to a large group in a short amount of time. She has several questions to ask employees

who are spread out over different locations throughout the country, but the questions she needs to ask are the same. What's the best way for Amy to communicate with this large group of employees in the shortest amount of time? a. Hold a video conference. Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 02 Analyzing the Business Case b. Conduct a user survey. c. Make phone calls to the people she needs to speak with. d. Send an email asking people to call her. ANSWER: RATIONALE:

b

The best way for Amy to get information from a large group whose members are scattered in different locations throughout the country is to send them a user survey and have them send it back to her.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.2.9 - Conduct a preliminary investigation. TOPICS: The Preliminary Investigation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 03 Managing Systems Projects 1. David is a project manager who has had many successful projects over the years. What defines a successful

project? Choose all that apply. a. must be completed on time b. must be completed within budget c. must deliver a high-quality product d. must be results oriented ANSWER: RATIONALE:

a, b, c

A successful project can be defined as being completed on time, within budget, and deliver a high-quality product that satisfies users and meets the stakeholders' and users' requirements.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.1 - Explain project planning, scheduling, monitoring and controlling, and reporting. TOPICS: Project Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 2. Kailani is a project coordinator for her company's newest IT project. As the project coordinator, she has many

responsibilities for the team. What are some of the responsibilities Kailani must manage? Choose all that apply. a. manage network engineers b. keep track of project documentation c. assist in the creation and maintenance of project schedules d. review system code for errors ANSWER: RATIONALE:

b, c

Some of the responsibilities Kailani must manage are keeping track of project documentation so it's up-to-date and easily accessible to the team and assisting in the creation of and maintenance of project schedules.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.1 - Explain project planning, scheduling, monitoring and controlling, and reporting. TOPICS: Project Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 3. Emiliano is shadowing the IT project manager for his company's next project. The project manager has

authorized Emiliano to assist in project monitoring. What's an activity Emiliano will have to perform to assist in his role? Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 03 Managing Systems Projects a. implementing software code development b. measuring the actual performance of the project against the planned performance c. execution of detailed testing procedures d. management of network infrastructure tasks ANSWER: RATIONALE:

b

One of the tasks Emiliano will have to perform is the measuring of actual performance of the project against planned performance.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.1 - Explain project planning, scheduling, monitoring and controlling, and reporting. TOPICS: Project Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 4. Juan Pablo needs to create a list of events to add to the work breakdown structure. What are some situations

that could be considered events? Choose all that apply. a. halfway point of project completed b. completion of the new phone system installation c. 75% completion of new training facility d. the start of employee training ANSWER: RATIONALE:

b, d

An event is a recognizable reference point that can be used to monitor progress. In this scenario, the completion of the new phone system installation and the start of employee training are events.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.2 - Demonstrate the three activities of task management. TOPICS: Task Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 5. A PERT chart is a bottom-up technique because it analyzes a large, complex project as a series of individual

tasks, just as the pyramid is built from the bottom up using individual blocks. a. true b. false ANSWER: RATIONALE:

a

A PERT chart is a bottom-up technique because it analyzes a large, complex project

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 03 Managing Systems Projects

as a series of individual tasks, just as the pyramid is built from the bottom up using individual blocks. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.2 - Demonstrate the three activities of task management. TOPICS: Task Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 6. Slack time is the amount of time people can take off before the project is canceled. a. true b. false ANSWER: RATIONALE:

b

Slack time is the amount of time that the task could be late without pushing back the completion date of the entire project.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.2 - Demonstrate the three activities of task management. TOPICS: Task Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 7. Ila is establishing start and finish dates for calculating the critical path of her company's new IT project. It's a

training project with four tasks. Which of the following would be considered the critical path? Task 1 starts on day 1, lasts 10 days and finishes on day 10. Tasks 2 and 3 are dependent on task 1. Task 2 starts on day 11 and finishes on day 30. Task 3 starts on day 11 and finishes on day 45. Task 4 depends on Tasks 2 and 3. Task 4 starts on day 46 and finishes on day 60. a. the critical path is 1-3-4. b. the critical path is 1-2-4. c. the critical path is 1-2-3-4. d. the critical path is 1-3-2-4. ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE:

1 Multiple Choice

The critical path consists of Tasks 1, 3, and 4. These tasks are critical because any delay in them will directly impact on the project's overall duration. Task 2, while important, does not fall on the critical path as it can be delayed without affecting the project's completion date as long as Tasks 1, 3, and 4 are completed on time.

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 03 Managing Systems Projects HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.2 - Demonstrate the three activities of task management. TOPICS: Task Management KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 8. Samantha is an analyst designing an online e-commerce site for a client. Before she begins the project, she

needs to understand the background of people who will be the users of this site. What are some of the users' issues that must be identified and solved for the project to be well received? Choose all that apply. a. the users' concerns regarding security b. the users' concerns about corporate image c. the users' proficiency level with digital platforms d. the users' concerns about employee raises ANSWER: RATIONALE:

a, c

Two of the issues that must be addressed are the users' concerns regarding security and the users' proficiency level with digital platforms.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.3 - Summarize the five key elements of people management. TOPICS: People Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 9. Venda is responsible for team dynamics and collaboration for a new project she is working on. The problem

is that on the last project, there was no team cohesiveness, a lot of infighting, and silo building (a silo is a term for keeping data by one individual or within only one group and not sharing). This time, Venda is going to be sure that doesn't happen. What are some of the things Venda can do to solidify the team and build strong collaboration between team members? Choose all that apply. a. establish clear goals b. promote open communication c. emphasize diversity and inclusion d. allow team members to work on their own ANSWER: RATIONALE:

a, b, c

In order to build team dynamics and collaboration, Venda must establish clear goals, promote open communication, and emphasize diversity and inclusion.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.3 - Summarize the five key elements of people management. TOPICS: People Management Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 03 Managing Systems Projects KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:07 PM 6/18/2024 1:07 PM

10. Leonardo is a new systems manager and is working on his first project. He tells his team that he places trust

above all else. Without trust, the project's likeliness to succeed falls dramatically. How does Leonardo go about establishing trust? Choose all that apply. a. He meets with his team and reviews his Curriculum Vitae (CV) so that his team knows the work

Leonardo has accomplished, the types of projects he has worked on, and the successes he's had. b. He lets his team know that he is always available to talk and gives everyone his cell phone number. c. He has one team meeting at the beginning of the project and only meets individually with team members throughout the rest of the project. d. He responds to emails based on his interpretation of a priority. ANSWER: RATIONALE:

a, b

In order for Leonardo to build trust, the team first needs to see what he has done previously, how he has done it, and how well he has done it. Then, he needs to let his team members know that he's always available for them to reach out whenever necessary. Because Leonardo is the "face" of this project, he needs to be available even when he is not physically available.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.3 - Summarize the five key elements of people management. TOPICS: People Management KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 11. Mia is a project manager and is working closely with her team on their company's latest project. Her team

members range in age between 21 and 60 years old, so some are just starting their careers, and some are almost at the mandatory retirement age. Mia wants to foster growth within her team, and keeping a team's skills current is critical. Since there is such a gap in the age range, what should Mia do to keep everyone engaged without accidentally discriminating based on a team member's age? a. give everyone a voucher to take a certification exam b. give everyone a ticket to a concert c. give everyone a ticket to attend an industry event d. give everyone a ticket to a team building seminar ANSWER: RATIONALE:

c

Due to the significant age range, the best course of action would be an industry event where all attendees can learn something no matter where they are in their careers. As an example, an event, such as the CES (Computer Electronics Show), has something for everyone, and it is an event that is well attended by computer industry experts. Vouchers for a new certification exam, tickets to a concert, or a team building seminar do not help with keeping skills current, but learning about new technologies

Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 03 Managing Systems Projects

at an industry event does. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.3 - Summarize the five key elements of people management. TOPICS: People Management KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 12. Haukea works in the IT Department, and she is preparing a new project for the sales team. Often, when

business units work with IT team, there can be communication problems that cause the workflow to bottleneck. What is the main reason for these communication problems? a. there is difficulty getting IT and other business unit teams to work together. b. there is difficulty getting buy-in from both departments on costs. c. there is difficulty translating business needs into technical requirements. d. department meetings interfere with project timelines. ANSWER: RATIONALE:

c

One of the main reasons for the miscommunication of requirements is the difficulty in translating business needs into technical requirements.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.4 - Discuss the five key issues in communications management. TOPICS: Communications Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 13. Felipe's job is to give project updates to all team members and stakeholders during a project. Project updates

ensure all stakeholders are aligned, foster a sense of involvement, and prevent surprises about a project's progress. How can Felipe communicate project progress to all those involved? Choose all that apply. a. project reports b. phone calls to stakeholders c. status reports d. status meetings ANSWER: RATIONALE:

a, c, d

POINTS:

1

Felipe can communicate project progress with project reports, status reports, and status meetings. Utilizing phone calls could be an effective method for conveying project progress updates to stakeholders. However, direct communication may be the norm in one culture, while a more indirect, nuanced approach is preferred in another. Misunderstandings can arise if these differences are not understood and respected.

Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 03 Managing Systems Projects QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.4 - Discuss the five key issues in communications management. TOPICS: Communications Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 14. Christopher is working with a team consisting of members from 10 nations. Half of them speak English as a

second language. Before the project begins, Christopher needs to find a way to communicate with everyone effectively and efficiently with as little misunderstanding as possible. How can Christopher create an inclusive environment that embraces all cultures and languages that are represented on his team? Choose all that apply. a. Assume everyone is proficient in English. b. Offer language support to team members that may not be fluent in English. c. Use written communication extensively since it contains intonation and nonverbal cues. d. Be mindful of cultural differences. Be aware of these differences and avoid misinterpretations.

Sensitivity to cultural differences can build rapport and trust within the team. ANSWER: RATIONALE:

b, d

Two of the ways to create an inclusive environment is to offer language support to team members who may not be fluent in the common language (in this case, English) and be mindful of cultural differences. What one may think is appropriate in their culture may be inappropriate in someone else's culture. An example of this would be speaking too loudly or standing too close to someone and invading their personal space.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.4 - Discuss the five key issues in communications management. TOPICS: Communications Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 15. Momi is a project manager and has discovered technical problems that may cause delays to his project. He

needs to address this issue with his team and inform the stakeholders, so they know where the project stands. What course of action should Momi take to inform his team and the stakeholders in a way that will make the issues clear and easy to understand? Choose all that apply. a. Momi should fix it himself and not tell anyone. b. Momi should provide context around the problem, including its potential impact on the project's

goals, timelines, budget, and other stakeholders. c. Momi should select the right communication channels for the urgency of the problem: direct conversation if it is severe, or email or project management software if it is not. d. Momi should allow only the most trusted team members to help solve the problem and tell no one Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 03 Managing Systems Projects

else. ANSWER: RATIONALE:

b, c

Momi needs to provide context around the problem, including its potential impact on the project's goals, timelines, budgets, and other stakeholders, which will help others understand the gravity of the issue. And depending on the severity of the issue, Momi needs to use the right communication channel. He might need to have direct conversations with team members and stakeholders. If the issue is not severe, it may be okay to use email or project management software.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.4 - Discuss the five key issues in communications management. TOPICS: Communications Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 16. Technology management for systems projects refers to the strategic planning, sourcing, and review of the

technology resources used throughout the systems development life cycle (SDLC). a. true b. false ANSWER: RATIONALE:

b

Technology management for systems projects refers to the strategic selection, implementation, and review of the technology resources used throughout the SDLC.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.5 - Describe the importance of technology management in systems projects. TOPICS: Technology Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 17. The most critical areas of concern in financial management include budgets and cost estimation, skills and

technology investment, and return on investment analysis. a. true b. false ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE:

1 Multiple Choice

The most critical areas of concern in financial management include budgets and cost estimation, skills and technology investment, and return on investment analysis.

Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 03 Managing Systems Projects HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.6 - Summarize the three areas of concern in financial management. TOPICS: Financial Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 18. Zoe is researching intangible benefits of the proposed system against the projected costs for a return on

investment (ROI) analysis. Which of the following can be considered an intangible benefit? Choose all that apply. a. enhanced data security and privacy b. faster time-to-market c. improved supplier and partner relationships d. energy savings ANSWER: RATIONALE:

a, c

Enhanced data security and privacy are intangible because upgrading to a more secure system can protect sensitive data, customer information, and intellectual property, reducing the risk of data breaches and associated costs. Improved supplier and partner relationships facilitates smoother interactions with suppliers and partners leading to stronger relationships, better terms, and more favorable business agreements. Both are difficult to quantify in monetary terms, so they are intangible benefits.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.6 - Summarize the three areas of concern in financial management. TOPICS: Financial Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 19. Part of Rodrigo's management style is his belief that investment in his team's skills is a cornerstone of

maximizing technology investments. So, Rodrigo makes sure his team acquires new skills related to IT every year. What would qualify as a new skill for Rodrigo's project managers? Choose all that apply. a. learn principles of management to help develop managing skills b. learn Agile principles and Scrum frameworks for software development to manage projects more

effectively c. learn about what makes a good salesperson to develop skills in negotiating contracts d. learn change management methodologies to assist in guiding the team and stakeholders through project transitions ANSWER: RATIONALE:

b, d

New skills for Rodrigo's project managers could be learning about Agile and Scrum, which will enable the management of projects more efficiently, promote

Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 03 Managing Systems Projects

collaboration, and respond quickly to changes in project requirements and learning about change management will assist with guiding the team and stakeholders through project transitions smoothly. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.6 - Summarize the three areas of concern in financial management. TOPICS: Financial Management KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 20. Carlos' team seems to lack cohesion lately. There has been infighting and issues with getting some members'

parts of the projects turned in on time. This has led to some problems during requirements elicitation, such as miscommunication, incomplete information, and resistance to change. What is this issue considered? a. incompetent management b. human judgement calls c. human error d. human design ANSWER: RATIONALE:

c

Miscommunication, incomplete information, and resistance to change all lead to incomplete and incorrect information that can harm the project. These all come from human factors, that is, human error.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 21. Yukiko is examining external factors that might affect risk for her company's IT project. There are a

multitude of issues from which to choose, so which factors does Yukiko decide are external factors? Choose all that apply. a. The Engineering Department is going through a restructuring. b. The project is located in Tornado Alley, which is a part of the U.S. that has dozens of destructive

tornadoes per year-there is a 1 in 100 chance of the building the project is in to be hit by a tornado in any given year. c. There is political infighting among the department heads as to which department gets the bigger budget for next year. d. New regulatory requirements will be launched next year that may require a change to the system's data management practices. Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 03 Managing Systems Projects ANSWER: RATIONALE:

b, d

Weather and location are external factors. Since the project is in Tornado Alley, there is a high probability that the location of the project could be hit by a tornado at some point. New regulatory requirements may require changes to the system's data management practices requiring changes to be made to the project.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 22. Vincete is a new hire and is working toward becoming a project manager. His first duty is to create a basic

list of risk management tasks. What is a basic list of tasks? Choose all that apply. a. mitigation of risk b. identification of risk c. analysis of risk d. response planning of risk ANSWER: RATIONALE:

b, c, d

A basic list of risk management tasks include identification, analysis, and response planning. These tasks form the core of risk management in systems projects, serving as essential components for the successful completion of any project.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 23. The first and arguably the most crucial step in the risk management process is risk mitigation. a. true b. false ANSWER: RATIONALE:

b

Risk identification is the first and arguably the most crucial step in the risk management process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 03 Managing Systems Projects TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Risk Management Bloom's: Remember/Understand 6/18/2024 1:07 PM 6/18/2024 1:07 PM

24. Andrea is working on risk analysis for her company's project. There are several stages in the risk

management process, and risk analysis is one of them. The stage Andrea is working on aims to prioritize risks and help project managers understand the risk's potential influence on the project. What stage is Andrea working on? a. stage one b. stage two c. stage three d. stage four ANSWER: RATIONALE:

b

Andrea is working on stage two, risk analysis. This stage involves assessing the identified risks based on their likelihood of occurrence and the severity of their impact, should they materialize.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 25. Bianca is developing a risk response plan. She knows that risk is virtually impossible to eliminate unless you

change the project plan to eliminate the risk or protect the project objectives from its impact-this is called risk avoidance. But risk can be reduced. There are several strategies to reduce the risk. Which strategy entails shifting the risk to a third party? a. risk mitigation b. risk acceptance c. risk transfer d. risk maintenance ANSWER: RATIONALE:

c

Risk transfer shifts the effects of the risk to a third party, typically through insurance or outsourcing, such as joint venture.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 03 Managing Systems Projects DATE CREATED: DATE MODIFIED:

6/18/2024 1:07 PM 6/18/2024 1:07 PM

26. Lautaro is reviewing risk response strategies in a risk response plan. There are several strategies to reduce

risk. Which strategy is Lautaro reviewing that entails acknowledging the risk and making a deliberate decision to accept it without engaging in special efforts to control it? a. risk transfer b. risk mitigation c. risk taking d. risk acceptance ANSWER: RATIONALE:

d

Lautaro is reviewing risk acceptance. This strategy involves acknowledging the risk and making a deliberate decision to accept it without engaging in special efforts to control it.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 27. Abril has been handed the risk response plan and has been asked to verify the findings. They are reviewing

the section that seeks to reduce the probability or impact of the risk to an acceptable level. What strategy is this? a. risk mitigation b. risk acceptance c. risk transfer d. risk denial ANSWER: RATIONALE:

a

Risk mitigation seeks to reduce the probability or impact of the risk to an acceptable level.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 28. Valentino is working on a risk analysis using qualitative risk analysis. What type of information will

Valentino be working with to use qualitative risk analysis? Choose all that apply. Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 03 Managing Systems Projects a. information about the potential risks that could affect the project b. past project data, performance metrics, and records of similar projects c. subjective estimates or judgments about the likelihood of each risk event occurring. d. impact analysis to quantify the potential consequences or impacts of risk events. ANSWER: RATIONALE:

a, b, c

Valentino is using information about the potential risks that could affect the project and subjective estimates or judgements about the likelihood of each risk event occurring. Information from past project data, performance metrics, and records of similar projects can be used as qualitative risk analysis. This information can be used to identify potential risks, assess their likelihood, and impact, and develop mitigation strategies. A qualitative risk assessment is subjective, and judgment based. It does not involve using specific numerical values or quantitative metrics. Instead, it relies on the knowledge, experience, and insight of experts.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 29. Elena is working on a risk analysis using quantitative risk analysis. What type of information is Elena

working with to use quantitative risk analysis? Choose all that apply. a. ranking risks based on their perceived significance, combining probability and impact assessments b. past project data, performance metrics, and records of similar projects c. gathering insights and judgments from subject matter experts, project managers, and team members

regarding potential risks and their implications d. financial data related to the project costs, including direct costs, indirect costs, and potential cost overruns due to risk events ANSWER: RATIONALE:

b, d

Elena is using quantitative risk analysis. It is objective and data-driven and relies on specific numerical values, probabilities, and statistical analysis. In this case, Elena is using past project data, performance metrics, and records of similar projects, and she is using financial data related to the project costs, including direct costs, indirect costs, and potential cost overruns due to risk events. These items are considered objective and data driven.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.7 - Explain why risk management is crucial in systems projects. TOPICS: Risk Management KEYWORDS: Bloom's: Apply Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 03 Managing Systems Projects DATE CREATED: DATE MODIFIED:

6/18/2024 1:07 PM 6/18/2024 1:07 PM

30. One of the key benefits of project management software is the enhanced efficiency it brings to the project. a. true b. false ANSWER: RATIONALE:

a

A key benefit of project management software is improved organization and enhanced efficiency in managing projects.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.8 - State the key benefits of using project management software. TOPICS: Project Management Software KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 31. Rafaela is examining the planning and scheduling tools in her company's project management software to

assist her with an upcoming project. Although there are many tools for her to choose from, she is looking for the tools that best suit her needs for team members to connect with each other. Which tools would be best for this situation? Choose all that apply. a. resource management b. messaging and chat c. baseline and tracking d. email integration ANSWER: RATIONALE:

b, d

With messaging and chat, team members can send messages to each other. This functionality is useful for quick questions, updates, or informal discussions. Email integration allows team members to communicate through the platform while also receiving important project-related notifications via email.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.8 - State the key benefits of using project management software. TOPICS: Project Management Software KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 32. Adriana has been assigned a new systems project. Fortunately, her company recently switched to new state-

of-the-art project management software. This will be a big project for her team, and Adriana needs to make sure there are enough people and equipment available for the project so there won't be any bottlenecks. What part of Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 03 Managing Systems Projects

project management is this referring to? a. document management b. resource management c. task management d. time management ANSWER: RATIONALE:

b

One key benefit of resource management software is the ability to forecast resource needs and potential bottlenecks. By visualizing resource allocation and tracking resource utilization, project managers can identify overutilization or underutilization of resources and adjust allocations accordingly to ensure more efficient use of resources.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.8 - State the key benefits of using project management software. TOPICS: Project Management Software KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 33. Axel is responsible for project monitoring and control of his company's systems project. It is his

responsibility to see that performance objectives defined in the project management plan are met. What indicators must Axel monitor to ensure those objectives are met? Choose all that apply. a. calendars b. tracking c. reviewing d. regulating progress ANSWER: RATIONALE:

b, c, d

Axel must monitor tracking, reviewing, and regulating progress indicators to meet the performance objectives defined in the project management plan.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.9 - Describe three areas requiring attention to manage systems projects successfully. TOPICS: Managing for Success KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 34. Abigail is on the business side of project management and is well-versed in the business problems that arise

during a project. What are the common business problems that can arise? Choose all that apply. Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 03 Managing Systems Projects a. resistance to change b. misalignment with business objectives c. business process reengineering d. ROI justification ANSWER: RATIONALE:

b, c, d

There are three common business-related problems that may arise. They are misalignment with business objectives, business process reengineering, and ROI justification.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.9 - Describe three areas requiring attention to manage systems projects successfully. TOPICS: Managing for Success KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 35. Ian was brought in by an e-commerce company as a security compliance project manager. His duty is to

make sure that each project that the company plans follows the European General Data Protection Regulation's (GDPR) security rules, since this e-commerce site will be launched in Germany. If Ian does not ensure that robust security measures are implemented in this new project, what might happen to Ian's company? Choose all that apply. a. the company may be fined b. the company may lose trust among its users c. the company may face legal action in Germany d. the company will continue to operate with no action taken ANSWER: RATIONALE:

a, b, c

If Ian's company does not follow GDPR rules, the company may be fined, lose trust among its users, and may face legal action. The United States also has rules governing privacy, and a company can face the same measures if those rules are not followed.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.3.9 - Describe three areas requiring attention to manage systems projects successfully. TOPICS: Managing for Success KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 04 Requirements Engineering 1. Javier and his team are examining requirements. Requirements can be classified according to various

characteristics. The ones Javier and his team are looking at now are primarily for the engineering team. Which requirement can this be defined as? a. requirements definitions b. requirements functionality c. requirements guidelines d. requirements specifications ANSWER: RATIONALE:

d

Requirements specifications are primarily used for the engineering team.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.1 - Explain system requirements and the challenges associated with the requirements engineering process. TOPICS: System Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 2. Julia and her team are reviewing the functional requirements for her company's latest IT project. Since a

function is a statement of the services a system provides, which statement is considered a functional requirement? a. The system must support 25 users online simultaneously. b. The system must allow users to log in using a valid username and password. c. The system must respond to users within two seconds of the action being initiated. d. The system must have an uptime of at least 99.9% over a 12-month period. ANSWER: RATIONALE:

b

The system allowing users to log in using a valid username and password is a functional requirement since the username and password are a security issue that the system must provide. The other three are non-functional requirements.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.1 - Explain system requirements and the challenges associated with the requirements engineering process. TOPICS: System Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 3. Facundo and his team are reviewing the non-functional requirements for his company's latest IT project.

Since a non-functional requirement is a statement of operational system constraints (also known as quality attributes), which statement is considered a non-functional requirement? Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 04 Requirements Engineering a. The system must allow users to create accounts by providing their email address, password, and a

unique username. b. The contact management system shall generate a daily reminder list for all sales representatives. c. The website shall report online volume statistics every four hours and hourly during peak periods. d. The user interface must be intuitive and require no more than 10 minutes of training for new users to perform basic tasks. ANSWER: RATIONALE:

d

A non-functional requirement is a statement of operational system constraints. In this instance, the constraint is that the user interface must be intuitive and require no more than 10 minutes of training for new users to perform basic tasks.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.1 - Explain system requirements and the challenges associated with the requirements engineering process. TOPICS: System Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 4. Lola and her development team are discussing total cost of ownership (TCO) for their latest project. After

researching several options, they decided to choose a more expensive option for their project than originally planned. Why did Lola and her team decide to choose the more expensive option? Choose all that apply. a. The inexpensive system does not support migrating the existing system to the cloud. b. The inexpensive system would have less customer support options to choose from. c. After considering the indirect costs, the inexpensive system would be the costliest choice. d. The inexpensive system would not be compatible with their existing system. ANSWER: RATIONALE:

a, c

One of the most common reasons for migrating a legacy system to the cloud is to reduce TCO. This includes hidden expenses. That's why Lola's team chose a more expensive option than they first planned for their project, taking all costs into account.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.1 - Explain system requirements and the challenges associated with the requirements engineering process. TOPICS: System Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 5. Security is so crucial for networked systems that it has changed from a functional requirement to a nonCopyright Cengage Learning. Powered by Cognero.

Page 2


Ch 04 Requirements Engineering

functional requirement. a. true b. false ANSWER: RATIONALE:

b

Security has changed from a non-functional requirement to a functional requirement.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.1 - Explain system requirements and the challenges associated with the requirements engineering process. TOPICS: System Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 6. Joint application development (JAD) is a user-oriented technique for fact-finding that systems developers use

whenever group input and interaction are desired. a. true b. false ANSWER: RATIONALE:

a

Joint application development (JAD) is a user-oriented technique for fact-finding that systems developers use whenever group input and interaction are desired.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.2 - Apply team-based requirements engineering techniques, including joint application development, rapid application development, and agile methods. TOPICS: Team-Based Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 7. Rapid application development (RAD) resembles a condensed version of the entire systems development life

cycle (SDLC) and provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation. a. true b. false ANSWER: RATIONALE:

a

POINTS:

1

Rapid application development (RAD) resembles a condensed version of the entire SDLC and provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation.

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 04 Requirements Engineering QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.2 - Apply team-based requirements engineering techniques, including joint application development, rapid application development, and agile methods. TOPICS: Team-Based Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 8. Alessandra and her team are setting up a JAD workshop for stakeholders, end users, and their development

teams. What is the key objective of JAD? a. The key objective of JAD is to assign routine administrative tasks to the stakeholders and the

development teams. b. The key objective of JAD is to discuss confidential issues affecting stakeholders, end users, and development teams. c. The key objective of JAD is to make quick decisions or take immediate actions that the stakeholders, end users, and development teams need to be made aware of. d. The key objective of JAD is to create a shared understanding among all participants and ensure that the system being developed meets the needs of the users and stakeholders. ANSWER: RATIONALE:

d

The key objective of JAD is to create a shared understanding among all participants and ensure that the system being developed meets the needs of the users and stakeholders.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.2 - Apply team-based requirements engineering techniques, including joint application development, rapid application development, and agile methods. TOPICS: Team-Based Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 9. Ashley and her team like using RAD because of its iterative and incremental team-based approach to systems

analysis and design that focuses on quickly developing high-quality software applications. What are some of the benefits of using RAD? Choose all that apply. a. feature or scope creep b. active user involvement c. prototyping d. timeboxing ANSWER: RATIONALE:

b, c, d

Some of the benefits of using RAD include active user involvement, prototyping, and timeboxing. Feature or scope creep is a potential disadvantage of using RAD.

Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 04 Requirements Engineering POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.2 - Apply team-based requirements engineering techniques, including joint application development, rapid application development, and agile methods. TOPICS: Team-Based Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 10. Paulina and her team are discussing waterfall versus agile methodology, and which is better for the project

they are about to commence. Paulina and her team need to think creatively and deliver new features quickly, as the software market is constantly changing. Which methodology is best suited to this type of project and why? a. The agile methodology would be best suited to this type of project because it has complex

management, less predictable timelines, and no need for strict documentation. b. The agile methodology would be best suited to this type of project since it requires innovation thinking, evolving requirements, and the product is time sensitive and needs to be in the market rapidly. c. The waterfall methodology would be best suited to this type of project since it requires extensive documentation, longer development cycles, and user feedback toward the end of the project. d. The waterfall methodology would be best suited to this type of project since it needs to be well structured for innovation thinking, extensively documented for evolving requirements, and the product is time sensitive and needs to be in the marketplace rapidly. ANSWER: RATIONALE:

b

Paulina and her team are going to use the agile methodology. This method is best suited to this type of project since it requires innovation thinking (they need to explore new innovations and concepts for this project), the requirements of the project are always evolving, and the product is time sensitive and needs to be deployed in the marketplace rapidly.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.2 - Apply team-based requirements engineering techniques, including joint application development, rapid application development, and agile methods. TOPICS: Team-Based Techniques KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 11. The fact-finding plan involves answers to four familiar questions: who, what, where, and when. a. true b. false ANSWER: RATIONALE:

b

The fact-finding plan involves answering five familiar questions: who, what, where,

Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 04 Requirements Engineering

when, and how. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.3 - Develop a fact-finding plan for gathering requirements. TOPICS: Requirements Elicitation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 12. An interview is a planned meeting during which the analyst obtains information from another person. a. true b. false ANSWER: RATIONALE:

a

An interview is a planned meeting during which the analyst obtains information from another person.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 13. Pedro and his team are ready to perform the interviews for their project's requirements elicitation process.

They are looking through the formal organizational charts as well as informal structures within the organization. What forms the basis of informal structures? a. Informal structures are usually based on interpersonal employee relationships. b. Informal structures are usually based on external personal relationships. c. Informal structures are usually based on only managerial relationships. d. Informal relationships usually are based on only hourly employee relationships. ANSWER: RATIONALE:

a

Informal structures are based on interpersonal employee relationships and can develop from previous work assignments, physical proximity, unofficial procedures, or personal relationships.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 04 Requirements Engineering DATE CREATED: DATE MODIFIED:

6/18/2024 1:07 PM 6/18/2024 1:07 PM

14. Ricardo and his team are about to interview a group of upper-level management team members. Once that is

complete, they will then start interviewing the non-management team. What is the benefit of interviewing upper-level management and then non-management? a. Non-management can provide the big picture of the whole system while upper-level management can

explain the day-to-day operations. b. Upper-level management can explain why a new system is needed while non-management can explain why the existing system is just fine. c. Upper-level management can provide the big picture of the whole system while non-management can explain the day-to-day operations. d. Non-management can explain why a new system is needed while upper-level management can explain why the existing system is just fine. ANSWER: RATIONALE:

c

Upper-level management can provide the big picture to help explain the system as a whole. Specific details about operations and business processes are best learned from people (usually non-management) who work with the system daily.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 15. Eduardo is examining the list of questions that his team developed for the next round of interviews. He is

looking for closed-ended questions, because the team needs to verify facts, but he also finds some open-ended questions in the list. Which would be considered open-ended questions? Choose all that apply. a. How many personal computers do you have in this department? b. What are your expectations for user interface design and user experience in the new application? c. How many customers ordered products from the website last month? d. What unique requirements or special considerations specific to your department that we should

consider? ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE:

1 Multiple Response

Open-ended questions encourage spontaneous and unstructured responses. So, the questions he wants asked out of this group of four are: "What are your expectations for user interface design and user experience in the new application?" and "What unique requirements or special considerations specific to your department that we should consider?"

Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 04 Requirements Engineering HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 16. Josefina is examining the list of range-of-response questions that her team developed for the next round of

interviews. Range-of-response questions are closed-ended questions that ask the person to evaluate something by providing limited answers to specific responses or by using a numeric scale. Which would be considered range-of-response questions? Choose all that apply. a. On a scale of 1 to 10, with 1 being the lowest score and 10 the highest, how important is real-time

synchronization of data across devices for your team's workflow? b. How are the checks reconciled? c. How many personal computers do you have in this department? d. What is the acceptable response time for generating complex reports? Please choose one: Under 5 seconds, 5-10 seconds, 11-20 seconds, over 20 seconds. ANSWER: RATIONALE:

a, d

A range-of-response question typically provides a set of predefined options or a numerical scale, allowing respondents to indicate their preferences, tolerances, or expectations within that defined range such as "On a scale of 1 to 10" or "What is the acceptable response time." These types of questions are considered range-ofresponse.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 17. Bautista is engaged in a conversation with an interviewee. His primary responsibility during the interview is

to listen carefully to the answer and not hear only what he wants to hear. So, Bautista must carefully concentrate on what the interviewee says and notice any nonverbal communication that may be taking place. What is the process of concentrating on what is said and noticing nonverbal cues called? a. easy listening b. nonverbal engagement c. engaged listening d. engaged reading and response ANSWER: RATIONALE:

c

Concentrating on what is said and noticing nonverbal cues is called engaged listening.

Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 04 Requirements Engineering POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 18. Rebecca and her team are about to begin a group interview with several staff members and their managers.

Even though a group interview is a good way to save time, Rebecca is a bit hesitant about using the group interview process for this particular group of people. Why would Rebecca not want to interview these people in a group setting? Choose all that apply. a. A manager does not like employees speaking candidly about issues in the company. b. A person in the group has a dominant personality and tends to take over conversations. c. There is no meeting place to hold a large group of people. d. No one is available at the same time to meet. ANSWER: RATIONALE:

a, b

In this instance, one of the managers does not like employees speaking about issues in the company, so they try and keep the employees from voicing their concerns. There is also an employee who is very vocal and dominant and tends to talk over anyone else who is trying to speak. Therefore, the interviewers cannot get necessary (and correct) information.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 19. Alexa and her team are preparing a new question set for the next group of interviewees. The answers they

are looking for relate to the performance parameters of the existing system. Which question set would be best used to gather this information? a. leading questions b. open-ended questions c. closed-ended questions d. range-of-response questions ANSWER: RATIONALE:

d

Since Alexa's team is looking for performance parameters for the existing system to determine strengths and weaknesses, it is best to use a group of range-of-response questions since they need to know issues, such as system response times, problem

Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 04 Requirements Engineering

severity, and issue ratings.. Range-of-response questions make it easier to tabulate answers and interpret the results. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.4 - Conduct an interview to gather system requirements. TOPICS: Interviews KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 20. Isidora and her team are assembling a small group of people to discuss specific problems facing their

company. What method of interviewing is this called? a. speedthinking b. brainstorming c. oversharing d. round robin ANSWER: RATIONALE:

b

Brainstorming is a small group of people assembled to discuss specific problems, opportunities, or issues.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.5 - Use other requirements gathering techniques, including document review, observation, questionnaires and surveys, brainstorming, sampling, and research. TOPICS: Other Elicitation Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 21. Irene is assembling a brainstorming session to discuss ideas for a new database. She doesn't want everyone

to speak at once, so what type of brainstorming session will she use? a. structured brainstorming b. unstructured brainstorming c. systematic brainstorming d. stratified brainstorming ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Irene wants to set up a structured brainstorming session to allow each participant to speak in turn or to pass if they have nothing to say.

Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 04 Requirements Engineering LEARNING OBJECTIVES: Tilley.SAD13e.25.4.5 - Use other requirements gathering techniques, including document review, observation, questionnaires and surveys, brainstorming, sampling, and research. TOPICS: Other Elicitation Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 22. Kevin has been assigned a project for a new e-commerce website for the Sales Department and assembles a

brainstorming session to discuss ideas. He likes the energy from the free-for-all sessions where everyone can speak, so what type of brainstorming session will he be using? a. systematic brainstorming session b. structured brainstorming session c. strategic brainstorming session d. unstructured brainstorming session ANSWER: RATIONALE:

d

Kevin will be using an unstructured brainstorming session, which is where anyone can speak at any time. At some point, the results are recorded and made part of the fact-finding documentation process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.5 - Use other requirements gathering techniques, including document review, observation, questionnaires and surveys, brainstorming, sampling, and research. TOPICS: Other Elicitation Techniques KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 23. Azha is doing some Internet research regarding Ethernet technology. What Internet publication would he use

to begin his research into this subject? Choose all that apply. a. computerworld.com b. linux-magazine.com c. networkworld.com d. eforensicsmag.com ANSWER: RATIONALE:

a, c

Azha would begin his research at computerworld.com and networkworld.com. Ethernet is a networking technology.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.5 - Use other requirements gathering techniques, including document review, observation, questionnaires and surveys, brainstorming, sampling, and research. TOPICS: Other Elicitation Techniques Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 04 Requirements Engineering KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:07 PM 6/18/2024 1:07 PM

24. Clara and her team are working with a Fortune 500 company with over 100,000 employees in the United

States. The company plans on introducing a new healthcare benefits package in the next two years. The company wants to know what employees think of the existing benefits package and what they would like in the new one. Which sampling technique would be best to use in this situation? a. systematic sampling, which involves selecting every nth individual from a population; as an example,

selecting every tenth employee b. stratified sampling, which involves dividing the employees into subgroups based on characteristics, such as age, gender, geography, or income, then randomly sampling from each subgroup c. random sampling, which is selecting individuals from the employees by chance, meaning each employee has an equal probability of being chosen d. judgmental sampling, which is selecting employees that are handpicked based on Clara's judgment and expertise ANSWER: RATIONALE:

b

Because employees are scattered all over the United States, not every state has the same healthcare systems or providers. It would be best to stratify the employees by geography and get a precise estimate of the healthcare needs of employees by their location so the company can tailor their benefits accordingly.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.5 - Use other requirements gathering techniques, including document review, observation, questionnaires and surveys, brainstorming, sampling, and research. TOPICS: Other Elicitation Techniques KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 25. The focus of requirements elicitation in agile projects is on satisfying the customer through early and

continuous delivery of valuable software. a. true b. false ANSWER: RATIONALE:

a

The focus of requirements elicitation in agile projects is on satisfying the customer through early and continuous delivery of valuable software.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.6 - Explain how requirements are gathered in agile projects. TOPICS: Requirements Elicitation in Agile Projects Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 04 Requirements Engineering KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:07 PM 6/18/2024 1:07 PM

26. Alonso and his team prefer the agile methodology over the waterfall methodology when it comes to

requirement elicitation for their latest project, because they are up against a shortened timeline to get the project done. Why is the agile method better in this situation? a. Development follows strict linear sequences of phases. b. The requirements are elicited iteratively, in tandem with the project's development. c. Changes often require revisiting multiple phases. d. Each phase must be completed before moving on to the next phase. ANSWER: RATIONALE:

b

Alonso and his team prefer the agile method because it focuses on delivering software in small, workable increments, which means that requirements are elicited iteratively, in tandem with the project's development. Since Alonso's project has a shortened timeline, the agile method should help complete the project quickly. With the waterfall method, Alonso and his team would have to follow strict linear phases, and therefore, the project could take much longer.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.6 - Explain how requirements are gathered in agile projects. TOPICS: Requirements Elicitation in Agile Projects KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 27. Destiny is gathering use cases regarding interactions between users and their existing database from

interviewees. A use case describes a specific situation in which a system interacts with an end user (or another system). What is another term for a use case? a. user goals b. user stories c. a scenario d. a storyboard ANSWER: RATIONALE:

c

A scenario, also known as a use case, describes a specific situation in which a system interacts with an end user (or another system). It typically includes the user's goal, the interaction flow, and the system's behavior.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.6 - Explain how requirements are gathered in agile projects. TOPICS: Requirements Elicitation in Agile Projects Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 04 Requirements Engineering KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:07 PM 6/18/2024 1:07 PM

28. Joshua is debating whether to use unstructured or structured natural language for his upcoming requirements

interview sessions. He has decided to use structured natural language. What makes structured natural language easier to manage than unstructured natural language? Choose all that apply. a. Structured language enforces a consistent and clear format for expressing requirements allowing for a

shared understanding of the project's goals. b. Structured language can be tagged for processing by automated tools allowing for easier retrieval. c. Unstructured natural language is familiar and accessible to those who may not be technically inclined. d. Structured language allows for stakeholders to describe ideas and concepts in their own words. ANSWER: RATIONALE:

a, b

Joshua has decided to use structured natural language. Using structured language enforces a consistent and clear format for expressing requirements, making it easier for stakeholders to have a shared understanding of the project's goals, and in the process of writing those requirements, it can be tagged for processing by automated tools for easy retrieval.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.7 - Utilize different requirements representation techniques, including natural language, diagrams, and models. TOPICS: Representing Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 29. A functional decomposition diagram (FDD) is a bottom-up representation of a function or process. a. true b. false ANSWER: RATIONALE:

b

A functional decomposition diagram is a top-down representation of a function or process. Creating an FDD is similar to drawing an organizational chart: start at the top and work downward.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.7 - Utilize different requirements representation techniques, including natural language, diagrams, and models. TOPICS: Representing Requirements KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 04 Requirements Engineering DATE CREATED: DATE MODIFIED:

6/18/2024 1:07 PM 6/18/2024 1:07 PM

30. In an interview for a job, Mario is given the information below and asked to name what it is. What is Mario's

answer? Perform Online Banking Transfer: Description: A user (Account Holder) interacts with an Online Banking System to transfer funds between accounts. The user logs in, selects source and destination accounts, enters the transfer amount, and confirms the transaction. The system processes the transfer and updates account balances. a. data flow diagram b. sequence diagram c. use case diagram d. business process diagram ANSWER: RATIONALE:

c

Mario should answer that this is a use case as it describes a specific interaction between the user (actor) and a system to achieve a particular goal or task.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.7 - Utilize different requirements representation techniques, including natural language, diagrams, and models. TOPICS: Representing Requirements KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 31. Brooke's team is focused on requirements validation and verification (V&V) which focuses on answering

two essential questions. What are the correct responses? Choose all that apply. a. Validation: Are the correct requirements stated? b. Validation: Is the system being built right? c. Verification: Are the requirements stated correctly? d. Verification: Does it meet the true needs of the users and stakeholders? ANSWER: RATIONALE:

a, c

Requirements V&V focuses on answering two essential questions, (1) Validation: Are the correct requirements stated? and (2) Verification: Are the requirements stated correctly?

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.8 - Explain how to validate and verify requirements. TOPICS: Validation and Verification KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 04 Requirements Engineering DATE CREATED: DATE MODIFIED:

6/18/2024 1:07 PM 6/18/2024 1:07 PM

32. Gael's team needs to check requirements attributes for validation and verification. Which of the following

are some of the attributes that Gael's team should check? Choose all that apply. a. validity b. market demand c. business strategy d. consistency ANSWER: RATIONALE:

a, d

The following are some attributes Gael's team should check: (1) Validity: Does the system provide the functions that best support the customer's needs? and (2) Consistency: Are there conflicting requirements?

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.8 - Explain how to validate and verify requirements. TOPICS: Validation and Verification KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 33. Clarice and her team are working on the requirements validation and verification attributes for their latest

project. To get the best results, there are a few techniques that they can use to check the attributes. What are a few of those techniques? Choose all that apply. a. Requirements review: Systematic manual analysis of the requirements. b. Prototyping: Using an executable model of the system to check the requirements. c. Usability Testing: Observing users as they interact with a system to evaluate its usability. d. Automated consistency analysis: Checking the consistency of structured or formal requirements

descriptions. ANSWER: RATIONALE:

a, b, d

A few of the techniques Clarice and her team can use to check attributes include requirements reviews, prototyping, and automated consistency analysis.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.8 - Explain how to validate and verify requirements. TOPICS: Validation and Verification KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 34. Hugo has been asked by his manager to consider having a requirements review for customers and other Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 04 Requirements Engineering

stakeholders. Hugo agrees. Why is it a good idea to consider having a requirements review during the process of validation and verification? Choose all that apply. a. A requirements review helps identify errors, omissions, and inconsistencies in the requirements

documentation. b. A requirements review equals good communication between analysts, customers, and others. It resolves problems early, and this is especially important when requirements are initially being formulated. c. A requirements review identifies potential risks related to feasibility, technical challenges, or conflicting requirements. d. A requirements review helps overcome bureaucratic and time-consuming behavior. ANSWER: RATIONALE:

a, b, c

It's a good idea to have a requirements review because it can help identify errors, omissions, and inconsistencies in the requirements documentation; allows for communication between analyst, customers, and other stakeholders to help resolve problems early; and identifies potential risks related to feasibility, technical challenges, or conflicting requirements.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.8 - Explain how to validate and verify requirements. TOPICS: Validation and Verification KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM 35. Most spreadsheet programs create bargrams from collected data that display data in a vertical bar chart. a. true b. false ANSWER: RATIONALE:

b

Most spreadsheet programs create histograms that display collected data in a vertical bar chart.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.4.9 - Explain how tools can help with requirements engineering activities. TOPICS: Tools KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:07 PM DATE MODIFIED: 6/18/2024 1:07 PM

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 05 Data & Process Modeling 1. Esteban and his team are in the system design phase of their project. They are in the process of building the

physical model. What is the purpose of the physical model? a. A physical model is built that describes how the system works. b. A physical model is built that describes where the system will be located. c. A physical model is built that describes how the system will be constructed. d. A physical model is built that determines what hardware and software will be needed. ANSWER: RATIONALE:

c

In the design phase, a physical model is built that describes how the system will be constructed.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.1 - Describe the relationship between logical and physical models. TOPICS: Logical Versus Physical Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 2. Devyn is developing a logical model for his company's new information system. This new system is required

due to changing technological needs. Devyn decides to use the four-model approach. What is an advantage of using this approach? a. No added time and cost are required to develop a logical and physical model of the current system. b. Tight schedules are an issue, and the four-module approach is a quick way to develop logical and

physical models. c. There is less documentation required with the four-module approach. d. The new information system's requirements are similar to those of the current information system

because the needs of the system are technology versus requirement based. ANSWER: RATIONALE:

d

The advantage of using the four-model approach is that the new information system's requirements are similar to those of the current information system, since the proposal is based on new computer technology rather than many new requirements.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.1 - Describe the relationship between logical and physical models. TOPICS: Logical Versus Physical Models KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 3. A set of data flow diagrams (DFDs) provides a logical model that shows how the system works, not what it

does. Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 05 Data & Process Modeling a. true b. false ANSWER: RATIONALE:

b

A set of DFDs provides a logical model that shows what the system does, not how it does it. That distinction is important because focusing on implementation issues at this point in a project would restrict the search for the most effective system design.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.2 - Explain data flow diagrams. TOPICS: Data Flow Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 4. Elias gave his new assistant an assignment to develop a short data flow and process symbol combination.

Why is this data flow and process symbol combination incorrect?

a. It's a gray hole process. b. It's a black hole process. c. It's a white hole process. d. It's a spontaneous generation process. ANSWER: RATIONALE:

d

The APPLY INSURANCE PREMIUM process produces output without input since both arrows are pointing away; therefore, it is called a spontaneous generation process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 05 Data & Process Modeling KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/14/2024 7:23 PM 6/18/2024 1:04 PM

5. Angelo is creating a data flow process to calculate grades. However, the process doesn't work. What process

has Angelo set up by mistake?

a. It's a black hole process. b. It's a gray hole process. c. It's a spontaneous generation process. d. It's white hole process. ANSWER: RATIONALE:

b

The CALCULATE GRADE process has an input that is insufficient to generate the output shown. A date of birth cannot calculate a grade to get a final grade. Therefore, it is a gray hole process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/18/2024 1:05 PM 6. Essence created a data flow diagram to calculate gross pay for the company employees. However, it does not

work. What process did Essence set up by mistake?

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 05 Data & Process Modeling

a. a spontaneous generation process b. a gray hole process c. a black hole process d. a white hole process ANSWER: RATIONALE:

c

The CALCULATE GROSS PAY process has input but produces no outputs and is therefore called a black hole process. Both arrows are pointing toward the process symbol, so nothing is moving out of the process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/18/2024 1:06 PM 7. Dionne is in the process of building a data flow diagram for customer payments. By looking at the diagram

below, they believe it will work, but it does not. What is wrong with this diagram?

Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 05 Data & Process Modeling

a. Two data stores cannot be connected by a data flow without an intervening process, and each data

store should have an outgoing and incoming data flow. b. The process symbol should be a data flow symbol. c. The data store symbol should be an external entity symbol. d. The data flow arrow should be pointing to the POST PAYMENT process symbol ANSWER: RATIONALE:

a

This is an example of the incorrect use of a data store symbol in a data flow diagram. Two data stores cannot be connected by a data flow without an intervening process, and each data store should have at least one incoming and one outgoing data flow.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/18/2024 1:06 PM 8. Amari is perusing his symbol library for his next data flow diagram when he comes across this symbol. What

is it, and what does it stand for? Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 05 Data & Process Modeling

a. A data store because it represents data that the system stores because one or more processes need to

use the data later. b. An external entity that provides data to the system or receives output from the system. c. A terminator because they are data origins or final destinations. d. A process because it identifies a specific function. ANSWER: RATIONALE:

b, c

The symbol for an entity is a rectangle, which may be shaded to make it look threedimensional. The name of the entity appears inside the symbol. External entities provide data to the system or receive output from the system-and show the boundaries of the system and how the system interfaces with the outside world. Entities are also called terminators because they are data origins or final destinations.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/18/2024 1:07 PM 9. Gemma is assembling a simple data flow diagram for her supervisor, but she is told the diagram is incorrect.

In which order should this diagram appear?

Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 05 Data & Process Modeling a. VERIFY ORDER, CREATE INVOICE, INVOICE b. CREATE INVOICE, VERIFY ORDER, INVOICE c. VERIFY ORDER, INVOICE, CREATE INVOICE d. INVOICE, VERIFY ORDER, CREATE INVOICE ANSWER: RATIONALE:

a

The order in which this diagram should flow is VERIFY ORDER, CREATE INVOICE, INVOICE.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/18/2024 1:08 PM 10. Dante is assembling process symbols for a data flow diagram. He notices that there is a problem with the

following symbol. What is the problem that Dante sees, or is the information correct?

a. It's the wrong symbol for a process. b. It's the wrong data for the symbol. c. Both the data and the symbol are wrong for a process. d. The information is correct, and there is no problem. ANSWER: RATIONALE:

b

Dante is correct; there is a problem. The symbol is correct for a process, but the data belongs in a data flow symbol.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.3 - Draw the four basic data flow diagram symbols. TOPICS: Data Flow Diagram Symbols KEYWORDS: Bloom's: Apply Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 05 Data & Process Modeling DATE CREATED: DATE MODIFIED:

6/14/2024 7:23 PM 6/18/2024 1:08 PM

11. Process 0 represents the entire information system but not the internal workings of the system. a. true b. false ANSWER: RATIONALE:

a

Process 0 represents the entire information system but not the internal workings of the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.4 - Explain the six guidelines used when drawing data flow diagrams. TOPICS: Drawing Data Flow Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 12. Megan is preparing to draw her first data flow diagram. There are certain guidelines she should follow. What

are those guidelines? Choose all that apply. a. Draw the context diagram so it fits on one page. Use the name of the information system as the

process name in the context diagram, and use unique names within each set of symbols. b. Draw the context diagram so it fits on no more than two pages, use the external entity name as the process name in the context diagram, and use common names within each set of symbols. c. Do not cross lines. Provide a unique name and reference number for each process and obtain as much user input and feedback as possible. d. Cross lines when necessary. Provide multiple names and reference numbers for each process, and obtain user input and feedback only when it's needed. ANSWER: RATIONALE:

a, c

The guidelines Megan should follow when drawing a data flow diagram are: Draw the context diagram so it fits on one page. Use the name of the information system as the process name in the context diagram and use unique names within each set of symbols. Do not cross lines. Provide a unique name and reference number for each process, and obtain as much user input and feedback as possible.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.4 - Explain the six guidelines used when drawing data flow diagrams. TOPICS: Drawing Data Flow Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 05 Data & Process Modeling 13. Shakira just drew a context diagram for an order system. The three bottom entities each have a single

incoming data flow. What are those bottom entities called since they only have a single incoming data flow?

a. data flow b. process c. terminators d. data store ANSWER: RATIONALE:

c

The three entities at the bottom of the diagram are final destinations because they have a single incoming data flow and no outgoing data flow. Therefore, they are terminators.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.5 - Draw context diagrams. Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 05 Data & Process Modeling TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Drawing a Context Diagram Bloom's: Remember/Understand 6/14/2024 7:23 PM 6/18/2024 1:09 PM

14. DFD diagram 0 is created to show the details inside the black box. a. true b. false ANSWER: RATIONALE:

a

DFD diagram 0 is created to show the details inside the black box.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.6 - Draw diagram 0 data flow diagrams. TOPICS: Drawing a Diagram 0 DFD KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 15. Jada is working on an exploded version of process 0 that shows considerably more detail than a context

diagram. When she explodes the Data Flow Diagram (DFD), it can be broken down into two parts. What are those partitioned views called? a. The higher-level diagram is the parent diagram, and the lower-level diagram is the child diagram. b. The higher-level diagram is the father diagram, and the lower-level diagram is the son diagram. c. The higher-level diagram is the mother diagram, and the lower-level diagram is the daughter

diagram. d. The higher-level diagram is the child diagram, and the lower-level diagram is the parent diagram. ANSWER: RATIONALE:

a

Diagram 0 can also be called a partitioned or decomposed view of process 0. When a DFD is exploded, the higher-level diagram is called the parent diagram, and the lower-level diagram is referred to as the child diagram.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.6 - Draw diagram 0 data flow diagrams. TOPICS: Drawing a Diagram 0 DFD KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 16. A functional primitive is a process that consists of multiple functions that do not explode further. a. true Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 05 Data & Process Modeling b. false ANSWER: RATIONALE:

b

A functional primitive is a process that consists of a single function that is not exploded further.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.6 - Draw diagram 0 data flow diagrams. TOPICS: Drawing a Diagram 0 DFD KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 17. Jaya is an intern with Teragroup and is learning about leveling and balancing techniques for lower-level

DFDs. Their supervisor is testing them on the purpose of leveling. What is leveling used for when creating lower-level DFDs? a. Leveling decreases the number of symbols needed to complete lower-level diagrams. b. Leveling draws increasingly detailed diagrams until all functional primitives are identified. c. Leveling ensures the correct number of data flows are present within the DFD. d. Leveling ensures the DFD is symmetric. ANSWER: RATIONALE:

b

Leveling draws increasingly detailed diagrams until all functional primitives are identified.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.7 - Draw lower-level data flow diagrams. TOPICS: Drawing Lower-Level DFDs KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 18. Alan is learning about leveling examples. He has learned that more complex systems have more processes

and there are many levels to determine the functional primitives. Leveling is also called other names. What are those other names? Choose all that apply. a. expanding b. exploding c. partitioning d. decomposing ANSWER: RATIONALE:

b, c, d

POINTS:

1

Leveling is also called exploding, partitioning, or decomposing.

Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 05 Data & Process Modeling QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.7 - Draw lower-level data flow diagrams. TOPICS: Drawing Lower-Level DFDs KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 19. Kayla is working on a DFD with both the higher-level (parent) diagram and the decomposed lower-level

(child) diagram. She has one data store in the parent diagram and two data stores in the child diagram that do not appear in the parent diagram. What rule is applied to this situation? a. The rule is when drawing DFDs, a data store is shown only when two or more data flows use that

data store. b. The rule is when drawing DFDs, a data store is shown only when two or more external entities use that data store. c. The rule is when drawing DFDs, a data store is shown only when two or more processes use that data store. d. The rule is when drawing DFDs, a data store is shown only when two or more terminators use that data store. ANSWER: RATIONALE:

c

The rule is when drawing DFDs, a data store is shown only when two or more processes use that data store.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.7 - Draw lower-level data flow diagrams. TOPICS: Drawing Lower-Level DFDs KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 20. DeAndre is viewing a parent diagram containing process 0, which has two input flows and two output flows,

and shows no internal detail. What type of DFD is it, and what is the process symbol considered to be? Choose all that apply. a. a higher-level DFD b. a black box c. a lower-level DFD d. a white box ANSWER: RATIONALE:

a, b

POINTS:

1

This process symbol (process 0) is part of a higher-level DFD diagram since it has two input flows and two output flows. Because it shows no internal detail, it is considered a black box.

Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 05 Data & Process Modeling QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.7 - Draw lower-level data flow diagrams. TOPICS: Drawing Lower-Level DFDs KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 21. Katie has been given an example of diagram 0 for an order system and has been asked to draw a lower-level

DFD for the fill order process. Katie has added a couple of symbols that were not on diagram 0. What do these symbols stand for? Choose all that apply.

a. data flow b. external entity c. data store d. process ANSWER: RATIONALE:

c, d

The symbols stand for data store and process.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.7 - Draw lower-level data flow diagrams. TOPICS: Drawing Lower-Level DFDs KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/18/2024 1:09 PM 22. A data dictionary contains information about data, such as its meaning, relationships to other data, origin,

usage, and format. a. true b. false Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 05 Data & Process Modeling ANSWER: RATIONALE:

a

A data dictionary contains information about data, such as, its meaning, relationships to other data, origin, usage, and format.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 23. Kendra is an intern who has been assigned by Jerry, a systems analyst, to help build a data dictionary.

Before Kendra begins, Jerry quizzes her on data element descriptions. Jerry asks Kendra, "What are other names for data element descriptions?" Choose all that apply. a. file b. datum c. data item d. field ANSWER: RATIONALE:

c, d

Kendra should reply that the two other names of data element descriptions are a data item or field.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 24. Jalisa is combining data elements into records for a data dictionary. What is a record? a. A record is a combination of unrelated data elements included in a data flow. b. A record is a meaningful combination of related data elements included in a process. c. A record is a meaningful combination of related data elements included in an external entity. d. A record is a meaningful combination of related data elements included in a data flow or retained in a

data store. ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE:

1 Multiple Choice

A record is a meaningful combination of related data elements included in a data flow or retained in a data store.

Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 05 Data & Process Modeling HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 25. Dominique is defining elements for the data repository in a data dictionary that she is working on. Why is a

data repository important? a. It ensures all data is locally available. b. It ensures data consistency, so that all systems across the enterprise can share up-to-date and

consistent data. c. It ensures all software code is consistent and locally available. d. It ensures personal data is consistent and available across the enterprise. ANSWER: RATIONALE:

b

A data repository is important because it ensures data consistency, so that all systems across the enterprise can share up-to-date and consistent data.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 26. One of Kiara's data element names is CURRENT BALANCE, but she also refers to it as OUTSTANDING

BALANCE and CUSTOMER BALANCE. What is this terminology called? a. arrogate b. alliterative c. antonym d. alias ANSWER: RATIONALE:

d

Any alternate name(s) other than the standard data element name is called an alias.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 05 Data & Process Modeling 27. Liana is defining default values for data elements within the data dictionary. What is the meaning of a

default value? Choose all that apply. a. the highest value in a range of values b. the value for a data element if a value is not entered for it c. the value that is chosen by the program when no other value is specified d. the value the program falls back to when it runs out of other values to use -- in programming, a

default value is the value assigned by the program when no other specific value is provided ANSWER: RATIONALE:

b, c, d

In programming, a default value is the value assigned by the program when no other specific value is provided or if a value is not entered for it. For example, all new customers might have a default value of $500 for the CREDIT LIMIT data element.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 28. Embry is documenting data flows for the data dictionary, and she has reached the TIME CARD data flow.

Now she needs to discover the volume and frequency. What do volume and frequency represent? a. the expected amount of time it takes per occurrence b. the expected number of data flows per occurrence c. the amount of time it takes for each data flow d. the expected number of occurrences for the data flow per unit of time ANSWER: RATIONALE:

d

Frequency and volume describe the expected number of occurrences for the data flow per unit of time. For example, if a company has 300 employees, a TIME CARD data flow would involve 300 transactions and records each week as employees submit their work-hour data.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 29. Anthony is about to run a data dictionary report for his colleagues. What are some of the reports that can be

obtained from a data dictionary? Choose all that apply. Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 05 Data & Process Modeling a. an alphabetized list of all data elements by name b. a detailed description of the entire computer system c. a report describing each data element d. detailed reports showing all characteristics of data elements, records, data flows, processes, or any

other selected item ANSWER: RATIONALE:

a, c, d

Some of the reports available from a data dictionary include an alphabetical list of data elements by name, a report describing each data element, and detailed reports showing all characteristics of data elements, records, data flows, processes, or any other selected item.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 30. Luna is building a data dictionary and needs to document all parts of it. She needs help with documentation.

What areas of the data dictionary need documentation? Choose all that apply. a. data elements, data flows, and data stores b. datum processes, data entities, and process elements c. process entities, data records, and process stores d. processes, entities, and records ANSWER: RATIONALE:

a, d

The areas of the data dictionary that need documentation are data elements, data flows, data stores, processes, entities, and records.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.8 - Create a data dictionary. TOPICS: Data Dictionary KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 31. Modular design is based on a combination of two logical structures, sometimes called control structures. The

two structures are called sequence and iteration. a. true b. false ANSWER:

b

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 05 Data & Process Modeling RATIONALE:

Modular design is based on combinations of three logical structures, sometimes called control structures. The three structures are called sequence, selection, and iteration.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.9 - Apply process description tools in modular design. TOPICS: Process Description Tools in Modular Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 32. Isaac is not sure what the difference is between structured English and standard English. "English is English,

isn't it?" he asks. His friend Tony explains, "When it comes to design language, they are not the same." What makes structured English different from standard English? a. Structured English describes all processes regardless of type. b. Structured English describes logical processes clearly and accurately. c. Structured English is used to describe the flow of data throughout the system design. d. Structured English is used to describe data stores and processes. ANSWER: RATIONALE:

b

Structured English describes logical processes clearly and accurately.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.9 - Apply process description tools in modular design. TOPICS: Process Description Tools in Modular Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 33. Makenna is creating a decision table. The process description contains the condition's product stock and

customer credit status. What must happen for the order to be accepted and processed? a. One condition must be met. b. Either condition must be met. c. Both conditions must be met. d. Neither condition needs to be met. ANSWER: RATIONALE:

c

For the order to be accepted and processed, both conditions must be met.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.9 - Apply process description tools in modular design. Copyright Cengage Learning. Powered by Cognero.

Page 18


Ch 05 Data & Process Modeling TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Process Description Tools in Modular Design Bloom's: Remember/Understand 6/14/2024 7:23 PM 6/14/2024 7:23 PM

34. Pseudocode is used in program design and is mainly used as a shorthand notation for actual code. a. true b. false ANSWER: RATIONALE:

a

Pseudocode is used in program design and is mainly used as a shorthand notation for actual code.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.9 - Apply process description tools in modular design. TOPICS: Process Description Tools in Modular Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM 35. Nala is creating a table with three conditions. How many rules does that create? a. 2 b. 4 c. 6 d. 8 ANSWER: RATIONALE:

d

Each condition creates two rules, so three conditions create (2x2x2 =) 8 rules.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.5.9 - Apply process description tools in modular design. TOPICS: Process Description Tools in Modular Design KEYWORDS: Bloom's: Apply DATE CREATED: 6/14/2024 7:23 PM DATE MODIFIED: 6/14/2024 7:23 PM

Copyright Cengage Learning. Powered by Cognero.

Page 19


Ch 06 Object Modeling 1. Myisha prefers employing object-oriented (O-O) analysis because, when developing components, each of her

objects-with its attributes and behaviors-can function as a self-contained entity. Why is this aspect important for Myisha? a. Myisha's code is proprietary, and she does not like sharing her code with others, so developing under

O-O keeps her code safe. b. Objects are plug-and-play, so Myisha only must build an object once, and it can be used over and over again in multiple projects. c. Changes to one object do not necessarily impact others, reducing the risk of unintended consequences when models and related artifacts are modified. d. O-O is less flexible, but it takes less time and effort to create objects. ANSWER: RATIONALE:

c

Myisha does not have to make changes to her code every time modifications are made to the software. Changes to one object do not necessarily impact others, reducing the risk of unintended consequences, when models and related artifacts are modified.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.1 - Demonstrate how object-oriented analysis can describe an information system. TOPICS: Object-Oriented Analysis KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 2. O-O analysts can precisely define objects that represent real-world entities. This capability is important for

several reasons. Why is this important? a. Through the definition of objects that accurately represent real-world entities, O-O analysis enables

analysts to approach system development in a holistic manner. b. Through the definition of objects representing real-world entities, O-O analysis empowers analysts to design systems that are challenging to conceptualize. c. Through the definition of objects representing real-world entities, O-O analysis allows analysts to intuitively model and understand complex systems, making the conceptualization and design process more natural and straightforward. d. Through the definition of objects representing real-world entities, O-O analysis allows analysts to use less complex systems when creating a system design. ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

O-O analysis is popular for representing real-world entities, behaviors, and interactions. By defining objects that represent real-world entities, O-O analysis allows analysts to intuitively model and understand complex systems, making the conceptualization and design process more natural and straightforward.

Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 06 Object Modeling LEARNING OBJECTIVES: Tilley.SAD13e.25.6.1 - Demonstrate how object-oriented analysis can describe an information system. TOPICS: Object-Oriented Analysis KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 3. Tyson favors object-oriented analysis because, when he needs to modify a specific object, it can be done

without impacting other parts of the system. What are these features commonly known as? Choose all that apply. a. enhanced security b. flexibility and maintenance c. efficient problem solving d. modularity and encapsulation ANSWER: RATIONALE:

b, d

Flexibility and maintenance, along with modularity and encapsulation, contribute to easily making changes in a system. When a specific object requires alteration, it can be modified without causing disruptions to other parts of the system, thereby simplifying the process of maintaining and updating systems. Modularity and encapsulation further enhance this by allowing for easier maintenance, modification, and extension of systems.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.1 - Demonstrate how object-oriented analysis can describe an information system. TOPICS: Object-Oriented Analysis KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 4. Through encapsulation, access can be restricted to the internal components exposing only what is necessary.

This provides a precise mechanism for controlling interactions with objects, preventing unintended interference and misuse. What is the restriction to internal components called? a. enhanced security b. enhanced communication c. effective protection d. flexible protection ANSWER: RATIONALE:

a

POINTS:

1

The restriction to internal components is called enhanced security, which is crucial in developing robust and secure applications, particularly in environments where data sensitivity and integrity are important.

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 06 Object Modeling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.1 - Demonstrate how object-oriented analysis can describe an information system. TOPICS: Object-Oriented Analysis KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 5. An object comprises both data and the processes that impact that data. a. true b. false ANSWER: RATIONALE:

a

An object includes data and the processes that affect that data. For example, a customer object has a name, an address, an account number, and a current balance. Customer objects also can perform specific tasks, such as placing an order, paying a bill, and changing their address.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.2 - Explain what an object represents in an information system. TOPICS: Objects KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 6. An object signifies a person, place, event, or transaction that holds importance within the information system. a. true b. false ANSWER: RATIONALE:

a

An object represents a person, place, event, or transaction that is significant to the information system. The accurate representation and interaction of objects are essential for developing robust, reliable systems that reflect real-world entities and their interactions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.2 - Explain what an object represents in an information system. TOPICS: Objects KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 06 Object Modeling 7. Matthew is observing his supervisor engaged in object-oriented analysis. When asked by his supervisor about

the importance of identifying the correct attributes for each object, what explanation does Matthew provide? a. Identifying the correct attributes determines the current state of the object and its position within the

system. b. Identifying the correct attributes determines the flexibility of the object and its position within the system. c. Identifying the correct attributes determines how accurately it is placed within the system. d. Identifying the correct attributes determines how accurately the real-world entity is represented within the system. ANSWER: RATIONALE:

d

Identifying the correct attributes determines how accurately the real-world entity is represented within the system. By ensuring that each object has the appropriate attributes, analysts can create more realistic and functional models of the entities within the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.3 - Explain object attributes. TOPICS: Attributes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 8. In O-O analysis, the identification of accurate elements for each object is vital, as it significantly impacts the

precision of representing real-world entities within the system. Guaranteeing that each object incorporates these pertinent elements enables analysts to construct more realistic and functional models of the entities integrated into the system. What are these elements? a. attributes b. objects c. classes d. messages ANSWER: RATIONALE:

a

In O-O analysis, identifying the correct attributes for each object is crucial, as it determines how accurately the real-world entity is represented within the system. By ensuring that each object has the appropriate attributes, analysts can create more realistic and functional models of the entities within the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.3 - Explain object attributes. TOPICS: Attributes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 06 Object Modeling DATE MODIFIED:

6/18/2024 1:08 PM

9. Parson is preparing for a test in object-oriented (O-O) analysis, focusing on the question about what the

functions of a method in an O-O analysis are How does Parson answer? Choose all that apply. a. They directly manipulate the internal state of other unrelated objects. b. Methods perform operations, manipulate object attributes, and implement the object's behavior

within a system. c. They directly access and modify the internal state of unrelated objects. d. They define how the object can interact with other objects and the outside world. ANSWER: RATIONALE:

b, d

Methods perform operations, manipulate object attributes, and implement the object's behavior within a system. They also define how the object can interact with other objects and the outside world. In systems analysis and design, understanding object methods is essential in defining the interactions and functionalities within the system.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.4 - Explain object methods. TOPICS: Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 10. Which object methods support a form of collaboration between objects within a system, allowing the

execution of complex behaviors and processes through the coordination of simpler, well-defined operations? a. flexibility and security b. clarity and understandability c. interaction and collaboration d. enhanced modularity and reusability ANSWER: RATIONALE:

c

The object methods of interaction and collaboration between objects within a system enable the realization of complex behaviors and processes by coordinating simpler, well-defined operations.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.4 - Explain object methods. TOPICS: Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 11. Defining behaviors as methods implies that when an object requires a change in behavior, only the methods Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 06 Object Modeling

associated with that behavior need to be modified, minimizing the impact on the rest of the system. What features are enabled for models by adopting this approach? a. encapsulation and security b. interaction and collaboration c. flexibility and maintainability d. clarity and understandability ANSWER: RATIONALE:

c

Defining behaviors as methods allows for more flexible and maintainable models. If an object needs to change its behavior, only the methods related to that behavior must be modified, reducing the impact on the rest of the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.4 - Explain object methods. TOPICS: Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 12. How do methods contribute to presenting the functionalities of objects in a clear and structured manner,

thereby facilitating developers in comprehending and working with the system more efficiently? a. enhanced modularity and reusability b. flexibility and maintainability c. interaction and collaboration d. clarity and understandability ANSWER: RATIONALE:

d

Methods provide clarity and understandability to represent the functionalities of objects, making it easier for developers to understand and work with the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.4 - Explain object methods. TOPICS: Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 13. The design of objects as modular components is achieved by encapsulating specific behaviors within

methods, where each method has a singular responsibility or function. What does this approach serve as a function of? a. clarity and understandability b. enhanced modularity and reusability Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 06 Object Modeling c. interaction and collaboration d. flexibility and maintainability ANSWER: RATIONALE:

b

Object methods contribute to an O-O design's enhanced modularity and reusability. Objects can be designed as modular components by encapsulating specific behaviors within methods, where each method has a single responsibility or function. This modularity allows objects and their methods to be reused across different system parts, reducing development time and effort.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.4 - Explain object methods. TOPICS: Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 14. This concept permits objects of distinct classes to respond differently to the same message (method call). It

enables objects to be treated as instances of their parent class, resulting in more straightforward code and fewer errors. What is this concept? a. method overloading b. heuristics c. method overriding d. polymorphism ANSWER: RATIONALE:

d

Polymorphism allows objects of different classes to respond differently to the same message (method call). It enables objects to be treated as instances of their parent class, leading to simpler code and fewer errors. It enables one interface to be used for different data types, allowing for the implementation of elegant software designs that can handle new, unforeseen circumstances and data types.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.5 - Explain object messages. TOPICS: Messages KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 15. The "black box" concept is an example of a principle where all data and methods are self-contained. What is

that principle? a. security b. encapsulation Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 06 Object Modeling c. interaction d. decoupling ANSWER: RATIONALE:

b

The term "black box" refers to the concept of encapsulation, which means that all data and methods are self-contained. A black box doesn't require any outside interference and, by limiting access to internal processes, it prevents its internal code from being modified by another object or process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.5 - Explain object messages. TOPICS: Messages KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 16. What is the term that refers to reducing dependencies between components to enhance modularity,

manageability, changeability, and scalability? a. encapsulation b. polymorphism c. modularity d. decoupling ANSWER: RATIONALE:

d

Decoupling is a process of decreasing the interdependencies between various parts of a system to enhance its modularity and make it more manageable, adaptable, and scalable. This is achieved by ensuring that objects interact through clearly defined messages, which means that changes made to one object's internal structure or methods won't necessarily affect others as long as the messaging interfaces remain consistent.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.5 - Explain object messages. TOPICS: Messages KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 17. A significant advantage of object-oriented designs is that systems analysts can save time and avoid errors by

using modular objects. Programmers can then translate these designs into code, working with reusable program modules that have undergone testing and verification. a. true b. false Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 06 Object Modeling ANSWER: RATIONALE:

a

A significant advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects. Programmers can translate the designs into code, working with reusable program modules that have been tested and verified.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.5 - Explain object messages. TOPICS: Messages KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 18. These elements play a crucial role in defining and designing communication and actions within a system,

contributing to its modularity, clarity, and reliability. What is the term for the essential elements in objectoriented analysis and design that empower objects to execute actions and exchange information? a. object attributes b. object classes c. object methods d. object messages ANSWER: RATIONALE:

d

In O-O analysis and design, object messages play a vital role. They serve as the mechanism through which objects can trigger behaviors and exchange information. The significance of object messages lies in shaping the interactions and behaviors within a system, thereby enhancing its modularity, clarity, and reliability.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.5 - Explain object messages. TOPICS: Messages KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 19. How can object-oriented design save time, prevent errors, and provide advantages for systems analysts? a. by using black boxes b. by using modular objects c. by using encapsulated boxes d. by using polymorphic objects ANSWER: RATIONALE:

b

A key benefit of O-O design is the use of modular objects. They not only save analysts time but also help in error prevention. Programmers can subsequently leverage tested and verified program modules when translating designs into code.

Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 06 Object Modeling POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.5 - Explain object messages. TOPICS: Messages KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 20. Talia is currently taking a test on the concepts of objects, attributes, methods, messages, and classes. The

question she is presented with is: "What is the term used to describe a group or category to which an object belongs? This term represents the foundation elements that provide a blueprint or template for creating objects." What is Talia's answer? a. methods b. classes c. objects d. attributes ANSWER: RATIONALE:

b

Objects are grouped into categories called classes. These classes act as a blueprint or template and are used to create objects. They determine the properties (attributes) and actions (methods) that objects will possess and be able to perform. Classes are the foundation of O-O programming and define the structure of the objects that will be created from them.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.6 - Explain classes. TOPICS: Classes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 21. If an object can be categorized into more specific groups and is referred to as a class, what is a class called

when it belongs to a more general category? a. major class b. superclass c. general class d. hyperclass ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE:

1 Multiple Choice

A class can belong to a more general category called a superclass. For instance, a NOVEL is a subclass of a superclass BOOK because all novels are books.

Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 06 Object Modeling HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.6 - Explain classes. TOPICS: Classes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 22. What is the term used to describe what objects need to know about each other, how objects respond to

changes in other objects, and the implications of membership in classes, superclasses, and subclasses? a. objects b. classes c. relationships d. attributes ANSWER: RATIONALE:

c

Relationships describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.7 - Explain relationships among objects and classes. TOPICS: Relationships Among Objects and Classes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 23. In UML, an object is depicted as a square with the object name positioned at the top, accompanied by the

object's attributes and methods. a. true b. false ANSWER: RATIONALE:

b

UML represents an object as a rounded rectangle with the object name at the top, followed by the object's attributes and methods.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 24. What do you call a sequence of steps in a business process that is initiated by an external entity, referred to Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 06 Object Modeling

as an actor, who requests the system to execute a function or process? a. an object model b. a use case c. a relationship d. a class ANSWER: RATIONALE:

b

A use case represents the steps in a specific business function or process. An external entity, called an actor, initiates a use case by asking the system to perform a function or process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 25. When constructing a use case diagram, the initial step involves identifying this delineation, typically

represented by a rectangle. What is this delineation called? a. system design b. system analysis c. system relationship d. system boundary ANSWER: RATIONALE:

d

When creating a use case diagram, the first step is to identify the system boundary, which is represented by a rectangle. The rectangle distinguishes what is included in the system (inside the rectangle) from what is excluded (outside the rectangle).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 26. This form of visual representation describes the object classes and relationships within a use case.

Comparable to a data flow diagram (DFD), it transitions into a logical model, advances into a physical model, and eventually transforms into a functional information system. What is this visual representation called? a. class structure b. class diagram Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 06 Object Modeling c. class system d. case system ANSWER: RATIONALE:

b

This visual representation is a class diagram. It shows a use case's object classes and relationships. Like a DFD, a class diagram is a logical model that evolves into a physical model and becomes a functioning information system. Entities, data stores, and processes are transformed into data structures and program code in structured analysis. Similarly, class diagrams evolve into code modules, data objects, and other system components.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 27. What term is used to describe the instances of one class relating to another? For instance, an employee may

have earned zero, one, or multiple vacation days. Similarly, an employee may have zero or one spouse. a. cardinality b. causality c. class relation d. causation ANSWER: RATIONALE:

a

The class diagram provides information about the relationship between instances of different classes. Cardinality is a part of this information, and it describes the number of instances of one class that are related to the instances of another class. For instance, an employee may have no vacation days, one vacation day, or multiple vacation days, and an employee may have no spouse or one spouse. Cardinality is expressed using notations such as "one-to-one," "one-to-many," or "many-to-many."

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 28. What type of diagram shows the interaction among classes during a specified period, graphically documents

a use case, and displays the classes, messages, and timing of the messages? a. object diagram Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 06 Object Modeling b. sequence diagram c. activity diagram d. class diagram ANSWER: RATIONALE:

b

A sequence diagram is a model that illustrates the dynamic behavior of a use case. It shows how different classes interact with each other during a specific timeframe. The diagram provides a visual representation of the use case by depicting the involved classes, messages between them, and the timing of the messages. In a sequence diagram, there will be symbols that represent classes, lifelines, messages, and focuses.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 29. This diagram shows how an object changes from one state to another depending on events that affect the

object. All possible states must be documented in the diagram. What is this diagram called? a. object diagram b. sequence diagram c. use case diagram d. state transition diagram ANSWER: RATIONALE:

d

A state transition diagram shows how an object changes from one state to another depending on events that affect the object. All possible states must be documented in the state transition diagram.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 30. What are the defining characteristics of a focus label ? a. a rounded rectangle with the name inside b. a dashed line c. a line showing the direction between two objects Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 06 Object Modeling d. a narrow vertical shape that covers the lifeline ANSWER: RATIONALE:

d

A narrow vertical shape that covers the lifeline identifies a focus. The focus label indicates when an object sends or receives a message.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 31. What are the defining characteristics of a message label? a. a line showing the direction between two objects b. a dashed line c. a narrow vertical shape that covers the lifeline d. a rounded rectangle with the name inside ANSWER: RATIONALE:

a

A message label is identified by a line showing the direction between two objects. The label shows the name of the message and can include additional information about the contents.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 32. What are the defining characteristics of a lifeline label? a. a rounded rectangle with the name inside b. a dashed line c. a line showing the direction between two objects d. a narrow vertical shape ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE:

1 Multiple Choice

A lifeline label is identified by a dashed line. The lifeline represents the time the object above it can interact with the other objects in the use case. An X marks the end of the lifeline.

Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 06 Object Modeling HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 33. What are the defining characteristics of a class label? a. a narrow vertical shape b. a dashed line c. a rounded rectangle with the name inside d. a line showing the direction between two objects ANSWER: RATIONALE:

c

A class label is identified by a rounded rectangle with the name inside. Classes that send or receive messages are shown at the top of the sequence diagram.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 34. What is the name of the horizontal flowchart that displays the order of actions and events and identifies the

outcomes? a. activity diagram b. sequence diagram c. object diagram d. component diagram ANSWER: RATIONALE:

a

An activity diagram is a horizontal flowchart that displays events and actions as they occur, demonstrating the sequence in which the actions take place and identifying the outcomes.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 06 Object Modeling 35. Raven is unfamiliar with use case modeling but understands that it represents steps in a business function or

process. Which of the following examples would be classified as a use case? Choose all that apply. a. A customer uses an ATM or visits a bank branch to withdraw money from their account. b. Actions related to starting up or shutting down the system, as they are often considered part of the

system's overall lifecycle. c. An administrator manages user accounts, including creating, updating, or deactivating accounts. d. An event that occurs without direct interaction from an external actor. ANSWER: RATIONALE:

a, c

A use case is a set of steps that define a particular business process or function. An external party, known as an actor, triggers a use case by requesting the system to perform a specific process or function. For instance, when a customer uses an ATM or visits a bank branch to withdraw money from their account, that is a use case. Similarly, when an administrator manages user accounts by creating, updating, or deactivating accounts, that is also a use case.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.6.8 - Describe an object-oriented system using UML. TOPICS: The Unified Modeling Language KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 07 User Interface Design 1. Usability is the key to the user interface (UI), including user satisfaction, business function support, and

system effectiveness. a. true b. false ANSWER: RATIONALE:

b

The UI is the key to usability, including user satisfaction, business function support, and system effectiveness.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.1 - Explain user interfaces. TOPICS: User Interfaces KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 2. When Elliot started working in systems design, the Management Information Systems Department designed

the system and the user had little input. But today, applications are designed differently. How has systems design changed over the years? Choose all that apply. a. User-designed output is the overwhelming trend. b. Cross-platform compatibility is less important now than it was previously. c. The system developer identifies user needs and then creates a design that will satisfy users while also

meeting corporate requirements. d. Accessibility is not as important now as it was previously due to the multiple types of hardware available for people with a disability. ANSWER: RATIONALE:

a, c

Modern applications are created by identifying user needs and meeting corporate requirements. User-designed output has become the overwhelming trend.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.1 - Explain user interfaces. TOPICS: User Interfaces KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 3. What is the fundamental relationship between computers and those who use them to perform their jobs? a. machine-computer interaction b. software-computer interaction c. human-computer interaction d. data-computer interaction Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 07 User Interface Design ANSWER: RATIONALE:

c

Human-computer interaction describes the relationship between computers and those who use them to perform their jobs.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.2 - Explain the concept of human-computer interaction. TOPICS: Human-Computer Interaction KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 4. Kristy is designing a UI for a new voice-activated butler app. What type of interface will she be primarily

creating? a. Graphical user interface b. Command-line interface c. Touch user interface d. Voice user interface ANSWER: RATIONALE:

d

Voice user interfaces employ voice commands for interaction, exemplified by virtual assistants.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.2 - Explain the concept of human-computer interaction. TOPICS: Human-Computer Interaction KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 5. Cleo is in the process of designing an interface for NextGen Enterprises. However, before she starts designing

the interface, it is essential for her to gain a thorough understanding of the fundamental business operations of the company. She needs to recognize how the proposed system aligns with the goals of various levels, such as individual employees, entire departments, and the enterprise. a. true b. false ANSWER: RATIONALE:

a

POINTS:

1

The interface designer must understand the underlying business functions and how the system supports individual, departmental, and enterprise goals. This comprehensive understanding involves grasping the fundamental business operations and recognizing how the proposed system aligns with business goals at various levels, from individual employees to entire departments, and the enterprise.

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 07 User Interface Design QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.3 - Summarize the seven habits of successful interface designers. TOPICS: Seven Habits of Successful Interface Designers KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 6. When designing an interface, it is important to have a hierarchical structure that leads users logically from

one screen to the next. This allows for more specific options and functionalities to be provided and helps manage the flow of information and user actions within the system. What is this design approach called that is critical for the usability and effectiveness of the system? a. understand the business b. focus on usability c. use models and prototypes d. think like a user ANSWER: RATIONALE:

b

UI design is critical for an effective information system. It should be easy to use and navigate, (focus on usability) encompassing all tasks and communications. The opening screen sets the tone and should present clear options.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.3 - Summarize the seven habits of successful interface designers. TOPICS: Seven Habits of Successful Interface Designers KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 7. What tools are available to a system analyst to gather user feedback on usability, functionality, and overall

user experience on a new interface? Choose all that apply. a. conducting interviews b. administering questionnaires c. speaking with upper management d. observing user interactions with the interface ANSWER: RATIONALE:

a, b, d

Various methods can be employed to gather user input, such as conducting interviews, administering questionnaires, and observing user interactions with the interface.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.3 - Summarize the seven habits of successful interface designers. Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 07 User Interface Design TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Seven Habits of Successful Interface Designers Bloom's: Apply 6/18/2024 1:08 PM 6/18/2024 1:08 PM

8. With offices in 30 states, Phoenix Electric decided to build new tracking software from the ground up. During

the software build, they used 20 employees in all roles from 13 local offices to test the software. To be sure of success, all offices had the same hardware to avoid bad configurations. The test was successful. Upon the national rollout, the software was a failure. How could software that allegedly was successful upon the local launch be a failure upon the national rollout? a. Local testing did not consider national issues including weather conditions, manpower, and service

area. b. When testing the software, the company providing the build asked only the managers to try it, not the people who would actually oversee operations. c. Not enough time was taken for testing the software. d. The software was not supported with the hardware at all the locations. ANSWER: RATIONALE:

a

Local testing did not take into consideration issues, including weather conditions, staffing at each office, and how large each service area was. These types of issues should have been addressed by the interface designers referencing the seven fundamental principles before the software were in the design stage.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.3 - Summarize the seven habits of successful interface designers. TOPICS: Seven Habits of Successful Interface Designers KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 9. Which of the following statements supporting productivity enhancements are true? Choose all that apply. a. Tasks, commands, and functions should be organized into groups resembling business operations. b. Default value should be used if most of the values in a field are the same. c. Hotkeys can be substituted for shortcuts, so experienced users can avoid multiple menus. d. Provide a last-found feature that displays a list of possible values when users enter the first few

letters. ANSWER: RATIONALE:

a, b

POINTS: QUESTION TYPE:

1 Multiple Response

The following two options are true: organize tasks, commands, and functions in groups resembling business operations and use default values if most values in a field are the same. For example, if 90% of a firm's customers live in Albuquerque, use it as the default value in the "City" field.

Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 07 User Interface Design HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.4 - Summarize the 10 guidelines for user interface design. TOPICS: Guidelines for User Interface Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 10. Whenever possible, use a data entry method called calendar control where a blank form that duplicates or

resembles the source document is completed on the screen. a. true b. false ANSWER: RATIONALE:

b

Whenever possible, use a data entry method called form filling where a blank form that duplicates or resembles the source document is completed on the screen.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.4 - Summarize the 10 guidelines for user interface design. TOPICS: Guidelines for User Interface Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 11. Bader is currently designing a new UI for a credit union located downtown in his city. The primary users of

this interface will be tellers. Based on the previous records of the credit union, it has been observed that customers usually withdraw $500 when they visit the teller in person. Bader has conducted thorough research and decided to set the default value of withdrawal transactions to $500. However, he has also made provisions to allow the tellers to customize the amount according to the customer's request, since customers may want to withdraw more or less than the default amount. What part of user-centered design is this an example of? a. providing flexibility b. enhancing user productivity c. help and feedback d. layout and design ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Providing flexibility: A flexible approach should be provided to allow users to input the amount by themselves or start with a default value that displays automatically. This method gives users control and customization, enabling them to adjust parameters based on their specific needs at any given time. For example, the system could present a default value of $500 and allow users to accept it by pressing ENTER, or they could enter a different amount according to their requirement.

Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 07 User Interface Design LEARNING OBJECTIVES: Tilley.SAD13e.25.7.4 - Summarize the 10 guidelines for user interface design. TOPICS: Guidelines for User Interface Design KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 12. Dylan is an expert in designing help modules for UIs in the healthcare industry. Although it is a small

subsegment of UI design, his institutional knowledge of the healthcare industry sets his help modules apart from others. Having a sound help system in a UI is crucial for several reasons. What are some of those reasons? Choose all that apply. a. With a useful help system, users may not explore all features of your interface, leading to decreased

engagement and product utilization. b. When users encounter difficulties, easy access to assistance and information directly improves their satisfaction and overall experience, reducing frustration. c. A well-designed help system can enable users to find solutions independently, which can potentially reduce reliance on customer support and decrease associated costs. d. A well-designed help system can greatly improve the usability of a product or service. It can act as a valuable learning tool, helping users fully understand and utilize the functionalities offered, which ultimately enhances their efficiency and effectiveness in using the product or service. ANSWER: RATIONALE:

b, c, d

First, a useful help system directly impacts user support and satisfaction, providing users with easy access to assistance and information when they encounter difficulties, which can reduce frustration and improve their overall experience. Second, a welldesigned help system empowers users to find solutions independently, potentially reducing the reliance on direct customer support and decreasing support costs. Finally, it contributes to the usability of the overall system; a good help system can act as a learning tool, helping users understand and utilize the full range of functionalities offered, thereby enhancing their efficiency and effectiveness in using the product or service.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.4 - Summarize the 10 guidelines for user interface design. TOPICS: Guidelines for User Interface Design KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 13. Falan is building a new form. As with any form, the placement of information is very important. To be

placed correctly, forms use zones, and several zones are required in a form. What are some of those zones? Choose all that apply. a. The control zone contains codes, identification information, numbers, and dates for storing completed

forms. b. The central part of the form, called the body zone, usually takes up at least half of the space on the Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 07 User Interface Design

form and contains captions and areas for entering variable data. c. If totals are included on the form, they appear in the value zone. d. The signature zone contains required signatures. ANSWER: RATIONALE:

a, b

There are two correct zones in this answer. The first zone is called the control zone, which is used for storing completed forms and contains codes, identification information, numbers, and dates. The second zone is the body zone, which is the main part of the form and generally occupies at least half of the space. This zone consists of captions and areas where variable data is entered.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.5 - Design effective source documents and forms. TOPICS: Source Document and Form Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 14. Which of the statements below about information flow are correct? Choose all that apply. a. Information should flow on a form from left to right. b. Information should flow on a form from right to left. c. Information should flow from top to bottom. d. Information should flow from bottom to top. ANSWER: RATIONALE:

a, c

Information should flow on a form from left to right and top to bottom to match the way users naturally read documents. That layout makes the form easy for the person who completes the form and for users who enter data into the system using the completed form.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.5 - Design effective source documents and forms. TOPICS: Source Document and Form Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 15. Gabriela received a package via a delivery service. When she opens the door, she is required to sign for the

package. From a form standpoint, what zone is the signature in? a. body zone b. signature zone c. authorization zone Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 07 User Interface Design d. required signature zone ANSWER: RATIONALE:

c

The digital form Gabriela signed was located in the authorization zone, which includes required signatures.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.5 - Design effective source documents and forms. TOPICS: Source Document and Form Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 16. The term "garbage in, garbage out" (GIGO) implies that the quality of output from an information system is

directly dependent on the quality of input data. a. true b. false ANSWER: RATIONALE:

a

No matter how data enters an information system, the output quality is only as good as the quality of the input. GIGO is familiar to information technology professionals, who know that the best time to avoid problems is when the data is entered.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.5 - Design effective source documents and forms. TOPICS: Source Document and Form Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 17. Shantae was interning at a company specializing in the development of electronic forms. Her supervisor told

Shantae and her team that they would be working on a new paper form. When Shantae asked, "Why are paper forms still being used? Aren't businesses supposed to go to a paperless office?" she was told that this is not the case. Why are paper forms still in use? Choose all that apply. a. It doesn't cost much to print paper, so there is no reason not to print it out. b. It is portable, convenient, and even necessary in some situations. c. Printed reports are accessible to everyone, especially those with disabilities. d. Many users find it handy to view screen output and print the information they need for a discussion

or business meeting. ANSWER: RATIONALE:

b, d

Although many organizations strive to reduce the flow of paper and printed reports, only some firms have been able to eliminate printed output. Because they are portable, printed reports are convenient and even necessary in some situations and

Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 07 User Interface Design

many users find it handy to view screen output and print the information they need for a discussion or business meeting. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.6 - Explain report design techniques for printed output. TOPICS: Printed Output KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 18. Printing character-based reports on low-speed impact printers is a slow, inexpensive method primarily used

for large-scale reports including inventory reports or registration rosters at a school. a. true b. false ANSWER: RATIONALE:

b

Printing character-based reports on high-speed impact printers is a fast, inexpensive method for producing large-scale reports including payroll, inventory reports, or registration rosters at a school.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.6 - Explain report design techniques for printed output. TOPICS: Printed Output KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 19. Nikki is building a new report template. In the report template, she must put in a control so that when the

value of a field changes, the element causes specific actions, such as printing subtotals for a group of records. What is that control called? a. control field order b. control break report c. command and control d. control break ANSWER: RATIONALE:

d

When the value of a control field such as (Store Number) changes, a control break occurs. A control break usually causes specific actions, such as printing subtotals for a group of records.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.6 - Explain report design techniques for printed output. Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 07 User Interface Design TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Printed Output Bloom's: Remember/Understand 6/18/2024 1:08 PM 6/18/2024 1:08 PM

20. Roman is designing a new report. The report must have an identifier that appears at the beginning of the

report, identifies the report, and contains the report title, date, and other necessary information. What is this identifier called? a. report trailer b. report footer c. report header d. report beginning ANSWER: RATIONALE:

c

The report header, which appears at the beginning of the report, identifies the report and contains the report title, date, and other necessary information.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.6 - Explain report design techniques for printed output. TOPICS: Printed Output KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 21. Which element of the choices below appears at the end of the report and is used to display

grand totals for numeric fields and additional end-of-report details ? a. report footer b. page footer c. report header d. report page break ANSWER: RATIONALE:

a

A report footer appears at the bottom of the page and can include grand totals for numeric fields and additional end-of-report details.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.6 - Explain report design techniques for printed output. TOPICS: Printed Output KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM

Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 07 User Interface Design 22. Jackie was employed by a company to develop a new report. She informed management about her plan and

distributed a questionnaire. Jackie used the answers from the questionnaire to design the report. However, when she presented the design, she discovered it was not well received by the majority of the employees. How could Jackie have made the report design and development stage go more smoothly? a. Jackie should only have spoken to management about what they wanted because managers know

best. b. She should only have spoken to the end users about what they wanted because only end users know best. c. Jackie should have created a mock-up for users to review. People can understand a concept better when they can see (visualize) it. d. She should have used her own ideas for the design rather than the questionnaire responses. ANSWER: RATIONALE:

c

Jackie should create a mock-up. Mock-ups are highly beneficial for designing reports for several reasons including communication, iteration, and experimentation, which saves time and resources during the report designing process. If Jackie had created a mock-up of the report, employees would have had the chance to look at it and make comments and changes since they could get a visual "feel" for the report design. Not having a mock-up resulted in employees using their imagination, leading to misunderstandings and mistakes, which is exactly what happened.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.6 - Explain report design techniques for printed output. TOPICS: Printed Output KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 23. Jude has been hired by a company that uses a different methodology for data entry than what he is

accustomed to. The advantage of this type of data entry is that it offers significant benefits, including immediate validation and data availability. What is this data entry method called? a. group data entry b. batch data entry c. online data entry d. source verification data entry ANSWER: RATIONALE:

c

Although batch input is used in specific situations, most business activity requires online data entry. The online method offers significant advantages, including immediate validation and data availability.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.7 - Discuss output and input technology issues. Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 07 User Interface Design TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Technology Issues Bloom's: Remember/Understand 6/18/2024 1:08 PM 6/18/2024 1:08 PM

24. Heidi is a new employee who has started working in data entry. Her company has recently switched to

online data entry, and she has heard a lot of positive feedback about it. One thing that has caught her attention is data automation, which combines online data entry with automated data capture using various types of input devices. What type of input devices is Heidi referring to? Choose all that apply. a. solid-state drives b. magnetic data strips c. smartphones d. radio-frequency identification (RFID) tags ANSWER: RATIONALE:

b, c, d

Source data automation combines online data entry and automated data capture using input devices including RFID tags, magnetic data strips, or even smartphones. Source data automation is fast and accurate and minimizes human involvement in translation.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.7 - Discuss output and input technology issues. TOPICS: Technology Issues KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 25. A hospital scans the barcode of a patient during their hospital stay. The scan provides information about the

medications the patient is taking, their dosage, and the time they need to be taken. It also gives details about the patient's medical condition for which they are being treated. This technology helps healthcare professionals to quickly and accurately access important information about patients, which can ultimately lead to better patient care. What type of data-driven technology is this? a. bulk rate data planning information security b. online data entry and network infrastructure c. batch input and data communications d. source data automation and network communications ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Many large companies use a combination of source data automation and a robust communication network to instantly manage their global operations. For example, hospitals imprint barcodes on patient identification bracelets and use portable scanners to gather data on patient treatment and medication.

Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 07 User Interface Design LEARNING OBJECTIVES: Tilley.SAD13e.25.7.7 - Discuss output and input technology issues. TOPICS: Technology Issues KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 26. An automobile manufacturer plans to improve driving safety by using gestures as an interface for their

infotainment system. This will involve installing cameras in the car and using artificial intelligence (AI) to interpret hand movements of both the driver and the passenger in order to determine the intended function of the infotainment system. However, one major concern is how to train the system to differentiate between communications between the passenger and driver that are not intended for the infotainment system, to prevent any accidental misinterpretation by the infotainment system. As the system's interface designer, how would you ensure the infotainment system would not misinterpret hand signals most of the time? a. Aim cameras only at the driver and train the system to ignore any commands from the passengers.

The commands will be generated by the sales team for the buyer at the point of sale. b. Allow the user to create their own gestures by giving them a manual on how to train the system. This way, only the driver and their passengers will know the correct signals. c. Train the system so that only certain hand gestures will activate an action, all other hand gestures will be ignored. This will be done from the factory so that all vehicles will have identical functionality. d. Create only minimal hand gestures for specific functions and make all other functions manual. ANSWER: RATIONALE:

c

Train the infotainment system in a way that only specific hand gestures trigger an action. This training should be done during the system's design and programming phase. Such training would address two issues. First, all vehicles would have the same set of tried and tested gestures, which would be recognized by the AI system. Second, it would help with legal liability if the system has undergone thorough training and testing and can be demonstrated in court that the programmed hand signals have been scrutinized and function correctly.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.7 - Discuss output and input technology issues. TOPICS: Technology Issues KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 27. Shaine has the responsibility of managing the data entry department at his company, where 10 data entry

clerks report to him. The supervisor is accountable for implementing input control measures to guarantee data accuracy. Their corporate policy is to utilize a batch input method for data entry. Why is this approach considered beneficial for input control? a. The batch method is good in real-time or near-real-time processing when performance is required. b. The computer can produce an input log file that identifies and documents the data entered. c. Processing a large batch of data requires little computational resources, including memory and Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 07 User Interface Design

processing power, and is good in cases where resources are limited or expensive. d. Batch methods usually process data in chunks or batches, which means there is usually not a delay between data input and processing. For applications requiring immediate feedback or quick response times, such as interactive systems or UIs, batch processing works well. ANSWER: RATIONALE:

b

When using a batch input method, the computer can create a log file that documents the entered data and identifies its source. This creates an audit trail that traces back all data to its source, recording when it entered the system, and also shows who accessed or changed the data and when it was done.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.8 - Describe output and input security and control issues. TOPICS: Control and Security Issues KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 28. A company's data output must be accurate, complete, current, and secure, therefore companies use various

output control methods to maintain output integrity and security. What are some examples of control methods used to achieve this goal? Choose all that apply. a. author's name b. appropriate title c. report number or code d. page nn of nn ANSWER: RATIONALE:

b, c, d

Every report should include an appropriate title, report number or code, printing date, and period covered. Reports should have pages numbered consecutively, identified as "Page nn of nn," and the end of the report should be labeled clearly.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.8 - Describe output and input security and control issues. TOPICS: Control and Security Issues KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 29. Diego is employed by an aerospace company that designs highly classified aircraft for the military. It is

crucial that none of the blueprints, specification sheets, performance parameters, or budget details can be printed and taken off the company's premises. To ensure that these documents remain secure, confidential, and unprintable, what security measure did Diego implement? a. installed diskless workstations Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 07 User Interface Design b. installed thin clients c. turned off all external ports using the Complementary Metal-Oxide-Semiconductor d. installed strict Group Policy Objects so only basic computer functions were authorized ANSWER: RATIONALE:

a

Diego is using diskless workstations for all employees that do not have the proper security clearance. A diskless workstation is a network terminal that supports a fullfeatured UI but limits data printing or copying, except for specific network resources that can be monitored and controlled. This concept typically prevents using portable storage devices like USB thumb drives.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.8 - Describe output and input security and control issues. TOPICS: Control and Security Issues KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 30. When Andy was studying for his Network+ certification exam, he encountered a question that asked him to

differentiate between symmetric and asymmetric encryption. What is the difference between symmetric and asymmetric encryption? Choose all that apply. a. Symmetric encryption uses one key for encryption and decryption. b. Asymmetric encryption uses different keys for encryption and decryption. c. Symmetric encryption uses different keys for encryption and decryption. d. Asymmetric encryption uses one key for encryption and decryption. ANSWER: RATIONALE:

a, b

Encryption techniques vary in complexity and application, ranging from symmetric encryption, where the same key is used for encryption and decryption, to asymmetric encryption, which uses different keys for each process.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.8 - Describe output and input security and control issues. TOPICS: Control and Security Issues KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 31. Lloyd is an information security specialist whose responsibility is to ensure that hospitals and medical

corporations comply with the regulations of the Department of Health and Human Services when securing their data. Currently, he is working with a large medical group that operates 20 hospitals in 20 states. Lloyd's primary task is to identify the most effective way to protect patient data from physical attacks and unauthorized access. He is looking for the best authentication method for securing data and tracking who has access. There is no perfect method, but one is better than the others at tracking who has access, when they had access, and where Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 07 User Interface Design

they had access. Which authentication method would you suggest to Lloyd? a. passwords b. biometrics c. SMS authentication d. two-factor authentication ANSWER: RATIONALE:

d

With two-factor authentication, a person has two layers of security with them: a password and a key card. You would need both to open any file in the organization. There would also be an audit trail as to where you were, what time, and what date it was when you opened the file. Anyone who did not have prior authorization to login to a file will be flagged in an audit file for further investigation.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.8 - Describe output and input security and control issues. TOPICS: Control and Security Issues KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 32. Marco and his team are currently in the low-fidelity prototyping phase for an interface they are creating for a

large fast-food chain. They have recently completed inputting the user data into the system, including the performance parameters that the new system should meet and what they did not like with the existing system. Marco, his team, and the company consider themselves in the early stages of low-fidelity prototyping. What is the purpose of low-fidelity prototyping? a. It provides a realistic experience of how the interface will function in the real world. b. It produces a full-featured information system model by adding advanced interactivity, animations,

and transitions that mimic the software application's or website's actual behavior. c. It is a polished and interactive representation of the final product. d. It is beneficial for facilitating early discussions, gathering initial feedback, and verifying user requirements. ANSWER: RATIONALE:

d

This type of prototyping is beneficial for facilitating early discussions, gathering initial feedback, and verifying user requirements. The end product is a user-approved model that documents and benchmarks the features of the finished system. Design prototyping makes it possible to capture user input and approval while continuing to develop the system within the framework of the systems development life cycle.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.9 - Explain emerging user interface trends. TOPICS: Emerging Trends KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 07 User Interface Design DATE CREATED: DATE MODIFIED:

6/18/2024 1:08 PM 6/18/2024 1:08 PM

33. Elan was not fond of the process of prototyping, as she believed it consumed too much time and did not

ultimately deliver what the customer had requested. Although she was open-minded about it, she had her reasons why she did not like it. What were some of the drawbacks that Elan likely experienced with prototyping? Choose all that apply. a. Low-fidelity prototypes, such as paper sketches or basic wireframes, often fail to convey the actual

look and feel of the final product. b. Creating high-fidelity or interactive prototypes can be time-consuming and resource intensive. c. Prototyping does not allow designers to identify and rectify design flaws and usability issues until further along in development. d. Prototypes, even interactive ones, are not often built using the same code or technology that will be used in the final product. ANSWER: RATIONALE:

a, b, d

There are some drawbacks to prototyping that should be considered. Low-fidelity prototypes, such as paper sketches or basic wireframes, may not accurately convey the final product's look and feel. On the other hand, creating high-fidelity or interactive prototypes can be a time-consuming and resource-intensive process. Prototypes, even interactive ones, may not align perfectly with the final implementation since they are not often built using the same code or technology that will be used in the final product.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.9 - Explain emerging user interface trends. TOPICS: Emerging Trends KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 34. Amber enjoys the process of prototyping as she's found it to be a creative task of fulfilling customer

requests, provided the appropriate feedback was obtained. She became the company expert on designing prototypes and was the go-to person for building them. What are some of the benefits Amber likely sees in prototyping? Choose all that apply. a. Prototypes provide a tangible representation of the final product, which helps engage users early in

the design process. b. Prototypes are great for user testing and gathering feedback, and they provide accurate data about user behavior or real-life interaction. c. Prototypes are visual and interactive tools that facilitate better communication among team members, stakeholders, and clients. d. Prototypes enable rapid iteration and experimentation with different design ideas and approaches. Designers can quickly create, test, modify, and retest different interface versions. ANSWER:

a, c, d

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 07 User Interface Design RATIONALE:

Prototyping offers numerous benefits. First, prototypes provide a tangible representation of the final product, which helps to engage users early on in the design process. Second, prototypes are visual and interactive tools that facilitate better communication among team members, stakeholders, and clients. Third, prototypes enable rapid iteration and experimentation with different design ideas and approaches. Designers can quickly create, test, modify, and retest different interface versions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.9 - Explain emerging user interface trends. TOPICS: Emerging Trends KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 35. Hunter is an employee at a major manufacturer of wearable devices, whose products are designed to work

with various Android and iOS platforms, such as phones, tablets, laptops, and desktops. One of the latest features of these devices is the ability to automatically customize the displayed data based on the user's location, activity, and heart rate. Additionally, the associated app allows users to access these features across any device that the app is installed on. These new wearables are part of a larger ecosystem of devices and services that require UI designs to facilitate seamless interaction and data synchronization across different platforms. What are some of the most important aspects of these devices? Choose all that apply. a. attractive design b. glanceable interface c. user awareness d. context awareness ANSWER: RATIONALE:

b, d

Wearable devices have become very popular for users who are always on the go. As a result, it has become necessary to develop interfaces that can deliver information quickly and efficiently. These interfaces are often referred to as "glanceable" interfaces, as they allow users to quickly absorb the necessary information without having to go through detailed interactions. It is also important that these devices are context-aware and present relevant information based on the user's current activity or location. For instance, during a run, it should display workout statistics and, when it is almost time for a scheduled appointment, it should remind the user of the meeting.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.7.9 - Explain emerging user interface trends. TOPICS: Emerging Trends KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM Copyright Cengage Learning. Powered by Cognero.

Page 18


Ch 07 User Interface Design

Copyright Cengage Learning. Powered by Cognero.

Page 19


Ch 08 Data Design 1. Mae's company is switching to a database management system (DBMS) from their old file-oriented system.

She is hesitant about learning a new system, but her supervisor says it will be much easier to work with than the old file-oriented system. What are some of the advantages of using a DBMS? Choose all that apply. a. increased data redundancy b. scalability c. economy of scale d. improved security ANSWER: RATIONALE:

b, c, d

DBMS offers scalability as it refers to the ability of a system to be easily expanded, modified, or downsized as per the changing needs of a business enterprise. It offers economy of scale, as database design enables better utilization of hardware. For instance, if a company maintains an enterprise-wide database, processing is less expensive using powerful servers and communication networks. Furthermore, database design also offers improved security since the database administrator (DBA) can define authorization procedures to ensure that only authorized users can access the database. Additionally, the DBA can also allow different users to have different levels of access, thereby enhancing the security of the database.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.1 - Explain basic data design concepts, including data structures, database management systems, and the evolution of the relational database model. TOPICS: Data Design Concepts KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 2. Emie was recently promoted to the role of database administrator (DBA) in her company. As a DBA, she has

many responsibilities. What are some of them? Choose all that apply. a. The DBA writes custom applications to enhance the operation of the database as needed. b. The DBA provides end-user support for applications or systems that utilize the database. c. The DBA assesses overall requirements and maintains the database for the benefit of the entire

organization. d. Effective database administration also helps ensure that data names, formats, and documentation standards are followed uniformly throughout the organization. ANSWER: RATIONALE:

c, d

POINTS: QUESTION TYPE:

1 Multiple Response

The role of a database administrator (DBA) is to evaluate the overall requirements of an organization and maintain the entire database, not just for a single department or user. Effective database administration ensures that the naming conventions, data formats, and documentation standards are followed consistently throughout the organization. This helps to improve the overall efficiency and accuracy of data management.

Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 08 Data Design HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.1 - Explain basic data design concepts, including data structures, database management systems, and the evolution of the relational database model. TOPICS: Data Design Concepts KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 3. DBMSs are designed to allow multiple users simultaneous access without interfering with each other. What is

the term for the mechanism that enables simultaneous access? a. data redundancy b. data concurrency c. data sharing d. data duplication ANSWER: RATIONALE:

b

DBMSs are designed to allow multiple users simultaneous access without interfering with each other. This is known as concurrency. Concurrency control mechanisms ensure that transactions are processed reliably and users can access data in a consistent state, even when multiple users are working with the same data at the same time.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.1 - Explain basic data design concepts, including data structures, database management systems, and the evolution of the relational database model. TOPICS: Data Design Concepts KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 4. Adam's company is currently using a smaller, more flexible data management system, but they believe it

could be improved. They are hesitant to invest in a full-fledged DBMS system due to its high cost and complexity. What would be a good compromise between the two options? a. client/server b. peer-to-peer c. ad hoc d. host-to-host ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE:

1 Multiple Choice

The compromise is often a client/server design, where processing is shared among several computers. As with many design decisions, the best solution depends on the organization's needs and circumstances.

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 08 Data Design HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.1 - Explain basic data design concepts, including data structures, database management systems, and the evolution of the relational database model. TOPICS: Data Design Concepts KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 5. A data management language (DML) controls database operations, including storing, retrieving, updating,

and deleting data. a. true b. false ANSWER: RATIONALE:

a

A data manipulation language (DML) controls database operations, including storing, retrieving, updating, and deleting data. Most commercial DBMSs, such as Oracle and IBM's DB2, use a DML. Some database products, such as Microsoft Access, also provide an easy-to-use graphical environment that enables users to control operations with menu-driven commands.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.2 - Explain the main components of a database management system. TOPICS: DBMS Components KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 6. Lani and her team have recently completed the assembly of the data dictionary for their latest DBMS project.

The next step in the process is to transform this data dictionary into the actual DBMS. What is some of the information that can be found at this stage of the development process? Choose all that apply. a. data manipulation language b. schema c. data sharing tools d. subschemas ANSWER: RATIONALE:

b, d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

The data dictionary is transformed into a physical data repository containing the schema and subschemas at this stage of the systems development process. The physical repository might be centralized, or it might be distributed at several locations. In addition, the stored data might be managed by a single DBMS or several systems.

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 08 Data Design LEARNING OBJECTIVES: Tilley.SAD13e.25.8.2 - Explain the main components of a database management system. TOPICS: DBMS Components KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 7. How are potential database connectivity and access problems resolved? Choose all that apply. a. by using ODBC-compliant software that enables communication among various systems and DBMSs b. by making sure to use only products that are cross compatible c. by using JDBC, or Java database connectivity software; JDBC enables Java applications to exchange

data with any database that uses SQL statements and is JDBC-compliant d. ensuring that all data entered into the database complies with all database management protocols ANSWER: RATIONALE:

a, c

In order to avoid any issues related to accessing and communicating with databases, businesses use ODBC-compliant software. This software allows different systems and DBMSs to interact through an industry-standard protocol called open database connectivity (ODBC). ODBC enables software from different vendors to exchange data with one another. Another widely used standard is called JDBC, or Java database connectivity. It allows Java applications to communicate with any database that uses SQL statements and is JDBC-compliant.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.2 - Explain the main components of a database management system. TOPICS: DBMS Components KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 8. A DBMS can support several related information systems that provide input to and require specific data from

the DBMS. Human intervention is necessary for two-way communication between the DBMS and the related systems. a. true b. false ANSWER: RATIONALE:

b

A DBMS can support several related information systems that provide input to and require specific data from the DBMS. Unlike a user interface, no human intervention is necessary for two-way communication between the DBMS and the related systems.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.2 - Explain the main components of a database management system. TOPICS: DBMS Components Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 08 Data Design KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:08 PM 6/18/2024 1:08 PM

9. Alain's company is collaborating with a new vendor who is introducing a web-based database management

system (DBMS) throughout the company. The advantage of a web-based DBMS is that it only requires a web browser and an Internet connection. However, Alain is not familiar with how web-based DBMS works. He knows that databases are created and managed using various languages and commands that have nothing to do with HTML. So, he asks the vendor how the DBMS and the website will communicate since they cannot communicate using HTML. How do the Internet and a DBMS work together? a. JavaScript allows the web and DBMS to integrate different applications and allows them to exchange

data. b. Ruby allows the web and DBMS to integrate different applications and allows them to exchange data. c. End-to-end ware integrates different applications and allows them to exchange data. d. Middleware integrates different applications and allows them to exchange data. ANSWER: RATIONALE:

d

In order for the web and the DBMS to work together, it is necessary to use middleware, which is software that integrates different applications and allows them to exchange data.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.3 - Define the significant characteristics of web-based design. TOPICS: Web-Based Design KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 10. Internet technology provides enormous power and flexibility for DBMS because the related information

system is not tied to any specific combination of hardware and software. a. true b. false ANSWER: RATIONALE:

a

In a web-based design, the Internet serves as the front end, or interface, for the DBMS. Internet technology provides enormous power and flexibility for DBMS because the related information system is not tied to any specific combination of hardware and software.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.3 - Define the significant characteristics of web-based design. TOPICS: Web-Based Design Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 08 Data Design KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:08 PM 6/18/2024 1:08 PM

11. A customer, order, product, or supplier can be described as what type of data design term? a. table or file b. field c. record d. entity ANSWER: RATIONALE:

d

A CUSTOMER, ORDER, PRODUCT, or SUPPLIER can be described as an entity that is a person, place, thing, or event for which data is collected and maintained.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.4 - Define data design terminology. TOPICS: Data Design Terms KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 12. Depending on the required information, a record may have one or many fields. What refers to a collection of

fields that defines a single occurrence of an entity, such as one customer, one order, or one product? a. record/tuple b. field c. table d. file ANSWER: RATIONALE:

a

A record, also known as a tuple, is a collection of related fields that describes a single instance or occurrence of an entity. For example, a record might represent a single customer, one order, or one product, depending on the required information. A record can contain one to dozens of fields.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.4 - Define data design terminology. TOPICS: Data Design Terms KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 13. In database design, these fields are critical for ensuring data integrity and optimizing database performance.

They are used to organize, access, and maintain data structures. What are these fields called? Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 08 Data Design a. primary key b. record c. concatenated key d. key fields ANSWER: RATIONALE:

d

In database design, key fields, also known as keys, are critical for ensuring data integrity and optimizing database performance. They are used to organize, access, and maintain data structures.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.4 - Define data design terminology. TOPICS: Data Design Terms KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 14. This key is an artificial key introduced in a table to identify a row uniquely. It is not derived from

application data and is often used as a primary key. These are typically sequential numbers (like an ID) used when no natural primary key is present. What is this key? a. composite key b. concatenated key c. surrogate key d. combination key ANSWER: RATIONALE:

c

A surrogate key is an artificial key introduced in a table to identify a row uniquely. It is not derived from application data and is often used as a primary key. These are typically sequential numbers (like an ID) used when no natural primary key is present.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.4 - Define data design terminology. TOPICS: Data Design Terms KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 15. This key is a field (or combination of fields) that uniquely identifies each record in a table. Each table can

have only one of these keys and cannot contain null values. These keys ensure that each record is unique and easily identifiable. What type of key is it? a. composite key Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 08 Data Design b. primary key c. secondary key d. concatenated key ANSWER: RATIONALE:

b

A primary key is a field (or combination of fields) that uniquely identifies each record in a table. Each table can have only one primary key and cannot contain null values. Primary keys ensure that each record is unique and easily identifiable.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.4 - Define data design terminology. TOPICS: Data Design Terms KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 16. This key is a set of one or more columns that can uniquely identify a record in a table. It may include

additional columns that are not necessary for unique identification. Every table can have multiple such keys, and each key can contain other attributes beyond what is required to identify a record uniquely. a. candidate key b. unique key c. primary key d. super key ANSWER: RATIONALE:

d

A super key is a set of one or more columns that can uniquely identify a record in a table. A super key may include additional columns that are not necessary for unique identification. Every table can have multiple super keys, and each super key can contain other attributes beyond what is required to identify a record uniquely.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.4 - Define data design terminology. TOPICS: Data Design Terms KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 17. An entity-relationship diagram (ERD) is a visual tool used in database design to represent the relationships

between different data attributes in a system. a. true b. false ANSWER:

b

Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 08 Data Design RATIONALE:

An entity-relationship diagram (ERD) is a visual tool used in database design to represent the relationships between different data entities in a system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.5 - Draw entity-relationship diagrams. TOPICS: Entity-Relationship Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 18. In an entity-relationship diagram (ERD), what represent a real-world object or concept with stored data?

They are typically depicted as rectangles and might represent tangible objects. a. attributes b. relationships c. entities d. transactions ANSWER: RATIONALE:

c

In an ERD, an entity represents a real-world object or concept with stored data. Entities are typically depicted as rectangles and might represent tangible objects.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.5 - Draw entity-relationship diagrams. TOPICS: Entity-Relationship Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 19. In an entity-relationship diagram (ERD), these are properties or characteristics of an entity, and they are

often shown as ovals connected to their respective entity. What are they? a. entity b. attributes c. relationships d. transactions ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE:

1 Multiple Choice

Attributes are properties or characteristics of an entity in an entity-relationship diagram (ERD). For example, an "Employee" entity might have EmployeeID, Name, and Address attributes. In ERDs, attributes are often shown as ovals connected to their respective entity.

Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 08 Data Design HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.5 - Draw entity-relationship diagrams. TOPICS: Entity-Relationship Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 20. What is the word used to describe the numeric relationship between two entities that shows how instances of

one entity relate to another? For example, one customer can have one order, many orders, or none, but each order can have one and only one customer. a. relationship b. entity c. cardinality d. attribute ANSWER: RATIONALE:

c

Cardinality describes the numeric relationship between two entities and shows how instances of one entity relate to another. For example, consider the relationship between two entities: CUSTOMER and ORDER. One customer can have one order, many orders, or none, but each order can have one and only one customer.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.5 - Draw entity-relationship diagrams. TOPICS: Entity-Relationship Diagrams KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 21. Data normalization is a process in database design used to organize data to reduce redundancy and

dependency, thereby increasing data relationships. a. true b. false ANSWER: RATIONALE:

b

Data normalization is a process in database design used to organize data to reduce redundancy and dependency, thereby increasing data integrity.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.6 - Apply data normalization. TOPICS: Data Normalization KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 08 Data Design 22. The normalization process typically involves how many stages? a. 1 b. 2 c. 3 d. 4 ANSWER: RATIONALE:

d

The normalization process typically involves four stages: unnormalized design, first normal form, second normal form, and third normal form (3NF). The three normal forms constitute a progression in which 3NF represents the best design.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.6 - Apply data normalization. TOPICS: Data Normalization KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 23. During the process of data design, it is important for the analyst to identify a particular group of fields that

occur frequently. This group comprises one or more fields that can appear any number of times within a single record, and each occurrence can have different values. What is this group called? a. reoccurring group b. repetitive group c. repeating group d. reorganizing group ANSWER: RATIONALE:

c

During data design, the analyst must recognize a repeating group of fields. A repeating group is a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.6 - Apply data normalization. TOPICS: Data Normalization KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 24. What is a table design that contains a repeating group called? a. unnormalized b. normalized Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 08 Data Design c. standardized d. non-standardized ANSWER: RATIONALE:

a

A table design that contains a repeating group is called unnormalized. The standard notation method for representing an unnormalized design is to enclose the repeating group of fields within a second set of parentheses. An example of an unnormalized table looks like this: NAME (FIELD 1, FIELD 2, FIELD 3, (REPEATING FIELD 1, REPEATING FIELD 2))

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.6 - Apply data normalization. TOPICS: Data Normalization KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 25. How can a first normal form (1NF) design automatically be considered a 2NF? a. If the entire primary key consists of three fields, the 1NF table with a triple-field primary key is

automatically in 2NF. b. If the entire primary key consists of only two fields, the 1NF table with a double-field primary key is automatically in 2NF. c. If the entire primary key consists of only one field, the 1NF table with a single-field primary key is automatically in 2NF. d. If the entire primary key consists of only two fields, the 1NF table with the same single-field primary key is automatically in 2NF. ANSWER: RATIONALE:

c

If a 1NF design has a primary key that consists of only one field, the problem of partial dependence does not arise-because the entire primary key is a single field. Therefore, a 1NF table with a single-field primary key is automatically in 2NF.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.6 - Apply data normalization. TOPICS: Data Normalization KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 26. In data design, a code is a set of letters and numbers encapsulating specific information in a standardized

format. a. true b. false Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 08 Data Design ANSWER: RATIONALE:

a

In data design, a code is a set of letters and numbers encapsulating specific information in a standardized format. Codes can be used to simplify input, output, and data formats. Codes are crucial in organizing, managing, and utilizing data efficiently.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.7 - Utilize codes to simplify output, input, and data formats. TOPICS: Codes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 27. What codes use groups of numbers for different classifications? For example, college course numbers are

usually assigned using these codes. The 100-level courses, such as Chemistry 110 and Mathematics 125, are freshman-level, whereas course numbers in the 200s usually indicate sophomore-level courses. a. block sequence codes b. sequence codes c. derivation codes d. significant digit codes ANSWER: RATIONALE:

a

Block sequence codes use blocks of numbers for different classifications. For example, college course numbers are usually assigned using a block sequence code. The 100-level courses, such as Chemistry 110 and Mathematics 125, are freshmanlevel, whereas course numbers in the 200s usually indicate sophomore-level courses.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.7 - Utilize codes to simplify output, input, and data formats. TOPICS: Codes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 28. What code type combines data from different item attributes or characteristics? Most magazine subscription

codes use this type of code. a. block sequence codes b. derivation codes c. alphabetic codes d. significant digit codes ANSWER: RATIONALE:

b

Derivation codes combine data from different item attributes or characteristics. Most

Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 08 Data Design

magazine subscription codes are derivation codes. For example, one popular magazine uses a subscriber's five-digit postal code, followed by the first, third, and fourth letters of the subscriber's last name, the last two digits of the subscriber's house number, and the first, third, and fourth letters of the subscriber's street name. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.7 - Utilize codes to simplify output, input, and data formats. TOPICS: Codes KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 29. Yedarm recently joined a Fortune 500 company as a marketing manager. In his previous job, he had to

gather marketing data from multiple online databases and in-house systems, but none of them were interconnected. This made it very challenging for him to analyze the data and develop effective marketing strategies. However, in his new job, he has access to a data warehouse that provides him with accurate and upto-date information about potential customers. What are some benefits to using data warehousing versus individual data gathering services? a. Centralizing sensitive data in a data warehouse decreases the risk of security breaches. b. Rather than accessing separate systems, the data warehouse stores transaction data in a format that

allows Yedarm to retrieve and analyze the data quickly. c. Building and managing a data warehouse typically does not require much expertise from IT professionals. d. Once a data warehouse is established, making significant changes to its structure or data model is easy. ANSWER: RATIONALE:

b

Yedarm can extract data that spans several information systems and time frames. Rather than accessing separate systems, the data warehouse stores transaction data in a format that allows him to retrieve and analyze the data quickly.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.8 - Explain data storage tools and techniques. TOPICS: Data Storage and Access KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 30. This is a true story about 16-year-old Gina (not her real name) who frequently shopped at a major retail

chain. She often used her membership card to avail discounts on purchased items as well as coupons that she could use later. One day, her father came across a mailer that congratulated Gina on her pregnancy. Due to Gina's age, her father was shocked and upset. When Gina returned home from school, her father showed her the mailer, and she too was surprised. Gina had her suspicions, but she was scared to tell her father. So, she went to her doctor to be tested, and unfortunately, the results confirmed that she was indeed pregnant. The major retailer Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 08 Data Design

knew she was pregnant before she did. What type of data mining is this called? a. sociodemographic analytics b. customer segmentation c. predictive analytics d. market basket analysis ANSWER: RATIONALE:

d

Market basket analysis: This involves analyzing purchase patterns to understand the relationships between products that customers buy. Market basket analysis helps identify cross-selling and upselling opportunities by revealing which products are frequently bought together. This information is crucial for strategic product placement, promotions, and inventory management decisions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.8 - Explain data storage tools and techniques. TOPICS: Data Storage and Access KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 31. Brian works for a brand analytics consulting firm that studies people's opinions about the brands they

purchase by mining data from social media, reviews, and customer feedback. What type of data mining is this? a. customer lifetime value (CLV) prediction b. customer segmentation c. sentiment analysis d. predictive analytics ANSWER: RATIONALE:

c

Sentiment analysis: Marketers can gauge public sentiment toward their brand or products by mining data from social media, reviews, and customer feedback. This is invaluable for managing brand reputation, addressing customer concerns, and understanding the impact of marketing campaigns.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.8 - Explain data storage tools and techniques. TOPICS: Data Storage and Access KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 32. What type of data mining analysis is conducted to identify warning signs that a customer is likely to stop

using a company's products or services? Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 08 Data Design a. churn analysis b. sentiment analysis c. customer lifetime value (CLV) predictions d. market basket analysis ANSWER: RATIONALE:

a

Churn analysis helps identify the warning signs that a customer is likely to stop using a company's products or services. Businesses can develop targeted retention strategies by understanding the factors contributing to customer churn.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.8 - Explain data storage tools and techniques. TOPICS: Data Storage and Access KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 33. Which data code uses 2 bytes per character rather than one and represents more than 65,000 unique

multilingual characters? a. ASCII b. EBCDIC c. Binary d. Unicode ANSWER: RATIONALE:

d

Unicode is a more recent coding standard that uses 2 bytes per character rather than one. This expanded scheme enables Unicode to represent more than 65,000 unique, multilingual characters. Why is this important? Consider the challenge of running a multinational information system or developing a program that will be sold in Asia, Europe, and North America. Since it supports virtually all languages, Unicode has become a global standard.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.8 - Explain data storage tools and techniques. TOPICS: Data Storage and Access KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 34. Chrystal has recently been promoted to a new position in her company that requires her to access more

secure files than she previously did. Therefore, IT will need to change her access level. What is the term used to describe granting or revoking access privileges? a. access control list Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 08 Data Design b. controls c. permissions d. directory listing ANSWER: RATIONALE:

c

Different privileges, also called permissions, can be associated with different users so that some employees can be limited to read-only access. In contrast, other users might be allowed to update or delete data. Additional access codes can be established for sensitive data, restricting specific records or fields within records.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.9 - Explain data control measures. TOPICS: Data Control KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM 35. In order to prevent the loss of data, what must be performed and then tested to ensure no data corruption? a. backup b. data deduplication c. data inventory d. data mining ANSWER: RATIONALE:

a

It's important to regularly back up all system files and databases and keep copies of them for a set amount of time. After backing up the data, it is necessary to test the latest backup to make sure that none of the information was damaged during the backup process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.8.9 - Explain data control measures. TOPICS: Data Control KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:08 PM DATE MODIFIED: 6/18/2024 1:08 PM

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 09 System Architecture 1. What are the terms used to describe a system's ability to expand, change, or downsize to meet the changing

needs of a business? Choose all that apply. a. flexibility b. scalability c. stretchability d. extensibility ANSWER: RATIONALE:

b, d

Scalability, sometimes also called extensibility, refers to a system's ability to expand, change, or downsize to meet the changing needs of a business enterprise. Scalability is crucial in implementing volume-related systems, such as transaction processing systems. A scalable system is necessary to support a dynamic, growing business.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.1 - Provide a checklist of issues to consider when selecting a system architecture. TOPICS: Architecture Checklist KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 2. Jayme's company is starting a new e-commerce strategy by building a new system design with core

functionalities and services built around web technologies and Internet protocols. These technologies are central to the system's operation, facilitating communication, data exchange, and application delivery. What is the term for building a company's strategy based on Internet-based technologies? a. data-centric architecture b. Internet-centric architecture c. application-centric architecture d. web-centric architecture ANSWER: RATIONALE:

d

A web-centric architecture is a system design with core functionalities and services built around web technologies and Internet protocols. This enables a company to integrate the new application into its e-commerce strategy.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.1 - Provide a checklist of issues to consider when selecting a system architecture. TOPICS: Architecture Checklist KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 09 System Architecture 3. What are the reasons that legacy systems continue to exist even after newer systems have been installed?

Choose all that apply. a. ease of use b. high costs c. risks d. complexities ANSWER: RATIONALE:

b, c, d

Legacy systems typically persist due to the high costs, risks, and complexities involved in replacing or upgrading them and the potential disruption to business operations.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.1 - Provide a checklist of issues to consider when selecting a system architecture. TOPICS: Architecture Checklist KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 4. Romero's company is in the process of adopting a web-based enterprise resource planning (ERP) system.

While there are many benefits, there are additional security concerns that need to be addressed since the system will be operating in an Internet environment. What are the internal security concerns that must be considered when transitioning to a web-based business management system? Choose all that apply. a. enforcing resource usage policies b. identifying and mitigating vulnerabilities c. identifying system limitations d. enforcing data integrity ANSWER: RATIONALE:

b, d

A well-designed architectural framework integrates security considerations from the onset, embedding them into every system layer from hardware and network infrastructure to software applications and data management. This approach ensures that security is not an afterthought but a core component of the system's design, facilitating identifying and mitigating vulnerabilities, enforcing data integrity, and maintaining confidentiality and availability of services. By prioritizing security in the architectural design, organizations can effectively safeguard against potential threats and cyberattacks, ensuring a resilient and secure environment for their operations and data.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.1 - Provide a checklist of issues to consider when selecting a system architecture. Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 09 System Architecture TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Architecture Checklist Bloom's: Remember/Understand 6/18/2024 1:09 PM 6/18/2024 1:09 PM

5. Waverly was an employee at a small psychiatric office where the doctor provided services to a select few

famous individuals. The reason for this was that the office did not advertise and maintained a high level of discretion to protect the privacy of celebrities. However, one day, Waverly's friend visited the office and asked her if any famous people were being treated by the doctor. Without thinking, Waverly informed her friend that some celebrities were indeed patients of the doctor and even went on to disclose their identities. Unfortunately, the next day, the news broke that these celebrities were receiving psychiatric care, which led to their privacy being violated. What law did Waverly break? a. Health Insurance Portability and Accountability Act (HIPAA) b. General Data Protection Regulation (GDPR) c. The Sarbanes-Oxley Act (SOX) d. Computer Fraud and Abuse Act (CFAA) ANSWER: RATIONALE:

a

Since Waverly was employed by a psychiatric office, any data generated and stored is protected by the Health Insurance Portability and Accountability Act (HIPAA). Failure to comply with laws like HIPAA can have serious consequences for an organization. It may result in significant legal penalties, such as fines and sanctions, which can cause financial harm. In addition to the direct financial impact, noncompliance can also damage an organization's reputation and diminish customer trust, and since Waverly shared the information, she could lose her job.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.1 - Provide a checklist of issues to consider when selecting a system architecture. TOPICS: Architecture Checklist KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 6. What are the main functions that every business information system must carry out? Choose all that apply. a. provide an interface that allows users to interact with the system b. handle data storage and access c. determine whether the function is performed on the server or the client d. manage applications that perform the processing logic ANSWER: RATIONALE:

a, b, d

Every business information system needs to perform three main functions: managing applications that perform the processing logic, handling data storage and access, and providing an interface that enables users to interact with the system. Depending on the system architecture, these functions can be performed on a server, a client, or split

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 09 System Architecture

between the two. During system design, the analyst needs to decide where these functions will be carried out and determine the advantages and disadvantages of each design approach. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.2 - Trace the evolution of system architecture from mainframes to current designs. TOPICS: The Evolution of System Architecture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 7. A client is a computer that supplies data, processing services, or other support to one or more computers,

called servers. a. true b. false ANSWER: RATIONALE:

b

A server is a computer that supplies data, processing services, or other support to one or more computers, called clients.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.2 - Trace the evolution of system architecture from mainframes to current designs. TOPICS: The Evolution of System Architecture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 8. "Client/server" refers to systems that divide processing between one or more networked servers and a central

client. a. true b. false ANSWER: RATIONALE:

b

"Client/server" refers to systems that divide processing between one or more networked clients and a central server.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.3 - Explain client/server architecture. TOPICS: Client/Server Architecture KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 09 System Architecture DATE CREATED: DATE MODIFIED:

6/18/2024 1:09 PM 6/18/2024 1:09 PM

9. Elan's company is upgrading from a peer-to-peer network to a client/server network, and their supervisor is

providing a training session to explain how the new system will work. During the session, Elan asks how they access data that is not stored on their client. How does the supervisor answer? Choose all that apply. a. In a client/server interaction, the client submits a request for information from the server, which

carries out the operation and responds to the client. b. In a client/server interaction, servers initiate communication with clients by submitting a request for information. c. The data file is not transferred from the server to the client-only the request and the result are transmitted across the network. This process is transparent to the client. d. The data file is transferred from the server to the client. ANSWER: RATIONALE:

a, c

In a client/server interaction, the client submits a request for information from the server, which carries out the operation and responds to the client. The data file is not transferred from the server to the client-only the request and the result are transmitted across the network. To fulfill a request from a client, the server might contact other servers for data or processing support, but that process is transparent to the client.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.3 - Explain client/server architecture. TOPICS: Client/Server Architecture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 10. The point at which client/server response times sharply increase as more requests are made but then rise

dramatically when the system nears its capacity, is known as the "knee of the curve." How can acceptable performance be maintained so that this point is not reached? Choose all that apply. a. anticipate the number of buildings b. anticipate the number of users c. anticipate network traffic d. anticipate server size and location ANSWER: RATIONALE:

b, c, d

To deliver and maintain acceptable performance, system developers must anticipate the number of users, network traffic, and server size and location to design a client/server architecture that can support current and future business needs.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.3 - Explain client/server architecture. Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 09 System Architecture TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Client/Server Architecture Bloom's: Remember/Understand 6/18/2024 1:09 PM 6/18/2024 1:09 PM

11. In the three-tier client/server architecture, the user interface runs on the client, while the data is stored on the

server, just like in the two-tier client/server design. However, there is a distinguishing factor that sets the threetier architecture apart from the two-tier client/server architecture. What is it? a. the transport layer, which can be considered the Internet layer b. the data storage layer, which can be considered a data access layer c. the middle layer, which can be considered an application server d. the presentation layer, which can be considered an interface layer ANSWER: RATIONALE:

c

In a three-tier design, the user interface runs on the client, and the data is stored on the server, just as in a two-tier design. A three-tier design also has a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server. The middle layer can be considered an application server because it provides the application logic, or business logic, required by the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.3 - Explain client/server architecture. TOPICS: Client/Server Architecture KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 12. Why can middleware be considered the slash in the term "client/server"? Choose all that apply. a. Middleware acts as a bridge between client and server. b. There are various types of middleware available to improve the functionality of client/server

architecture. c. Middleware typically implements the business logic of an application. d. Middleware is responsible for managing data storage or persistence. ANSWER: RATIONALE:

a, b

POINTS:

1

Middleware acts as a bridge between the client and the server. There are several middleware options available to enhance the role of client/server architecture, depending on the required functionality: message-oriented middleware (MOM), which manages the sending and receiving of messages between distributed systems; web middleware, which handles web-based interactions; and transaction-processing monitors (TPMs), which are another type, ensures reliable transaction processing across multiple networked resources.

Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 09 System Architecture QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.3 - Explain client/server architecture. TOPICS: Client/Server Architecture KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 13. Shifting the responsibility for the interface from the client to the server simplifies data transmission and

results in lower hardware cost and complexity. a. true b. false ANSWER: RATIONALE:

a

Internet-based system architecture refers to the design and structure of systems that operate over the Internet, leveraging its global connectivity to deliver services and functionalities. Shifting the responsibility for the interface from the client to the server simplifies data transmission and results in lower hardware cost and complexity.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.4 - Describe the impact of the Internet on system architecture. TOPICS: The Impact of the Internet KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 14. What is a form of social collaboration that is a web-based repository of information that anyone can access,

contribute to, or modify? a. blog b. vlog c. wiki d. post ANSWER: RATIONALE:

c

A wiki is a web-based repository of information that anyone can access, contribute to, or modify. In a sense, a wiki represents the collective knowledge of a group of people. One of the best-known wikis is Wikipedia.org, but smaller-scale wikis proliferate at businesses, schools, and other organizations that need to compile and share information.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.4 - Describe the impact of the Internet on system architecture. Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 09 System Architecture TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

The Impact of the Internet Bloom's: Remember/Understand 6/18/2024 1:09 PM 6/18/2024 1:09 PM

15. Jill has Microsoft 365. She pays monthly subscription for the service because she's been using Microsoft

Office for years and doesn't want to change. What are some of the benefits of this cloud version of Microsoft Office? Choose all that apply. a. Each time a new version of Office is released, Jill will have the new version without having to pay

for an upgrade. b. A monthly bill is cheaper than a one-time charge that can be in the hundreds of dollars. c. It is a software-as-a-service (SaaS) application, so the product is always updated automatically. d. Software-as-a-service is always on, so she has access to it at all times, just like if it were running on her local computer. ANSWER: RATIONALE:

a, c

Since it is a software-as-a-service (Saas) application, the product is always updated automatically so Jill will have the new version without having to pay for an upgrade.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.4 - Describe the impact of the Internet on system architecture. TOPICS: The Impact of the Internet KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 16. Sheila is a sales manager at her company. The company has provided her with a laptop that enables her to

stay connected with customers, take notes on them, generate invoices, and explore potential customers from any location without having to pick up a phone. What type of program is Sheila using? a. cloud-based b. host-based c. hybrid d. enterprise-based over a virtual private network (VPN) ANSWER: RATIONALE:

a

Sheila is using a cloud-based sales management platform that allows her to have access to all her company's sales information including contacts, purchases, and potential leads, as well as maintaining contact with her sales team.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.4 - Describe the impact of the Internet on system architecture. TOPICS: The Impact of the Internet KEYWORDS: Bloom's: Apply Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 09 System Architecture DATE CREATED: DATE MODIFIED:

6/18/2024 1:09 PM 6/18/2024 1:09 PM

17. Catline is an employee at the Children's Hospital of Etiwanda, located in California. Recently, the hospital

changed its cloud service provider and transferred most of its data to the new provider. However, as a result, the hospital has become non-compliant with Health Insurance Portability and Accountability Act (HIPAA) regulations. What could be the reason behind this issue? a. The cloud provider was not qualified to store hospital records. b. The hospital's service level agreement (SLA) was not in compliance with the cloud provider's rules. c. The cloud provider started storing the hospital's data out of state, which is prohibited by HIPAA. d. The hospital did not encrypt the data before moving it to the new cloud provider. ANSWER: RATIONALE:

c

A medical provider must not store any data outside the state in which it conducts business. Even if a cloud provider is storing the hospital's data, the hospital is still non-compliant with HIPAA regulations. Therefore, the hospital must rectify the situation immediately to avoid incurring a fine. In California, fines are enforced through the Office of Civil Rights which is part of the Department of Health and Human Services.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.4 - Describe the impact of the Internet on system architecture. TOPICS: The Impact of the Internet KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 18. What are some of the benefits of an in-house web application development strategy? Choose all that apply. a. In-house web development provides enhanced control over security and data privacy, which is

especially critical for businesses that handle sensitive information. b. In-house web development offers unparalleled customization and control over the development process, enabling businesses to tailor their web applications precisely to their needs. c. Developing web applications in-house greatly facilitates their integration with existing internal systems and processes, a crucial aspect for maintaining organizational efficiency and coherence. d. An in-house solution usually does not require significant initial investment and management attention yet provides flexibility for a business that adapts quickly to a dynamic e-commerce environment. ANSWER: RATIONALE:

a, b, c

In-house web development provides businesses with unparalleled customization and control over the web application development process. This allows them to tailor their web applications precisely to their requirements. By developing web applications in-house, businesses can integrate them easily with existing internal systems and processes, thus ensuring organizational coherence and efficiency. Moreover, in-house web development offers enhanced control over security and data privacy, making it especially crucial for businesses dealing with sensitive

Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 09 System Architecture

information. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.5 - Compare in-house e-commerce development with packaged solutions and service providers. TOPICS: E-Commerce Architecture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 19. What are some of the benefits of using the application service provider (ASP) model? Choose all that apply. a. cost-effectiveness b. ease of use c. customization d. scalability ANSWER: RATIONALE:

a, b, d

ASPs offer significant advantages for e-commerce architecture, especially in terms of cost-effectiveness and ease of use. They typically operate on a subscription model, making them more accessible for small to medium-sized businesses due to lower upfront costs. ASPs provide ready-to-use, scalable e-commerce platforms requiring minimal technical expertise to set up and manage, allowing enterprises to launch and operate their online stores quickly.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.5 - Compare in-house e-commerce development with packaged solutions and service providers. TOPICS: E-Commerce Architecture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 20. What are some of the drawbacks of the application service provider (ASP) model? Choose all that apply. a. dependence on reliability and performance b. setup c. customization options d. data portability ANSWER: RATIONALE:

a, c, d

Using an application service provider (ASP) for e-commerce architecture has its drawbacks. The customization options can be limited, posing a challenge for businesses seeking a unique online presence or specific functionalities. Businesses relying on an ASP are dependent on their reliability and performance, and any service

Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 09 System Architecture

disruptions can have a direct impact on their operations. Moreover, transitioning away from an ASP can be challenging due to issues with data portability and integration with other systems, which might hinder future changes or scalability plans. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.5 - Compare in-house e-commerce development with packaged solutions and service providers. TOPICS: E-Commerce Architecture KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 21. Online systems are commonly used in environments where timely data processing and quick response times

are not critical. a. true b. false ANSWER: RATIONALE:

b

Online systems are commonly used in environments where timely data processing and quick response times ARE critical. For this reason, online processing systems are also known as real-time systems.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.6 - Explain online and batch processing. TOPICS: Processing Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 22. In online processing, what is dynamic interaction? a. optimization for fast response times to ensure users do not experience delays b. interaction with users in real time, allowing immediate input and output c. processing users or transactions simultaneously d. processing user data in real time ANSWER: RATIONALE:

b

Dynamic interaction is the interaction with users in real time, allowing immediate input and output.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.6 - Explain online and batch processing. Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 09 System Architecture TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Processing Methods Bloom's: Remember/Understand 6/18/2024 1:09 PM 6/18/2024 1:09 PM

23. What are some of the typical characteristics of batch processing? Choose all that apply. a. handling large data sets b. efficiency in resource utilization c. delayed output d. scheduled processing e. dynamic interaction ANSWER: RATIONALE:

a, b, c, d

Batch processing systems have five typical characteristics, four of which are listed: 1. Scheduled processing: Batch processing systems typically operate on a schedule, processing data at predetermined times, often during off-peak hours. 2. Handling large data sets: These systems are ideal for processing large data sets that do not require immediate action. 3. Efficiency in resource utilization: Batch processing can be more efficient in terms of resource utilization than real-time processing. 4. Delayed output: One of the key characteristics of batch processing is the delay between input and output. Data is collected over a period, processed in a batch, and then the results are produced.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.6 - Explain online and batch processing. TOPICS: Processing Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 24. What are some drawbacks of batch processing? Choose all that apply. a. lack of immediacy b. less efficient for large volumes of data c. less frequent but more substantial system loads d. complexity of managing and scheduling batch jobs ANSWER: RATIONALE:

a, c, d

Batch processing has its drawbacks. The most significant is the lack of immediacy; because tasks are processed in batches, there can be a delay between data collection and results availability, which may not be suitable for time-sensitive operations. This method can also lead to less frequent but more substantial system loads, which might require powerful processing capabilities to handle large batches of data efficiently. Another potential issue is the complexity of managing and scheduling batch jobs, which can become cumbersome, especially in systems with high frequency and

Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 09 System Architecture

volumes of batch processing. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.6 - Explain online and batch processing. TOPICS: Processing Methods KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 25. A physical topology describes the network cabling and connections while logical topology describes how

the components interact. a. true b. false ANSWER: RATIONALE:

a

A physical topology describes the network cabling and connections while logical topology describes how the components interact. It is essential to understand this distinction because a specific physical topology can support more than one logical topology.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.7 - Describe network models and topologies. TOPICS: Network Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 26. Chloe is planning to open a new business and needs to set up a network. Her office will have approximately

15 desktop computers, two servers, three laserjet printers, and one commercial-quality color printer. All employees will have access to the laserjet printers, except for the commercial color printer, which will be password-protected and accessible only to certain members of her staff. Chloe needs to decide on the best network topology for her new office. Which network topology would be best for Chloe's new office space? a. bus b. ring c. mesh d. star ANSWER: RATIONALE:

d

POINTS:

1

Chloe's office space consists of a single large room with an open floor plan with cubicles. Considering the simple network needs of the business, a star network would be the best choice. As an example, a 36-port switch will suffice as a starting point and will allow for future expansion.

Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 09 System Architecture QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.7 - Describe network models and topologies. TOPICS: Network Models KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 27. Which network topology uses interconnected nodes to allow data to be transmitted via multiple paths? a. mesh b. star c. bus d. ring ANSWER: RATIONALE:

a

Originally designed for military use, a mesh network is a network topology where each node is connected to multiple other nodes, allowing data to be transmitted through multiple paths.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.7 - Describe network models and topologies. TOPICS: Network Models KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 28. Angela needs to prioritize VoIP (voice over IP) traffic on her network. What's the best way to do so? a. prioritize VoIP settings with the ISP b. prioritize VoIP settings in the router for quality of service (QoS) c. prioritize VoIP settings in the switch d. prioritize VoIP settings in the hub ANSWER: RATIONALE:

b

Prioritizing VoIP settings are performed in the router's software.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.8 - Explain network devices, including routers, gateways, and proxy servers. TOPICS: Network Devices KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 09 System Architecture 29. A wireless local area network (WLAN) is expensive to install and not well-suited for desk bound

workgroups and users. a. true b. false ANSWER: RATIONALE:

b

A wireless local area network (WLAN) is inexpensive to install and well-suited to workgroups and users not anchored to a specific desk or location.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 30. What are wireless speeds measured in? Choose all that apply. a. kbps (kilobits per second) b. Mbps (Megabits per second) c. Gbps (Gigabits per second) d. Tbps (Terabits per second) ANSWER: RATIONALE:

b, c

Wireless network speed is measured in Mbps (megabits per second) or Gbps (gigabits per second).

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 31. What are the most common wireless network topologies for IEEE 802.11? Choose all that apply. a. independent basic service set b. basic service set c. wireless distribution system d. extended service set ANSWER:

b, d

Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 09 System Architecture RATIONALE:

The two most common network topologies for IEEE 802.11 WLANs are the basic service sets and extended service sets.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 32. Kelly is unsure of the type of wireless network setup she needs in her company. The directive is for all

devices to be connected to one wireless access point. What type of topology is it? a. wireless distribution system b. roaming c. infrastructure mode d. ad hoc mode ANSWER: RATIONALE:

c

The basic service set (BSS) is an infrastructure mode where a central wireless device, such as an access point or wireless access point (WAP), serves all wireless clients.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 33. Jeffery uses his smartphone to pay for goods by tapping the phone against a point-of-sale device. What form

of wireless transmission is this? a. Bluetooth b. near-field communication (NFC) c. WIMAX d. roaming ANSWER: RATIONALE:

b

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Jeffery's smartphone uses near-field communication (NFC) to transmit credit card or bank information from his phone to the point-of-sale device to pay for goods.

Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 09 System Architecture LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 34. What is the rationale behind multiple input/multiple output (MIMO) technology? Choose all that apply. a. propagates signals well in non-ideal environments b. boosts performance c. fixes issues with legacy equipment d. increases bandwidth and range ANSWER: RATIONALE:

b, d

Standards such as 802.11ac (Wi-Fi 5) can theoretically reach speeds of 7 Gbps. The increased speed is accomplished using multiple input/multiple output (MIMO) technology to boost performance. MIMO relies on multiple data paths, called multipath design, to increase bandwidth and range.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 35. Rory made the decision to upgrade his network with a new Wi-Fi 6 (802.11ax) router, because his previous

router was five years old, a little slow, and needed replacement. After installing the new router, he was pleased to see that most of his devices had an immediate boost in speed. However, he noticed that a few devices did not show any observable speed boost (for which Wi-Fi 6 is known). What could be the problem? a. compatibility issues with the network b. router is on the wrong channel c. compatibility issues with the older equipment d. router is using the 5 GHz band, and the older equipment is on the 2.4 GHz band ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE:

1 Multiple Choice

Almost all routers are backward compatible, which means that newer devices can communicate with and provide services to devices using older standards. In Rory's case, he had some older wireless devices that could not take advantage of the speed capabilities of Wi-Fi 6. These devices could only achieve the maximum speed for which they were designed, which was lower than what Wi-Fi 6 can offer.

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 09 System Architecture HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.9.9 - Describe wireless networking, including standards, topologies, and trends. TOPICS: Wireless Networks KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM

Copyright Cengage Learning. Powered by Cognero.

Page 18


Ch 10 Development Strategies 1. What are the primary paths that the development of traditional systems can follow? Choose all that apply. a. purchasing an off-the-shelf software package b. hybrid approach c. in-house development d. engaging external consultants ANSWER: RATIONALE:

a, c, d

The development of traditional systems can follow one of three primary paths: inhouse development, where the organization's IT team takes full responsibility for the system's creation and implementation; purchase an off-the-shelf software package, which may be modified to suit the organization's specific needs better; engaging external consultants who bring specialized expertise to the development process.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.1 - Compare and contrast traditional and web-based systems development. TOPICS: Traditional versus Web-Based Systems Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 2. Web-based solutions introduce challenges for integration and security, so a careful balance of holistic

objectives must be met to effectively meet business needs. What are some of those objectives? Choose all that apply. a. accessibility b. security c. functionality d. integrity ANSWER: RATIONALE:

a, b, c

Web-based development requires a careful balance between accessibility, functionality, and security to effectively meet business needs.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.1 - Compare and contrast traditional and web-based systems development. TOPICS: Traditional versus Web-Based Systems Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 3. Cloud computing provides various computing services, including servers, storage, databases, networking, and

software, via the Internet. Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 10 Development Strategies a. true b. false ANSWER: RATIONALE:

a

Cloud computing represents a transformative approach to accessing and managing computing resources. It essentially provides various computing services, including servers, storage, databases, networking, and software, over the Internet ("the cloud").

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.2 - Explain the possible impact of evolving IT trends on systems development. TOPICS: Evolving Trends KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 4. What are some of the key features that will define Web 3.0? Choose all that apply. a. enhancing privacy and security b. building online communities c. leveraging blockchain technology d. decentralization ANSWER: RATIONALE:

a, c, d

Web 3.0 aims to distribute data and services across a decentralized network of nodes. Blockchain technology plays a significant role in enabling this decentralization by providing a trustless and transparent infrastructure for storing and transferring data. Web 3.0 places a strong emphasis on giving users control over their personal data and identity to enhance privacy and security in the decentralized web.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.2 - Explain the possible impact of evolving IT trends on systems development. TOPICS: Evolving Trends KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 5. The choice between developing versus purchasing software is often called a ‘make or build', or ‘rent or buy',

decision. a. true b. false ANSWER:

b

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 10 Development Strategies RATIONALE:

The choice between developing versus purchasing software is often called a ‘make or buy', or ‘build or buy', decision.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.3 - Outline the process of selecting an in-house software development option. TOPICS: In-House Development Options KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 6. Desi uses a popular accounting software package that many small and medium businesses use for their firms.

What type of application is this an example of? a. vertical application b. singular application c. horizontal application d. multipurpose application ANSWER: RATIONALE:

c

A software package that many organizations can use is called a horizontal application. An accounting package is an excellent example of a horizontal application because many other businesses or separate divisions in large, diversified companies can utilize it.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.3 - Outline the process of selecting an in-house software development option. TOPICS: In-House Development Options KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 7. Why is software reuse integral to efficient software development? Choose all that apply. a. non-standardized projects b. accelerated development c. reduction in cost d. improved reliability ANSWER: RATIONALE:

b, c, d

POINTS:

1

Software reuse is integral to efficient software development, whether in-house or open source. Reusing existing code, libraries, or software modules can accelerate development, reduce costs, and improve reliability.

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 10 Development Strategies QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.3 - Outline the process of selecting an in-house software development option. TOPICS: In-House Development Options KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 8. IT outsourcing happens when companies transfer aspects of their information systems such as development,

operation, or maintenance to an external service provider for strategic reasons. a. true b. false ANSWER: RATIONALE:

a

Outsourcing IT functions is a strategic decision by companies to transfer various aspects of their information systems-including development, operation, or maintenance-to an external service provider. This transfer is conducted under an agreement where the external firm provides these services for a specified fee, which can be structured for either short-term tasks or long-term engagements.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.4 - Explain outsourcing. TOPICS: Outsourcing KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 9. An application service provider (ASP) firm offers licenses to use their software for a fee. a. true b. false ANSWER: RATIONALE:

b

Application service providers (ASP) deliver software applications or provide access to applications by charging a usage or subscription fee, offering more than just a license to use the software. ASPs rent out software packages to customers, typically including commercially available software such as databases and accounting packages.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.4 - Explain outsourcing. TOPICS: Outsourcing KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 10 Development Strategies DATE CREATED: DATE MODIFIED:

6/18/2024 1:09 PM 6/18/2024 1:09 PM

10. When outsourcing to the European Union (EU) or the European Economic Area (EEA) from another

country, it is important to be aware of the strict regulations that govern the transfer of personal data. What is the specific directive that regulates the transfer of data outside the EU or EEA? a. General Data Protection Regulation (GDPR) b. EU ePrivacy Directive c. Electronic Communications Privacy Act (ECPA) d. Personal Information Protection and Electronic Documents Act (PIPEDA) ANSWER: RATIONALE:

a

Under regulations such as the General Data Protection Regulation (GDPR), there are stringent rules governing the transfer of personal data outside the European Union (EU) or the European Economic Area (EEA).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.4 - Explain outsourcing. TOPICS: Outsourcing KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 11. Daniel's company faced investor pushback due to security concerns with their data analytics company

located in India. As a result, they decided to bring the business back home. What is this process called? Choose all that apply. a. rehoming b. reshoring c. resourcing d. onshoring ANSWER: RATIONALE:

b, d

As investors, workers, and others become more aware of the challenges associated with offshoring, some companies are starting to consider or undertake reshoring (also known as onshoring). This process involves bringing back previously offshored operations to their home country, which allows companies to regain more direct control and reduce the complexities associated with offshore outsourcing.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.5 - Summarize the main advantages and the unique concerns of offshoring. TOPICS: Offshoring KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 10 Development Strategies DATE CREATED: DATE MODIFIED:

6/18/2024 1:09 PM 6/18/2024 1:09 PM

12. Karter, the Director of IT for a major accounting firm, is considering offshoring IT functions, but offshoring

accounting data poses risks. What are some of these risks? Choose all that apply. a. security b. privacy regulations c. costs d. expenses ANSWER: RATIONALE:

a, b

Ensuring the security of data and privacy regulations are a critical concern, given the diverse legal and regulatory environments in different countries.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.5 - Summarize the main advantages and the unique concerns of offshoring. TOPICS: Offshoring KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 13. What are some of the disadvantages of the software as a service (SaaS) model? Choose all that apply. a. vulnerability due to lack of flexibility b. vulnerability to data breaches c. vulnerability to unauthorized access d. vulnerability to misuse of sensitive information ANSWER: RATIONALE:

b, c, d

The storage of data outside a company's premises can increase the risk of data breaches, unauthorized access, and potential misuse of sensitive information. Additionally, compliance with various data protection regulations can become more complicated since the data is stored offsite and may be subject to multiple jurisdictions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.6 - Describe the concept of software as a service. TOPICS: Software as a Service KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 14. Why do the challenges related to customization and integration present significant drawbacks in the software Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 10 Development Strategies

as a service (SaaS) model? Choose all that apply. a. The inability to customize the software can impede businesses' ability to tailor it to their specific

needs and processes. b. The high costs associated with customization and integration prevent the enhancement of overall business value. c. Integrating SaaS applications with existing in-house systems or third-party applications can be complex and sometimes limited by the software's API capabilities or vendor restrictions. d. Difficulties in integrating data across business functions can impact operational efficiency and data consistency. ANSWER: RATIONALE:

a, c, d

While SaaS applications are generally user-friendly and designed for a broad user base, they may offer a different customization level than in-house software. This lack of customization can limit the ability of businesses to tailor the software to their specific needs and processes. Additionally, integrating SaaS applications with existing in-house systems or third-party applications can be complex and sometimes limited by the software's API capabilities or vendor restrictions. These integration challenges can also hinder data flow across different business functions, potentially impacting operational efficiency and data consistency.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.6 - Describe the concept of software as a service. TOPICS: Software as a Service KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 15. Microsoft offers a well-known cloud-based service called Microsoft 365. It allows users to access a full

version of Microsoft Office Suite, which includes popular applications such as Word, Excel, PowerPoint, and Outlook, all from a browser window. While this approach provides users with the convenience of working from virtually anywhere, there is a disadvantage to cloud-based services like Microsoft 365. What is the disadvantage? a. The computer must be able to support Microsoft 365. b. The user must have a paid license to use Microsoft 365. c. There must be a reliable Internet connection to use Microsoft 365. d. The computer must have enough disk space to use Microsoft 365. ANSWER: RATIONALE:

a, c

To run Microsoft 365, a PC requires at least a 1.6 GHz dual-core processor, 4 GB RAM, 4 GB of storage, Windows 10 or newer (or recent macOS), and a 1280 x 768 resolution display. Microsoft 365 runs entirely in a browser window, offering a fullfledged version of the Microsoft Office Suite, including well-known applications like Word, Excel, PowerPoint, and Outlook. This approach allows users to access and work with the applications from virtually anywhere, as long as they have a reliable Internet connection.

Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 10 Development Strategies POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.6 - Describe the concept of software as a service. TOPICS: Software as a Service KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 16. What are some of the benefits of integrating AI into cloud services such as Microsoft 365? Choose all that

apply. a. intelligent suggestions b. predictive text c. automated data analysis d. intelligence analysis ANSWER: RATIONALE:

a, b, c

Co-Pilot (AI) transforms Microsoft 365 into an even more intelligent and interactive platform. This integration enhances the user experience by providing advanced features such as intelligent suggestions, automated data analysis, and predictive text, thereby increasing productivity and efficiency.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.6 - Describe the concept of software as a service. TOPICS: Software as a Service KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 17. Wendy's company is contemplating switching to a software as a service (SaaS) model. However, since the

company is located in a small town, it does not have access to the same high-speed Internet service providers (ISP) that are available in metropolitan areas. What would be some reasons not to switch to the SaaS model? Choose all that apply. a. inefficient use of resources b. lack of flexibility c. lack of stable high-speed Internet service d. unreliable Internet connectivity ANSWER: RATIONALE:

c, d

Due to being located in a small town, the company lacks access to high-speed Internet services that are commonly available in metropolitan areas. As a result, the Internet connectivity at the company is prone to being unreliable and slow, as the speed of the Internet is affected by the distance between the company and the infrastructure of the Internet service provider (ISP). The further away that the

Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 10 Development Strategies

company is situated from the ISP's infrastructure, the slower the Internet speed, and the more likely that the Internet connection will be unreliable. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.6 - Describe the concept of software as a service. TOPICS: Software as a Service KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 18. When designing or customizing software, organizations must consider data handling, such as databases

design, data integrity, and application analytics capabilities integration. a. true b. false ANSWER: RATIONALE:

a

When organizations develop in-house software or customize software packages, they must consider how these systems will handle data. This includes designing databases, ensuring data integrity, and integrating application analytics capabilities.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.7 - Explain why data management and analytics are integral to selecting a development strategy. TOPICS: Data Management and Analytics KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 19. In what order should the steps be taken when developing a cost-benefit analysis?

1. Identify all costs and benefits. 2. Apply financial tools. 3. Consider future growth. 4. Analyze licensing options. 5. Include support costs for hardware and software. 6. List each development strategy under consideration. 7. Prepare a report for management. a. 1, 2, 3, 4, 5, 6, 7 b. 6, 1, 3, 5, 4, 2, 7 c. 3, 5, 4, 2, 7, 1, 6 d. 5, 4, 2, 7, 6, 1, 3 ANSWER:

b

Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 10 Development Strategies RATIONALE:

The order in which a cost-benefit analysis should be executed is: (6) List each development strategy under consideration. (1) Identify all costs and benefits. (3) Consider future growth. (5) Include support costs for hardware and software. (4) Analyze licensing options. (2) Apply financial tools. (7) Prepare a report for management.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 20. When evaluating each development strategy, what are the implications that need to be considered for all

associated costs and benefits for each alternative? a. return on investment (ROI) b. total cost of ownership (TCO) c. short-term goals d. immediate and long-term financial implications ANSWER: RATIONALE:

d

Once each development strategy has been listed, the next step is to identify all associated costs and benefits for each alternative. This task involves a detailed analysis of each option's immediate and long-term financial implications.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 21. Why is scalability an essential aspect of evaluating development strategies? Choose all that apply. a. critical for businesses anticipating rapid growth or fluctuating demands b. ability to scale up or down as needed without incurring prohibitive costs or operational disruption c. ensures that the selected development strategy remains viable and effective in the long term, even as

the company evolves d. crucial for the company's operational needs and financial capabilities ANSWER: RATIONALE:

a, b, c

Scalability is critical, especially for businesses anticipating rapid growth or

Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 10 Development Strategies

fluctuating demands. The chosen strategy should offer the flexibility to scale up or down as needed without incurring prohibitive costs or operational disruptions and ensures that the selected development strategy remains viable and effective in the long term, even as the company evolves. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 22. What are some of the findings that should be included in the report for management? Choose all that apply. a. key costs and benefits b. analyst's opinions c. scalability considerations d. support expenses ANSWER: RATIONALE:

a, c, d

This report should synthesize the findings from previous steps, presenting a clear and concise comparison of the different development strategies. It should highlight the key costs and benefits, scalability considerations, support expenses, licensing options, and the outcomes of the financial analyses.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 23. What is the fundamental goal of the evaluation and selection teams? a. Exclude any software alternatives that do not align with the organization's requirements. b. Analyze total cost of ownership (TCO). c. Determine net present value (NPV). d. Calculate return on investment (ROI) for in-house versus outsourced product development. ANSWER: RATIONALE:

a

The fundamental goal of the evaluation and selection team is to methodically weed out any software alternatives that do not align with the organization's requirements. The process involves an in-depth assessment of each feasible option, ranking them in

Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 10 Development Strategies

terms of suitability to the company's needs, and finally presenting the most promising options to management for the final decision. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 24. It is common for a single system within an organization to utilize one software solution to meet its diverse

requirements. a. true b. false ANSWER: RATIONALE:

b

It is common for a single system within an organization to utilize a combination of software solutions to meet its diverse requirements.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 25. The evaluation and selection of off-the-shelf software and tailored software solutions are complex and

require careful consideration. What is one of the main objectives in this phase? a. Identify the option with the best net present value (NPV). b. Identify the option with the best payback analysis (PBA). c. Identify the option that gives the greatest return on investment (ROI). d. Identify the option that offers the lowest total cost of ownership (TCO). ANSWER: RATIONALE:

d

The evaluation and selection of off-the-shelf software and tailored software solutions are complex and require careful consideration. One of the main objectives in this phase is to identify the option that offers the lowest total cost of ownership (TCO).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 10 Development Strategies

TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

strategy. Selecting a Development Strategy Bloom's: Apply 6/18/2024 1:09 PM 6/18/2024 1:09 PM

26. It is crucial to accurately forecast the total cost of ownership (TCO) of an IT project, as a significant

percentage of costs are incurred after the initial purchase of hardware and software. According to Gartner, what is the average percentage of these costs? a. 60% b. 70% c. 80% d. 20% ANSWER: RATIONALE:

c

According to Gartner, nearly 80% of the costs associated with an IT project are incurred after the initial purchase of hardware and software.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.8 - Outline how a systems analyst helps in choosing a development strategy. TOPICS: Selecting a Development Strategy KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 27. Why is it crucial to consider the system's capacity to exchange data with external systems? a. Ensure that the proposed system aligns with the organization's capabilities and limitations, and that

data flow with external systems is seamless. b. Ensure that the system integrates seamlessly with the existing IT infrastructure, addressing aspects such as compatibility and interoperability. c. Ensure that the software and hardware can handle future transaction volumes and data storage requirements. d. Ensure that the system can seamlessly integrate with the existing IT infrastructure and handle future transaction volumes and data storage requirements for both software and hardware. ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE:

1 Multiple Choice

It is crucial to consider the system's capacity to exchange data with external systems, such as those of vendors or customers, ensuring compatibility and seamless data flow. Any existing hardware, software, or personnel constraints must be clearly defined to align the proposed system with the organization's capabilities and limitations.

Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 10 Development Strategies HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 28. What differentiates a request for proposal (RFP) from a request for quotation (RFQ)? a. It depends on whether a company is making a routine purchase. b. It depends on whether a company is making an emergency purchase. c. It depends on whether a specific software product has been selected. d. It depends on whether the product is a sole source procurement. ANSWER: RATIONALE:

c

The two documents are similar but used in different situations, depending on whether a specific software product has been selected.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 29. Why is it important to write a comprehensive request for proposal (RFP) when in the process of procuring a

vendor for IT services and products? a. It is essential to write a comprehensive RFP so vendors know there is a limited budget. b. It is essential to write a comprehensive RFP so vendors know there are time constraints. c. It is essential to write a comprehensive RFP so vendors know you understand the market and will not

be cheated. d. It is essential to write a comprehensive RFP to ensure that potential vendors meet the specific requirements and standards of the organization. ANSWER: RATIONALE:

d

It is essential to write a comprehensive request for proposal (RFP) to ensure that potential vendors meet the specific requirements and standards of the organization. The RFP outlines necessary services and support levels, giving vendors a comprehensive understanding of what the organization seeks and enabling them to assess their ability to meet these needs.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 10 Development Strategies KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Apply 6/18/2024 1:09 PM 6/18/2024 1:09 PM

30. When would an organization use a request for quote (RFQ) instead of a request for proposal (RFP)? a. The primary goal is to obtain price quotations or bids from potential suppliers. b. The primary goal is to give vendors a comprehensive understanding of what the organization seeks

and enable them to assess their ability to meet these needs. c. The primary goal is to identify qualified vendors. d. The primary goal is to explore vendor solutions to the issue at hand. ANSWER: RATIONALE:

a

The primary goal is to obtain price quotations or bids from potential suppliers. RFQs are commonly used for outright purchases and various leasing options, giving organizations the flexibility to choose the best financial arrangement for their needs, and they can also specify maintenance or technical support requirements, ensuring that these essential services are included in the vendors' proposals.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 31. After receiving multiple responses to a request for proposal (RFP) or a request for quote (RFQ), what critical

tool should an organization use to choose a vendor? a. request for quote model b. return on investment model c. payback analysis model d. evaluation model ANSWER: RATIONALE:

d

When an organization receives multiple responses to an RFP or RFQ, employing an evaluation model becomes critical in decision making. This model serves as a standardized framework or "common yardstick" to assess and compare the proposals or bids received from various vendors. Using a consistent set of criteria for evaluation, the model ensures that each vendor's offer is assessed fairly and objectively.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 10 Development Strategies KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:09 PM 6/18/2024 1:09 PM

32. What are the benefits of using an evaluation model when selecting vendors for projects? a. This structured approach emphasizes qualitative measures when selecting a vendor. b. This structured approach emphasizes quantitative measures when selecting a vendor. c. This structured approach simplifies identifying the proposal that offers the best value and aligns

closely with the organization's needs. d. This structured approach emphasizes how vendors can customize their offerings to fit the company's needs. ANSWER: RATIONALE:

c

This structured approach simplifies identifying the proposal that offers the best value and aligns closely with the organization's needs. It enables decision makers to analyze factors such as cost-effectiveness, technical feasibility, vendor reputation, and compliance with project specifications.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 33. Where is the best place to go for anyone seeking information, support, or a community of like-minded

individuals, regardless of the topic of interest? a. web searches b. online forums c. Wikipedia d. tradeshows ANSWER: RATIONALE:

b

Online forums are invaluable for anyone seeking information, support, or a community of like-minded individuals, regardless of the topic of interest. These forums exist in various forms, from private platforms hosted by specific entities to public spaces within larger online communities like Google Groups or Reddit.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 10 Development Strategies DATE MODIFIED:

6/18/2024 1:09 PM

34. It is essential to perform a vendor risk assessments on all vendors. Why is that important? a. to see if selected vendors meet technical and operational requirements and adhere to security,

compliance, and reliability standards b. to see if the vendor's products or services have minimal impact on the organization's operations, finances, or reputation c. to see if the organization has a long-standing and trusted relationship with the vendor, and if there is a high level of confidence in their ability to deliver consistently and meet contractual obligations d. to see if the vendor holds industry-recognized certifications or adheres to widely accepted standards for security, privacy, or quality management ANSWER: RATIONALE:

a

A vendor risk assessment is a methodical approach to evaluating both current and potential vendors, ensuring that selected vendors meet technical and operational requirements and adhere to security, compliance, and reliability standards. By thoroughly assessing potential risks associated with each vendor, companies can mitigate potential issues down the line, and proactively manage any issues that may arise while ensuring that the selected vendor meets their current needs, while also being a dependable and trustworthy partner for the future.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 35. Why is it unwise to depend solely on a vendor's list of user references? Choose all that apply. a. Vendors may have a negative reputation but are hiding evidence of that. b. Vendors may provide references from those who have a vested interest in the company. c. Vendors tend to curate their reference lists to include predominantly satisfied clients, leading to a

bias toward positive feedback. d. Vendors may look good on paper but are completely different once they arrive onsite. ANSWER: RATIONALE:

b, c

Vendors often curate their reference lists to feature satisfied clients, resulting in a bias toward positive feedback. They may also provide references from clients with vested interests in the vendor's success.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.10.9 - Execute the main steps in the software acquisition process. TOPICS: Software Acquisition Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 10 Development Strategies KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Apply 6/18/2024 1:09 PM 6/18/2024 1:09 PM

Copyright Cengage Learning. Powered by Cognero.

Page 18


Ch 11 Managing Systems Implementation 1. Quality assurance is an ongoing process that starts from the initial stages of systems development and

continues throughout its life cycle. a. true b. false ANSWER: RATIONALE:

a

Quality assurance is an ongoing process that starts from the initial stages of systems development and continues throughout its life cycle.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 2. The technical aspects of software engineering are divided into five primary activity areas, each playing a

crucial role in the software's life cycle. Which of the following are the five primary activity areas? 1. Requirements 2. Compliance Considerations 3. Construction 4. Testing 5. Post-implementation Evaluation 6. Risk Management 7. Design 8. Maintenance and Evolution 9. Training 10 Knowledge Transfer a. 1, 6, 3, 4, 10 b. 1, 3, 4, 9, 8 c. 1, 7, 3, 4, 8 d. 1, 2, 3, 4 5 ANSWER: RATIONALE:

c

The technical aspects of software engineering are divided into five primary activity areas, each playing a crucial role in the software's life cycle. These areas are: Requirements, where the functions of the software are identified and documented (1). Design, which involves planning the software's architecture and user interfaces (7). Construction, the actual coding and building of the software (3). Testing, where the software is rigorously evaluated to ensure that it meets quality standards and functions as intended (4). Maintenance and evolution, which covers the ongoing updates and improvements after deployment to keep the software relevant and efficient (8).

Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 11 Managing Systems Implementation POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 3. In order to successfully complete a project, software engineers are supported by crucial nontechnical

activities. What are these activities? Choose all that apply. a. cost and effort estimation b. project management c. process improvement d. program analysis ANSWER: RATIONALE:

a, b, c

In addition to these technical activities, software engineering is supported by crucial nontechnical activities for a project's successful completion. These include cost and effort estimation, which allows for effective budgeting and resource allocation; project management, which involves overseeing the project's progress to ensure that it meets deadlines and objectives; and process improvement, which focuses on continually refining and enhancing the development process for greater efficiency and quality.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 4. Systems engineering is an interdisciplinary field that extends beyond the scope of software engineering to

encompass various components of a comprehensive system. What are these components? Choose all that apply. a. hardware b. software c. networks d. user interfaces ANSWER: RATIONALE:

a, c, d

Systems engineering is an interdisciplinary field that extends beyond the scope of software engineering to encompass various components of a comprehensive system,

Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 11 Managing Systems Implementation

including hardware, networks, and user interfaces. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 5. Systems analysts benefit significantly from adopting a holistic problem-solving approach, especially in large-

scale projects. By embracing a system engineering mindset, analysts can better understand the interaction between various system components and their impact on the project. How does an analyst embrace this mindset? a. focus on software development b. consider all facets of a system c. focus on the user interface d. consider the needs of the stakeholders and end users ANSWER: RATIONALE:

b

Systems analysts benefit significantly from adopting a holistic problem-solving approach, especially in large-scale projects. This approach involves considering all facets of a system, from technical specifications to user experience, and requires a broad perspective beyond traditional software development.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 6. Which organization is responsible for setting standards for industries such as automotive, infrastructure

systems, and software? a. OSI b. ISA c. ISO d. OSHA ANSWER: RATIONALE:

c

Automobiles, water, and software might seem unrelated at first glance, but they share a common characteristic: all are subject to standards set by the International

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 11 Managing Systems Implementation

Organization for Standardization (ISO). This connection highlights the vast range of products and services governed by ISO standards to ensure quality, safety, and efficiency. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 7. Why did ISO introduce ISO/IEC/IEEE 90003:2018? a. to apply the principles of ISO 9001:2014 to computer hardware b. to apply the principles of ISO 9001:2015 to computer software c. to apply the principles of ISO 9001:2013 to computer management d. to apply the principles of ISO 9001:2015 to computer hardware ANSWER: RATIONALE:

b

ISO introduced ISO/IEC/IEEE 90003:2018 guidelines that apply the principles of ISO 9001:2015 to computer software. This adaptation of ISO 9001:2015, a global standard for quality management systems, sets forth the criteria to ensure the consistent quality of products and services.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 8. Why is adherence to ISO standards important for companies that are procuring software or developing it in-

house? a. It represents a strategic approach to guaranteeing technical services. b. It represents a strategic approach to guaranteeing technical reliability. c. It represents a strategic approach to guaranteeing customer satisfaction. d. It represents a strategic approach to guaranteeing software quality and reliability. ANSWER: RATIONALE:

d

It represents a strategic approach to guaranteeing software quality and reliability. By incorporating ISO standards into procurement specifications, organizations establish clear quality benchmarks that suppliers must meet, ensuring that software products

Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 11 Managing Systems Implementation

align with international quality norms. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 9. ISO standards stress the importance of comprehensive documentation and rigorous software testing; suppliers

are also held accountable. What are the requirements for suppliers according to ISO standards? a. Suppliers must document all testing activities and maintain records of outcomes. b. Suppliers must document all interactions with customers and stakeholders. c. Suppliers must document all interactions with management and users. d. Suppliers must document all activities that their employees have with the client. ANSWER: RATIONALE:

a

ISO standards emphasize the importance of thorough documentation and rigorous software testing. Suppliers must document all testing activities and maintain records of outcomes, a practice that is critical for troubleshooting and quality assurance.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.1 - Define the concepts of quality assurance in software and systems engineering. TOPICS: Quality Assurance KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 10. Which system tool is utilized for structured development methodologies? a. spiral model b. class diagrams c. use case diagrams d. structure charts ANSWER: RATIONALE:

d

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Structured development utilizes data flow diagrams (DFD) and structure charts to visually represent data processes and the architecture of systems, providing a clear, top-down view of system interaction.

Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 11 Managing Systems Implementation LEARNING OBJECTIVES: Tilley.SAD13e.25.11.2 - Describe the differences between traditional and agile methods in application development tasks. TOPICS: Application Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 11. Which system development tool is utilized for object-oriented (O-O) methodologies? a. structure charts b. use case diagrams c. spiral models d. data flow diagrams (DFD) ANSWER: RATIONALE:

b

Object-oriented (O-O) methods employ a range of UML diagrams, such as use case diagrams to define system interactions, class diagrams to model system classes and their relationships, sequence diagrams for depicting object interactions over time, and state transition diagrams to describe state changes in response to events.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.2 - Describe the differences between traditional and agile methods in application development tasks. TOPICS: Application Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 12. Donavan is working with a client who is involved in a project and wants to oversee every aspect, including

checking the programming code during the development process. Although Donavan is an expert programmer, the client lacks adequate programming knowledge. What programming language can Donavan use to enable the client to follow along with the development process in real-time? a. Python b. Ruby c. Pseudocode d. Visual Basic ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE:

1 Multiple Choice

Donavan should use Pseudocode. It is a powerful tool for outlining program logic in a format that mirrors structured English, making it accessible and easy to understand. Since it is not bound to the syntax of any specific programming language, pseudocode allows for the description of software modules in straightforward English.

Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 11 Managing Systems Implementation HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.2 - Describe the differences between traditional and agile methods in application development tasks. TOPICS: Application Development KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 13. In a structure chart, higher-level modules, called control modules, direct lower-level modules, called

subordinate modules. a. true b. false ANSWER: RATIONALE:

a

A structure chart consists of rectangles representing the program modules, with arrows and other symbols providing additional information. Typically, a higher-level module, called a control module, directs lower-level modules, called subordinate modules.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.3 - Understand the principles of cohesion and coupling in structured development. TOPICS: Structured Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 14. Cohesion and coupling are important metrics to evaluate system design quality. What is the optimal metric

for cohesion and coupling? a. highly cohesive and tightly coupled modules b. minimally cohesive and tightly coupled modules c. highly cohesive and loosely coupled modules d. minimally cohesive and loosely coupled modules ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE:

1 Multiple Choice

High cohesion within a module signifies that its functions are closely related and focused, enhancing understandability and reducing complexity. In contrast, loose coupling between modules indicates minimal dependencies, promoting flexibility and ease of modification. When these conditions are met, the system becomes easier and less costly to maintain, as changes to one part of the system have minimal impact on others, significantly reducing the effort and risk associated with modifying the system's structure.

Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 11 Managing Systems Implementation HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.3 - Understand the principles of cohesion and coupling in structured development. TOPICS: Structured Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 15. What is the primary role of a programmer in object-oriented (O-O) software development? a. to transform procedural programming into object-oriented (O-O) methodology b. to engineer the executable program code to future-proof against system changes c. to transform the methods defined for each object in the system into executable program code modules d. to create separate classes for each individual method to maximize modularity ANSWER: RATIONALE:

c

The role of a programmer in object-oriented (O-O) software development is multifaceted and crucial. The primary goal is to transform the methods defined for each object in the system into executable program code modules. This process involves thoroughly understanding how each module will be activated or triggered, typically in response to specific events or messages.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.4 - Recall the characteristics of object-oriented development. TOPICS: Object-Oriented Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 16. The concepts of cohesion and coupling hold significant importance in object oriented (O-O) application

development. How should classes be coupled for effective design? a. classes should be as minimally coupled as possible b. classes should be as highly coupled as possible c. classes should be as tightly coupled as possible d. classes should be as loosely coupled as possible ANSWER: RATIONALE:

d

The concepts of cohesion and coupling hold significant importance in O-O application development. Classes should be as loosely coupled as possible for effective design, meaning they should operate independently.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.4 - Recall the characteristics of object-oriented development. TOPICS: Object-Oriented Development Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 11 Managing Systems Implementation KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Apply 6/18/2024 1:09 PM 6/18/2024 1:09 PM

17. Agile development focuses on large teams, intense communication, and rapid development iterations. a. true b. false ANSWER: RATIONALE:

b

Agile development focuses on small teams, intense communication, and rapid development iterations.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.5 - Apply agile development. TOPICS: Agile Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 18. What are some disadvantages to agile development? Choose all that apply. a. It does not accelerate software development and fails to deliver precisely what the customer wants,

when the customer wants it. b. Due to its emphasis on speedy iterations and quick releases, it lacks discipline and yields systems of questionable quality. c. Due to their complexity, larger projects often lack a well-defined product focus, leading to decreased efficiency. d. It hinders teamwork and disempowers employees. ANSWER: RATIONALE:

b, c

Critics of agile development often claim that, because it focuses on quick iterations and fast releases, it lacks discipline and produces systems of questionable quality. In addition, agile methodology generally does not work as well for larger projects because of complexity and the lack of focus on a well-defined product.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.5 - Apply agile development. TOPICS: Agile Development KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 19. Pair programming is a concept used in Extreme Programming (XP). How does this programming

methodology work? Choose all that apply. Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 11 Managing Systems Implementation a. Two programmers collaborate on a task-each working on part of the problem at the same time. b. Two programmers collaborate on the same task using the driver-navigator technique on the same

computer. c. The onlooker sees the details (the trees), and the driver focuses on the big picture. They discuss their ideas continuously. d. The onlooker sees the big picture (the forest), while the driver focuses on the details (the trees). They discuss their ideas continuously. ANSWER: RATIONALE:

b, d

Extreme Programming (XP) uses a concept called pair programming. In pair programming, two programmers work on the same task on the same computer; one drives (programs), while the other navigates (watches). The onlooker examines the code strategically to see the forest, while the driver is concerned with the individual trees immediately in front of them. The two discuss their ideas continuously throughout the process.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.5 - Apply agile development. TOPICS: Agile Development KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 20. The customer begins by meeting with programmers and providing user stories. A user story is a short,

simple requirements definition. Programmers review user stories to determine the project's requirements, priorities, and scope. What are some examples of user stories? Choose all that apply. a. As the sales manager, I want to identify fast- or slow-moving items to manage our inventory more

effectively. b. As a store manager, I need enough lead time to replenish my stock so I don't run out of hot items. c. As a sales representative, I want to offer the best selection of fast-selling items and clear out the old stock that is not moving. d. As a sales assistant, I stock the shelves and replace stock as it sells out. ANSWER: RATIONALE:

a, b, c

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

A user story is a short, simple requirements definition. Programmers review user stories to determine the project's requirements, priorities, and scope. Here are three user story examples: (1) As the sales manager, I want to identify fast- or slow-moving items to manage our inventory more effectively. (2) As a store manager, I need enough lead time to replenish my stock so that I don't run out of hot items. (3) As a sales representative, I want to offer the best selection of fast-selling items and clear out the old stock that is not moving.

Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 11 Managing Systems Implementation LEARNING OBJECTIVES: Tilley.SAD13e.25.11.5 - Apply agile development. TOPICS: Agile Development KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 21. Choosing the correct programming language is a crucial step in systems implementation, directly

influencing functionality, user experience, and team productivity. What is the programming language Rust known for? Choose all that apply. a. safety features and performance b. easy to learn and master c. enhances the capabilities of web-centric languages like JavaScript and Swift d. extensive libraries and frameworks like Python and Java ANSWER: RATIONALE:

a, c

Rust, known for its safety features and performance, enhances the capabilities of web-centric languages like JavaScript and Swift, aiding in creating advanced digital solutions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.6 - Explain coding. TOPICS: Coding KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 22. Why is it crucial to choose the correct programming language in systems implementation? a. It directly influences functionality. b. It directly influences user experience. c. It directly influences team productivity. d. It directly influences time to implement. ANSWER: RATIONALE:

a, b, c

Choosing the correct programming language is a crucial step in systems implementation, directly influencing functionality, user experience, and team productivity.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.6 - Explain coding. TOPICS: Coding KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 11 Managing Systems Implementation DATE MODIFIED:

6/18/2024 1:09 PM

23. What are some of the benefits of using Integrated Development Environment (IDE) tools when developing

code? Choose all that apply. a. real-time error detection b. specialized Git tools c. syntax hints d. class browsers ANSWER: RATIONALE:

a, c, d

Some of the benefits of using IDE tools include real-time error detection, which immediately identifies issues as they arise, as well as syntax hints that assist in writing correct code more efficiently, code highlighting for easier readability, class browsers for navigating through code, and version control systems to manage changes and collaboration effectively.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.6 - Explain coding. TOPICS: Coding KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 24. What are errors called in programming that occur due to incorrect language grammar? a. data errors b. syntax errors c. logic errors d. design errors ANSWER: RATIONALE:

b

Language grammar errors are called syntax errors. A programmer corrects these errors until the program executes properly.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.7 - Explain unit, integration, and system testing. TOPICS: Testing KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 25. The purpose of testing an individual program or module is to identify and resolve any execution errors that

may lead to unexpected termination of the program, as well as logic errors that may have been overlooked during desk checking. What term is used to describe this type of testing? Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 11 Managing Systems Implementation a. unit testing b. data testing c. logic testing d. integration testing ANSWER: RATIONALE:

a

The testing of an individual program or module is called unit testing. The objective is to identify and eliminate execution errors that could cause the program to terminate abnormally, as well as logic errors that could have been missed during desk checking.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.7 - Explain unit, integration, and system testing. TOPICS: Testing KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 26. System testing is the key to user and management approval. What is it sometimes called? a. logic tests b. integration tests c. acceptance tests d. unit tests ANSWER: RATIONALE:

c

Successful completion of system testing is the key to user and management approval, which is why system tests are sometimes called acceptance tests. Final acceptance tests, however, are performed during systems installation and evaluation with actual user data.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.7 - Explain unit, integration, and system testing. TOPICS: Testing KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 27. Test data should contain both correct data and erroneous data. a. true b. false ANSWER: RATIONALE:

a

Test data should contain both correct data and erroneous data and should test all possible situations that could occur.

Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 11 Managing Systems Implementation POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.7 - Explain unit, integration, and system testing. TOPICS: Testing KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 28. Finn, a systems analyst, is currently working on a program for a client who needs to integrate with a legacy

system. To ensure a seamless integration, Finn needs to conduct some tests. Among the various tests that he will run on this installation, which ones will determine the compatibility of the new system with the legacy system? Choose all that apply. a. unit testing b. data testing c. system testing d. integration testing ANSWER: RATIONALE:

c, d

Integration testing tests two or more programs that depend on each other. After completing integration testing, system testing is performed on the entire information system. A system test includes all likely processing situations. It is intended to assure users, developers, and managers that the program meets all specifications and that all necessary features have been included.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.7 - Explain unit, integration, and system testing. TOPICS: Testing KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 29. What type of software do system developers use to document and track program defects, code changes, and

replacement code? Choose all that apply. a. patch tracking b. defect tracking c. maintenance tracking d. bug tracking ANSWER: RATIONALE:

b, d

POINTS:

1

System developers use defect tracking software, sometimes called bug tracking software, to document and track program defects, code changes, and replacement code.

Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 11 Managing Systems Implementation QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.8 - Differentiate among program, system, operations, and user documentation. TOPICS: Documentation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 30. Which type of documentation contains all the information needed for processing and distributing online and

printed output? a. program documentation b. user documentation c. operations documentation d. system documentation ANSWER: RATIONALE:

c

Operations documentation contains all the information needed for processing and distributing online and printed output.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.8 - Differentiate among program, system, operations, and user documentation. TOPICS: Documentation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 31. Which type of documentation consists of instructions and information for interacting with the system and

includes manuals, help screens, and online tutorials? a. program documentation b. user documentation c. operations documentation d. system documentation ANSWER: RATIONALE:

b

User documentation consists of instructions and information for users interacting with the system and includes user manuals, help screens, and online tutorials.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.8 - Differentiate among program, system, operations, and user documentation. TOPICS: Documentation Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 11 Managing Systems Implementation KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:09 PM 6/18/2024 1:09 PM

32. What are the installation tasks that are performed for every information systems project, whether the

application is developed in-house or purchased as a commercial package? Choose the correct steps from the following list. 1. Procure hardware 2. Prepare a separate operational and test environment 3. Perform system changeover 4. Configure network 5. Perform data conversion 6. Perform data migration 7. Provide training for users, managers, and IT staff 8. Integrate with external systems 9. Carry out post-implementation tasks a. 1, 2, 4, 5, 6 b. 2, 3, 5, 6, 7 c. 3, 5, 6, 7, 9 d. 2, 4, 5, 6, 7 e. 2, 3, 5, 7, 9 ANSWER: RATIONALE:

e

The following system installation tasks are performed for every information systems project, whether the application is developed in-house or purchased as a commercial package: Prepare a separate operational and test environment (2). Perform system changeover (3). Perform data conversion (5). Provide training for users, managers, and IT staff (7). Carry out post-implementation tasks (9).

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.9 - Describe the five tasks involved in system installation. TOPICS: Installation KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 33. What is the term used to refer to the environment in which the systems are developed? a. test environment b. operational environment c. simulation environment d. virtual environment ANSWER:

a

Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 11 Managing Systems Implementation RATIONALE:

The environment that analysts and programmers use to develop and maintain programs is called the test environment. A separate test environment is necessary to maintain system security and integrity and to protect the operational environment.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.9 - Describe the five tasks involved in system installation. TOPICS: Installation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 34. System changeover can be rapid or slow, depending on the method. Which method is considered the

slowest? a. direct cutover b. parallel c. pilot d. phased operation ANSWER: RATIONALE:

b

Parallel operation is the slowest method because it requires that both systems run simultaneously for a specified period.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.9 - Describe the five tasks involved in system installation. TOPICS: Installation KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM 35. Which changeover method is the least expensive, but involves more risk than other changeover methods? a. parallel b. direct cutover c. pilot d. phased operation ANSWER: RATIONALE:

b

POINTS:

1

The direct cutover method is generally the least expensive way to switch to a new system because the IT team must operate and maintain only one system at a time. However, this method is riskier than other changeover methods. Even if testing and training are conducted thoroughly and carefully, there may be other issues when the new system goes live.

Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 11 Managing Systems Implementation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.11.9 - Describe the five tasks involved in system installation. TOPICS: Installation KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:09 PM DATE MODIFIED: 6/18/2024 1:09 PM

Copyright Cengage Learning. Powered by Cognero.

Page 18


Ch 12 Maintenance & Support 1. When significant modifications are made or a new system version is released, it prompts the development of

a specialized type of package. What is this package called? a. enhancement package b. user training package c. update package d. power user package ANSWER: RATIONALE:

b

Significant modifications or the release of a new system version prompt the development of a specialized user training package. Tailored to the specific nature of the updates, these packages may encompass a variety of support tools, including online assistance via email, dedicated websites for employee resources, updated user guides, supplemental training manuals, or even formal training sessions designed to bring users up to speed.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.1 - Describe the role of user support and training in system usability and user satisfaction. TOPICS: User Support and Training KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 2. What are some of the non-customer-service benefits of having a help desk? Choose all that apply. a. gaining insights into areas for system improvement b. identifying problem employees c. discovering user training needs d. developing more effective solutions ANSWER: RATIONALE:

a, c, d

Help desks are crucial in identifying common user challenges and trends in system issues. By logging and analyzing support requests, IT departments can gain valuable insights into potential areas for system improvement, user training needs, and developing more effective solutions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.1 - Describe the role of user support and training in system usability and user satisfaction. TOPICS: User Support and Training KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 12 Maintenance & Support 3. Why is the operations phase essential to total cost of ownership (TCO)? a. maintenance costs can determine a system's technical life b. maintenance costs can determine a system's economic life c. maintenance costs can determine a system's general life d. maintenance costs can determine a system's total life ANSWER: RATIONALE:

b

The operations phase is essential to total cost of ownership (TCO) because ongoing maintenance expenses can determine a system's economic life.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.2 - Define the purpose of the different maintenance tasks in IT system upkeep. TOPICS: Maintenance Tasks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 4. Which type of maintenance enhances an operational system and makes it easier to use? a. preventative b. adaptive c. perfective d. corrective ANSWER: RATIONALE:

b

Adaptive maintenance enhances an operational system and makes it easier to use. An enhancement is a new feature or capability. The need for adaptive maintenance usually arises from business environment changes such as new products or services, new manufacturing technology, or support for a new web-based operation.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.2 - Define the purpose of the different maintenance tasks in IT system upkeep. TOPICS: Maintenance Tasks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 5. Ariana wants to improve the quality and performance of a software project that her company launched two

years ago. The company that originally developed it will use software reengineering to identify potential quality and performance improvements. What form of maintenance is this considered? a. adaptive Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 12 Maintenance & Support b. preventative c. perfective d. corrective ANSWER: RATIONALE:

c

When performing perfective maintenance, analysts often use a technique called software reengineering, which uses analytical techniques to identify an information system's potential quality and performance improvements. Software reengineering is similar to business process reengineering, which seeks to simplify operations, reduce costs, and improve quality.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.2 - Define the purpose of the different maintenance tasks in IT system upkeep. TOPICS: Maintenance Tasks KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 6. What role does a system administrator play within an organization? a. managing computer and network systems b. managing end-user devices c. managing audio/video equipment d. managing building infrastructure ANSWER: RATIONALE:

a

A system administrator plays a crucial role in organizations, managing computer and network systems to ensure smooth and efficient operations.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.3 - Outline organizing maintenance operations TOPICS: Maintenance Operations Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 7. Systems analysts often serve as the bridge between an organization's IT department and business units,

translating complex technical issues into understandable terms for non-technical stakeholders. a. true b. false ANSWER: RATIONALE:

a

The role of a systems analyst in maintenance goes beyond technical and business

Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 12 Maintenance & Support

acumen to encompass strong interpersonal and communication skills. These professionals often serve as the bridge between the IT department and business units, translating complex technical issues into understandable terms for non-technical stakeholders. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.3 - Outline organizing maintenance operations TOPICS: Maintenance Operations Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 8. What are some of the roles that programmers play in small organizations? Choose all that apply. a. hiring new programmers b. writing code c. configuring systems d. participating in strategic planning sessions ANSWER: RATIONALE:

b, c, d

The nature of smaller organizations requires a versatile skill set, allowing programmers to adapt to the diverse needs of the business, whether that involves writing code, configuring systems, or even participating in strategic planning sessions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.3 - Outline organizing maintenance operations TOPICS: Maintenance Operations Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 9. When a user submits a request for maintenance, who conducts an initial assessment to determine the severity

and justifiability of the issue? a. system administrator b. IT manager c. IT staff person d. help desk ANSWER: RATIONALE:

a

POINTS:

1

When a user submits a maintenance request, the system administrator conducts an initial assessment to determine the severity and justifiability of the issue.

Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 12 Maintenance & Support QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.3 - Outline organizing maintenance operations TOPICS: Maintenance Operations Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 10. When is configuration management considered essential? a. if a system has multiple versions that run on different hardware but same software environments b. if a system has multiple versions that run on the same virtual machines c. if a system has multiple versions that run on different hardware and software environments d. if a system has multiple versions that run on the same hardware and software environments ANSWER: RATIONALE:

c

Configuration management is essential if a system has multiple versions that run in different hardware and software environments.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.4 - Explain how configuration management ensures IT system stability during updates. TOPICS: Configuration Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 11. How is a maintenance release methodology used? Choose all that apply. a. All critical changes are held until they can be implemented simultaneously. b. Noncritical changes are implemented as they are released. c. Critical changes may be implemented immediately. d. All noncritical changes are held until they can be implemented simultaneously. ANSWER: RATIONALE:

c, d

Keeping track of maintenance changes and updates can take time and effort, especially for a complex system. When a maintenance release methodology is used, all noncritical changes are held until they can be implemented simultaneously. However, a new release to correct a critical error might be implemented immediately rather than saved for the next scheduled release.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.4 - Explain how configuration management ensures IT system stability during updates. TOPICS: Configuration Management Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 12 Maintenance & Support KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:10 PM 6/18/2024 1:10 PM

12. What are some of the disadvantages of a maintenance release methodology? Choose all that apply. a. Changes cannot be tested simultaneously before a new system version is released. b. There is less rapid response to users' issues and requests. c. Changes that would improve system efficiency or productivity must wait until the next release. d. This release methodology results in more versions, more expense, and more user interruptions. ANSWER: RATIONALE:

b, c, d

This release methodology has potential disadvantages. Users expect rapid responses to their problems and requests, but with this methodology, new features or upgrades are available less often. Changes that could improve system efficiency or user productivity must wait until the next release, potentially increasing operational costs. Additionally, there could be more versions, expenses, and user interruptions.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.4 - Explain how configuration management ensures IT system stability during updates. TOPICS: Configuration Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 13. What is the process for tracking system releases or editions? a. version control b. archive control c. tracking control d. release control ANSWER: RATIONALE:

a

Version control is the process of tracking system releases or versions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.4 - Explain how configuration management ensures IT system stability during updates. TOPICS: Configuration Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 14. A benchmark testing is a method to measure the performance of a system. It involves using a set of Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 12 Maintenance & Support

standardized tests to assess the capacity and efficiency of a system. Apart from benchmark testing, there are performance measurements, which allow for monitoring the number of transactions processed, the number of records accessed, and the amount of online data volume. What are these measurements called? a. response times b. throughputs c. baselines d. metrics ANSWER: RATIONALE:

d

In addition to benchmark testing, performance measurements called metrics can monitor the number of transactions processed in a given period, the number of records accessed, and the volume of online data. Network performance metrics include response time, bandwidth, throughput, and turnaround time.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.5 - Describe how fault management and capacity planning enhance IT system efficiency. TOPICS: System Performance Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 15. In a typical online environment, response time is measured from the moment a user presses the Enter key or

clicks a mouse button until the requested screen display appears or the printed output is ready. What are factors that can affect response time? Choose all that apply. a. system design b. capabilities c. processing method d. computer processing speed ANSWER: RATIONALE:

a, b, c

Response time is affected by the system design, capabilities, and processing methods.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.5 - Describe how fault management and capacity planning enhance IT system efficiency. TOPICS: System Performance Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 16. Throughput measures system performance under specific circumstances and is affected by network loads

and hardware efficiency. Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 12 Maintenance & Support a. true b. false ANSWER: RATIONALE:

a

Throughput measures system performance under specific circumstances and is affected by network loads and hardware efficiency. As traffic jams delay highway traffic, throughput limitations can slow system performance and response time.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.5 - Describe how fault management and capacity planning enhance IT system efficiency. TOPICS: System Performance Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 17. What is the specific metric that refers to the duration between submitting a request for information and

having it fulfilled? a. efficiency time b. fulfilment time c. response time d. turnaround time ANSWER: RATIONALE:

d

Turnaround time is a crucial metric in centralized batch processing operations, which are common in tasks such as customer billing or processing credit card statements. It specifically refers to the duration from when a request for information is submitted to when it has been completed.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.5 - Describe how fault management and capacity planning enhance IT system efficiency. TOPICS: System Performance Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 18. Which of the following emphasizes the importance of delivering high-quality support services to ensure

their interactions with IT systems are seamless, efficient, and satisfactory? a. QA in maintenance b. maintenance testing c. regression testing Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 12 Maintenance & Support d. QA in user support ANSWER: RATIONALE:

d

QA in user support emphasizes the importance of delivering high-quality support services to users, ensuring that their interactions with IT systems are seamless, efficient, and satisfactory. This dimension of QA involves establishing clear standards for response times, the accuracy of information provided, and the overall user experience during support interactions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.6 - List quality assurance components in system support and their service impact. TOPICS: Quality Assurance in System Support KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 19. What type of testing is focused on verifying maintenance activities, such as patch installations, configuration

changes, or software updates, so that they do not adversely affect system performance or introduce new issues? a. application testing b. support testing c. maintenance testing d. regression testing ANSWER: RATIONALE:

c

Maintenance testing ensures that systems remain functional and efficient after routine updates or modifications. This type of testing is focused on verifying that maintenance activities, such as patch installations, configuration changes, or software updates, do not adversely affect system performance or introduce new issues.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.6 - List quality assurance components in system support and their service impact. TOPICS: Quality Assurance in System Support KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 20. Barney is preparing to conduct a system test that aims to verify that the recent code changes and

enhancements have not negatively affected the system's existing functionality. What type of testing is Barney about to perform? a. performance testing b. support testing Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 12 Maintenance & Support c. maintenance testing d. regression testing ANSWER: RATIONALE:

d

Barney is preparing to conduct regression testing, which is a vital practice that aims to ensure that any new changes, updates, or improvements in the code do not adversely affect the existing functionality of the system. This type of testing is essential whenever modifications are made to the IT system, since it confirms that the introduction of new features or bug fixes do not have unintended consequences elsewhere.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.6 - List quality assurance components in system support and their service impact. TOPICS: Quality Assurance in System Support KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 21. Jenny is preparing to conduct a test that is essential for assessing the efficiency and scalability of IT systems

under diverse conditions. This test evaluates the system's speed, responsiveness, and stability, providing valuable insights into system capacity and performance. What type of test is Jenny about to perform? a. performance testing b. support testing c. maintenance testing d. regression testing ANSWER: RATIONALE:

a

Jenny is preparing to conduct performance testing, which is essential for assessing the efficiency and scalability of IT systems under diverse conditions. It evaluates the system's speed, responsiveness, and stability under a specific workload, providing valuable insights into system capacity limits and overall performance. Through performance testing, aided by tools such as BlazeMeter, organizations can identify bottlenecks and areas that require optimization, ensuring that the system can handle expected user loads without degradation in performance.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.6 - List quality assurance components in system support and their service impact. TOPICS: Quality Assurance in System Support KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 12 Maintenance & Support 22. What are some of the tools that IT security teams use to detect existing and emerging threats? Choose all

that apply. a. vulnerability scanners b. network protocol analyzer c. network scanning tools (Nmap/Zenmap) d. threat intelligence feeds ANSWER: RATIONALE:

a, d

IT security teams can detect existing and emerging threats using various tools and techniques, such as vulnerability scanners and threat intelligence feeds. This ongoing vigilance is crucial for staying ahead of potential attackers by understanding the landscape of vulnerabilities that could be exploited.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.7 - Explain how regular security updates and audits secure IT systems. TOPICS: Security Management in Maintenance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 23. Effective patch management strategies include testing patches in a controlled environment to verify

compatibility and functionality before widespread deployment, minimizing the risk of unintended system issues. a. true b. false ANSWER: RATIONALE:

a

Patch management is a core component of implementing security updates and systematically deploying patches to fix vulnerabilities within software and systems. Effective patch management strategies include testing patches in a controlled environment to verify compatibility and functionality before widespread deployment, minimizing the risk of unintended system issues.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.7 - Explain how regular security updates and audits secure IT systems. TOPICS: Security Management in Maintenance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 24. Adhering to compliance and standards is a significant aspect of the security update process for

organizations. Why is this important? Choose all that apply. a. Organizations must meet legal requirements. Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 12 Maintenance & Support b. Organizations must meet regulatory requirements. c. Organizations must meet industry-specific security requirements. d. Organizations must meet employment standards. ANSWER: RATIONALE:

a, b, c

Adhering to compliance and standards is a significant aspect of the security update process, ensuring that organizations meet legal, regulatory, and industry-specific security requirements. Regular updates and patches often include enhancements that address new compliance mandates, helping organizations avoid potential fines and legal issues. Keeping systems aligned with these standards is a matter of legal obligation and a best practice for maintaining high security and data protection levels.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.7 - Explain how regular security updates and audits secure IT systems. TOPICS: Security Management in Maintenance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 25. Why are backup strategies for data important? Choose all that apply. a. to protect against data loss due to disk space limitations b. to protect against data loss due to system failures c. to protect against data loss due to cyberattacks d. to protect against data loss due to human error ANSWER: RATIONALE:

b, c, d

Backup strategies are essential for data protection, providing a safety net against data loss due to system failures, cyberattacks, or human error. A well-designed backup strategy involves regularly creating data copies stored securely in separate locations from the primary data. This redundancy allows organizations to restore data quickly and efficiently, minimizing downtime and the potential impact on operations.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.7 - Explain how regular security updates and audits secure IT systems. TOPICS: Security Management in Maintenance KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 26. Jeff was a security analyst at a corporation with offices worldwide. The company invested in high-quality

security measures, including multifactor authentication, VPN, and firewalls. While taking a security course, Jeff discovered Zenmap and Fing. Zenmap is a network scanning tool that actively looks for open ports, and Fing is a network scanner and monitoring tool that catalogs and monitors all devices attached to the network-both WiFi and wired. It also allows the network administrator to block access to any device that is not recognized. Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 12 Maintenance & Support

Using these tools, he found several printers, Wi-Fi routers, and open ports that were not supposed to be there. He was even able to connect to the company network without authentication. Jeff and his team worked with the security operations center to close the open ports and remove unauthorized equipment from different locations worldwide. What type of security management is this? a. compliance and standards b. security audit c. vulnerability scanning d. mitigation scanning ANSWER: RATIONALE:

b

At the time, Jeff was unaware that the tools he was using were performing a security audit. These programs were able to identify several vulnerabilities, including open ports, inadequate access control measures (as Jeff was able to bypass them), and network configurations. Additionally, the company had not completed a network map, which meant they did not have an inventory of attached nodes on their network, nor did they know about the unauthorized nodes that were connected.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.7 - Explain how regular security updates and audits secure IT systems. TOPICS: Security Management in Maintenance KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 27. The establishment of clear and consistent documentation standards is vital for creating a unified approach to

managing and disseminating information within an organization. a. true b. false ANSWER: RATIONALE:

a

The establishment of clear and consistent documentation standards is vital for creating a unified approach to managing and disseminating information within an organization. These standards act as a blueprint for all documentation efforts, ensuring a cohesive format, structure, and style regardless of the document type.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.8 - Identify the benefits of updated documentation and knowledge bases for users. TOPICS: Documentation and Knowledge Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM

Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 12 Maintenance & Support 28. Who is the intended audience for technical documentation? a. those tasked with help desk operations b. those tasked with training end-users c. those tasked with maintenance and troubleshooting d. those tasked with regulations and compliance ANSWER: RATIONALE:

c

Aimed specifically at those tasked with maintenance and troubleshooting, technical documentation provides exhaustive details on system architecture, the underlying codebase, application programming interfaces (APIs), and the various points of integration that enable different components to work seamlessly together. Additionally, it outlines the standard operating procedures for routine maintenance tasks, system updates, and the resolution of any issues that may arise.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.8 - Identify the benefits of updated documentation and knowledge bases for users. TOPICS: Documentation and Knowledge Management KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 29. Why should support teams grant help desk personnel direct access to documentation that users consult?

Choose all that apply. a. security and confidentiality b. faster issue resolution c. accuracy d. empowerment ANSWER: RATIONALE:

b, c, d

The support team should allow the help desk personnel to have direct access to documentation for several reasons. Doing so can greatly assist the help desk in resolving user issues more efficiently and accurately. With direct access to documentation, the help desk personnel can quickly find relevant information needed to troubleshoot and resolve user issues without having to rely on intermediaries or escalate the problem to higher levels of support. This ensures faster issue resolution. Additionally, access to documentation ensures that help desk personnel provide accurate information and solutions to users' problems. Providing direct access to documentation empowers help desk personnel to take ownership of user inquiries and provide better support.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.8 - Identify the benefits of updated documentation and knowledge bases for users. Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 12 Maintenance & Support TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Documentation and Knowledge Management Bloom's: Analyze/Create/Evaluate 6/18/2024 1:10 PM 6/18/2024 1:10 PM

30. What type of issues can occur if a company uses a poorly designed knowledge base? Choose all that apply. a. increase in user frustration b. increased help desk support c. increase in productivity d. increase in information retrieval ANSWER: RATIONALE:

a, b

The following are some issues that could arise when using a poorly designed knowledge base. Users may become frustrated if they cannot find the answers they are looking for, which may lead them to give up or seek help from the help desk . If the knowledge base is not properly maintained, users may resort to contacting the help desk, resulting in an increase in the number of service call tickets and time spent on the phone with help desk personnel . These scenarios can lead to a decline in productivity and an increase in the amount of time that the help desk spends responding to system-related queries.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.8 - Identify the benefits of updated documentation and knowledge bases for users. TOPICS: Documentation and Knowledge Management KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 31. What are the number of stages involved in transitioning from an old system to a new one? a. three stages b. five stages c. seven stages d. nine stages ANSWER: RATIONALE:

b

System retirement and transition is a nuanced process requiring detailed planning and execution across five key stages to ensure a smooth shift from outdated systems to advanced technologies while preserving data integrity and minimizing disruptions.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.9 - Outline the steps for planning and executing IT system retirement and transition. Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 12 Maintenance & Support TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

System Retirement and Transition Bloom's: Remember/Understand 6/18/2024 1:10 PM 6/18/2024 1:10 PM

32. What is a critical phase in the life cycle management of IT systems, which marks the transition from active

use to decommissioning? a. data migration b. stakeholder communication c. planning for retirement d. data validation ANSWER: RATIONALE:

c

Identifying retirement criteria is the first step in planning an IT system's retirement. This involves setting clear, measurable benchmarks that signal when a system is no longer viable or beneficial to the organization.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.9 - Outline the steps for planning and executing IT system retirement and transition. TOPICS: System Retirement and Transition KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 33. Identifying retirement criteria is the first step in planning an IT system's retirement. This involves setting

clear, measurable benchmarks that signal when a system is no longer viable or beneficial to the organization. What are some of the criteria that may be included in retirement planning? Choose all that apply. a. increased maintenance costs b. decreased performance and reliability c. availability of more advanced technologies d. employee preferences ANSWER: RATIONALE:

a, b, c

Identifying retirement criteria is the first step in planning an IT system's retirement. This involves setting clear, measurable benchmarks that signal when a system is no longer viable or beneficial to the organization. Criteria may include increased maintenance costs, decreased performance and reliability, and the availability of more advanced technologies that offer enhanced capabilities.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.9 - Outline the steps for planning and executing IT system retirement and transition. Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 12 Maintenance & Support TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

System Retirement and Transition Bloom's: Remember/Understand 6/18/2024 1:10 PM 6/18/2024 1:10 PM

34. Which operation ensures that valuable information is not lost during the transition from the old system to a

new environment, allowing businesses to maintain continuity and access to historical data? a. data analysis b. data integrity c. data migration d. data mining ANSWER: RATIONALE:

c

Data migration is a pivotal phase in the system retirement process, involving carefully transferring data from the old system to a new environment. This operation ensures that valuable information is not lost during the transition, allowing businesses to maintain continuity and access to historical data. Effective data migration requires meticulous planning, execution, and validation to safeguard data integrity and minimize disruptions to operations.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.9 - Outline the steps for planning and executing IT system retirement and transition. TOPICS: System Retirement and Transition KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 35. Decommissioned IT equipment can be sent to any local recycling center once important data has been

erased. a. true b. false ANSWER: RATIONALE:

b

Decommissioned IT equipment must be sent to a certified e-waste recycling center that complies with local and international environmental standards and ensures that hazardous materials are properly contained and recycled.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.12.9 - Outline the steps for planning and executing IT system retirement and transition. TOPICS: System Retirement and Transition KEYWORDS: Bloom's: Remember/Understand Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 12 Maintenance & Support DATE CREATED: DATE MODIFIED:

6/18/2024 1:10 PM 6/18/2024 1:10 PM

Copyright Cengage Learning. Powered by Cognero.

Page 18


Ch 13 Managing Systems Security 1. Vulnerability assessment tools and techniques are crucial for identifying security threats and vulnerabilities. It

is equally important to establish a vulnerability management program. What are some of the security measures in that program? Choose all that apply. a. conflict resolution b. regular assessments c. timely patching d. continuous monitoring ANSWER: RATIONALE:

b, c, d

Establishing a vulnerability management program includes regular assessments, timely patching of software vulnerabilities, and continuous monitoring for suspicious activities.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.1 - Define key system security concepts. TOPICS: System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 2. Which of the following guidelines are blueprints that organizations can adopt and adapt to fit their specific

security needs and objectives? Choose all that apply. a. ISO/IEC 27000 series b. ISO/IEC 28000 series c. NIST Cybersecurity Framework d. PCI DSS ANSWER: RATIONALE:

a, c, d

Guidelines, such as the ISO/IEC 27000 series, NIST Cybersecurity Framework, and PCI DSS, are blueprints that organizations can adopt and adapt to fit their specific security needs and objectives. By adhering to these established frameworks and standards, organizations can ensure that their system security is aligned with best practices and industry benchmarks, facilitating a more systematic and successful approach to security management.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.1 - Define key system security concepts. TOPICS: System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 3. The legal implications of system security are vast, encompassing a range of obligations that organizations Copyright Cengage Learning. Powered by Cognero.

Page 1


Ch 13 Managing Systems Security

must fulfill to protect sensitive data and ensure privacy. Which regulations mandate strict controls over handling personal and sensitive information? Choose all that apply. a. FTC b. GDPR c. Sarbanes-Oxley (SOX) d. HIPAA ANSWER: RATIONALE:

b, d

Regulations such as General Data Protection Regulation (GDPR) in the European Union, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and various other data protection laws mandate strict controls over the handling of personal and sensitive information. Noncompliance with these legal requirements can result in hefty fines, legal actions, and other sanctions that can impact an organization's financial health and viability.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.1 - Define key system security concepts. TOPICS: System Security KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 4. Jonathan is an employee at a major aerospace company. Due to the nature of the company's work, they have

very strict security policies and procedures in place. When Jonathan started, he was given an employee handbook that described workplace conduct, employee benefits, and disciplinary procedures; an IT Security Policy Manual that covers the guidelines and procedures for safeguarding the company's information technology infrastructure and data; and finally, an acceptable use policy that outlined how an employee can use company resources. Jonathan was caught shopping online at his workstation using a company computer during business hours. This action was considered a violation. What policy was probably violated? a. acceptable use policy b. IT security policy c. employee handbook policy d. compliance policy ANSWER: RATIONALE:

a

Jonathan violated the acceptable use policy. He was shopping online at his workstation during business hours, and an acceptable use policy outlines how an employee may use company resources. Internet access is a company resource.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.1 - Define key system security concepts. TOPICS: System Security KEYWORDS: Bloom's: Analyze/Create/Evaluate Copyright Cengage Learning. Powered by Cognero.

Page 2


Ch 13 Managing Systems Security DATE CREATED: DATE MODIFIED:

6/18/2024 1:10 PM 6/18/2024 1:10 PM

5. Which type of attack floods a server with excessive requests to overload and incapacitate it? a. SQL injection b. ransomware attack c. denial-of-service attack (DoS) d. mail bombing ANSWER: RATIONALE:

c

A DoS attack floods a server with excessive requests to overload and incapacitate it. The goal of a DoS attack is to exhaust the resources of the target, such as bandwidth, processing power, or memory, making it unavailable to legitimate users.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.2 - Identify different attacker profiles and their motivations. TOPICS: Understanding and Mitigating Attacks KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 6. A man named Jenson Rust enters the reception area of a major corporation and informs the receptionist that

he has a meeting with the company's president, Elenore Frost. Jenson states that it is urgent, and that Elenore has requested to see him immediately, despite not having an appointment. Jenson seems to be in a hurry, breathing heavily, and visibly agitated, repeating his request in an angry tone. Although the receptionist has never seen Jenson before, his agitated state almost convinces her to allow him to proceed to Elenore's office. What is important to note here is, that in order to get to the executive offices, Jenson must go through a locked door that only the receptionist can open with a button from behind the desk. What is most likely happening in this situation? a. insider threat b. potential theft of property c. social engineering d. a competitor ANSWER: RATIONALE:

c

Jenson Rust engaged in an act of social engineering. He found the name of the company's president from their Facebook page and called the office to inquire about her schedule. Upon arriving at the office, he pretended to be agitated to manipulate the receptionist into allowing him access to the executive offices. This was a deceptive and manipulative tactic.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.2 - Identify different attacker profiles and their motivations. Copyright Cengage Learning. Powered by Cognero.

Page 3


Ch 13 Managing Systems Security TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:

Understanding and Mitigating Attacks Bloom's: Apply 6/18/2024 1:10 PM 6/18/2024 1:10 PM

7. Gena is the network administrator for a Fortune 500 company. Recently, she observed a slight reduction in

inter-network speeds compared to the network baseline that she established a few months ago. Furthermore, she has also noticed error readings in the audit logs for systems and security. Upon examining the logs, she discovered that these issues began about a month ago. What could be the cause of these issues on the company's network? a. A SQL (Structured Query Language) injection has happened. b. A phishing attack is underway. c. Someone is trying to install malware. d. An advanced persistent threat (APT) is underway. ANSWER: RATIONALE:

d

Over the course of the past month, there have been ongoing issues with the network. During this time, the network speed has decreased compared to the baseline speed measured a few months ago. In addition, errors have been appearing in the audit logs for both systems and security, despite everything working well during the last network audit. It is worth noting that Gena is employed by a Fortune 500 company, which indicates that the company has a high profile. It is possible that an advanced persistent threat is responsible for these issues.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.2 - Identify different attacker profiles and their motivations. TOPICS: Understanding and Mitigating Attacks KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 8. The efficacy of risk management lies in its structured approach to dealing with potential vulnerabilities and

threats. a. true b. false ANSWER: RATIONALE:

a

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

The efficacy of risk management lies in its structured approach to dealing with potential vulnerabilities and threats. It starts with thoroughly identifying risks combined with a detailed assessment to understand their impact and likelihood of an attack through identified threat vectors.

Copyright Cengage Learning. Powered by Cognero.

Page 4


Ch 13 Managing Systems Security LEARNING OBJECTIVES: Tilley.SAD13e.25.13.3 - List the steps involved in risk identification. TOPICS: Risk Management in System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 9. Which type of analysis leverages descriptive metrics to gauge the severity and probability of risks, yielding

an intuitive perspective on potential dangers? a. quantitative b. cumulative c. qualitative d. subjective ANSWER: RATIONALE:

c

Qualitative analysis is a technique used to examine descriptive metrics that are not easy to measure directly. It involves evaluating non-numerical data to recognize patterns, themes, or insights that can offer a more profound understanding of the subject being studied. This type of analysis also helps to assess the severity and likelihood of risks, resulting in an intuitive perspective on potential dangers.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.3 - List the steps involved in risk identification. TOPICS: Risk Management in System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 10. Which analysis seeks to measure risks with numerical values, grounding the assessment in statistical

evidence and mathematical models, for a more factual and objective outlook? a. qualitative b. cumulative c. quantitative d. subjective ANSWER: RATIONALE:

c

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Choice False

Quantitative analysis seeks to measure risks with numerical values, grounding the assessment in statistical evidence and mathematical models, for a more factual and objective outlook. For example, comparing risks by their impact values and vulnerability scores demonstrates how using numbers helps rank risks by their criticality. This method works, even though deciding on the exact numbers can be somewhat subjective.

Copyright Cengage Learning. Powered by Cognero.

Page 5


Ch 13 Managing Systems Security LEARNING OBJECTIVES: Tilley.SAD13e.25.13.3 - List the steps involved in risk identification. TOPICS: Risk Management in System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 11. Once risks have been assessed, the next step involves developing and implementing risk control strategies to

reduce the likelihood or impact of potential threats. Which of the following are risk control strategies? Choose all that apply. a. inheritance b. avoidance c. mitigation d. transference ANSWER: RATIONALE:

b, c, d

Avoidance eliminates the risk by adding protective safeguards. For example, a secure firewall might be installed to prevent unauthorized access to LAN computers. Mitigation reduces the impact of a risk through careful planning and preparation. For example, a company can prepare a disaster recovery plan for a natural disaster. Transference shifts the risk to another asset or party, such as an insurance company. Acceptance (which is not listed as one of the choices) means that nothing is done. Companies usually accept risk only when the protection is not worth the expense.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.3 - List the steps involved in risk identification. TOPICS: Risk Management in System Security KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 12. System hardening enhances security by stripping down a system to its essential components, eliminating

superfluous accounts, services, and functionalities that could serve as potential entry points for attackers. What are some steps that can harden a system? Choose all that apply. a. remove default user accounts b. implement file-sharing controls c. close unnecessary ports d. eliminate wireless devices (for example, mice and keyboards) ANSWER: RATIONALE:

a, b, c

POINTS: QUESTION TYPE: HAS VARIABLES:

1 Multiple Response False

Examples of ways to harden a device include removing default user accounts, implementing file-sharing controls, and closing unnecessary ports.

Copyright Cengage Learning. Powered by Cognero.

Page 6


Ch 13 Managing Systems Security LEARNING OBJECTIVES: Tilley.SAD13e.25.13.4 - Recall the different levels of systems security. TOPICS: Security Levels KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 13. What are some effective methods that can be used to protect storage devices from potential threats and

ensure their safety? Choose all that apply. a. enforcing a BIOS level password b. installing tamper-evident cases c. implementing data loss prevention d. applying locking cables ANSWER: RATIONALE:

b, c

Securing storage devices, whether they are internal or external, is critical to prevent theft, damage, or unauthorized access. To counter the risks introduced by the portability of USB drives and portable hard drives, it is essential to adopt strict usage policies, encryption, and secure storage. Moreover, applying tamper-evident cases can add a layer of security. These cases indicate unauthorized access attempts through mechanisms such as an indicator light that remains lit until reset by a password. Additionally, implementing data loss prevention (DLP) tools to monitor and control the flow of sensitive information onto external devices can amplify this protection. This measure ensures that data breaches and losses are minimized.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.4 - Recall the different levels of systems security. TOPICS: Security Levels KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 14. An insurance company used to hire contractors for their IT projects as needed. The contractors were given a

card key to access the building and a workstation in the IT department. After the completion of the project, the company would dismiss them and later rehire them for another project. One time, the company fired a contractor due to their unacceptable behavior, and they were asked to leave the building. About two months later, the Human Resources department was broken into, and some laptops were stolen. To address the situation, the company provided their employees with one year of free credit report monitoring. Later, it was discovered that the fired contractor was responsible for the theft. This incident brought to light the lack of physical security policy by the insurance company. Where were the weaknesses in the physical security of the company? Choose all that apply. a. operations department b. the card key c. the laptops d. passwords Copyright Cengage Learning. Powered by Cognero.

Page 7


Ch 13 Managing Systems Security ANSWER: RATIONALE:

b, c

The company made some mistakes that led to a security breach. First, they failed to collect the card key from the contractor before they left. Second, the laptops in the Human Resources department were not secured to the desks, they were attached to docking stations, making them easy to remove.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.4 - Recall the different levels of systems security. TOPICS: Security Levels KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 15. How do role-based access control (RBAC) systems manage and restrict access to sensitive information and

critical systems? Choose all that apply. a. They only allow access during certain times of the day. b. They define roles based on job functions. c. They adhere to the principle of least privilege. d. They allow the owner of a file or folder to choose who gets permission accessing those files or

folders. ANSWER: RATIONALE:

b, c

Role-based access control (RBAC) systems is a security mechanism in which roles are defined based on job functions. Permissions are then assigned to these roles, and users are associated with the appropriate roles. This method provides several benefits, including enhanced security by adhering to the principle of least privilege, simplification of user permissions management, and more efficient onboarding and offboarding of employees.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.5 - Name key components of developing and implementing security policies. TOPICS: Procedural and Organizational Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 16. Business continuity planning (BCP) is a strategic and operational framework that prepares organizations to

maintain essential functions during and after a disruption. What can be considered a business disruption? Choose all that apply. a. cyberattack b. tornado watch Copyright Cengage Learning. Powered by Cognero.

Page 8


Ch 13 Managing Systems Security c. power outage d. downed power line ANSWER: RATIONALE:

a, c

A cyberattack can be very disruptive to a business because it can cause all IT resources to go offline, leaving the company without its data. Similarly, a power outage can have the same effect, but it may also result in a power surge when the power is restored, which could damage electronic equipment.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.5 - Name key components of developing and implementing security policies. TOPICS: Procedural and Organizational Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 17. Dumpster diving is a type of social engineering that involves searching through a trash bin to find valuable

information about a target. Since dumpsters are not covered under the Fourth Amendment (protection against unreasonable search and seizure), it can be challenging to prevent anyone from rummaging through a dumpster. What is the best way for a company to protect itself against dumpster diving? Choose all that apply. a. use a strip shredder b. shred documents into confetti c. hire a mobile shredding service d. tear documents manually ANSWER: RATIONALE:

b, c

A crosscut (confetti) shredder is the best way to keep information from getting into the wrong hands as it turns documents into confetti, which makes it impossible to put documents back together. If you have too many documents to shred, look into purchasing the services of a mobile document shredding company. They will come to your door and shred your documents while you wait.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.5 - Name key components of developing and implementing security policies. TOPICS: Procedural and Organizational Security KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 18. During the Macy's Thanksgiving Day parade in 2012, an incident occurred in which a police officer threw

shredded police documents into the crowd as confetti. Unfortunately, the documents that were tossed in the air contained sensitive information such as Mitt Romney's motorcade routes, people's arrest records, and Copyright Cengage Learning. Powered by Cognero.

Page 9


Ch 13 Managing Systems Security

identifying information of undercover officers. The shredding process used for these documents was stripshredding, which made it very easy to read the information. What kind of security failure was this? Choose all that apply. a. access security b. network security c. operational security d. physical security ANSWER: RATIONALE:

c, d

Physical security is an integral part of operational security. However, in this scenario, both aspects have failed. Operationally, there was no culture that emphasized the importance of security, and physically, there were no security measures in place to prevent someone from taking shredded highly confidential information out of the office and using it for entertainment.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.5 - Name key components of developing and implementing security policies. TOPICS: Procedural and Organizational Security KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 19. Which data backups are the most expedient but necessitate a multistep restoration process? a. incremental b. immutable c. continuous d. full ANSWER: RATIONALE:

a

Incremental backups are the most expedient but necessitate a multistep restoration process.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.6 - Identify the essential elements of effective backup policies. TOPICS: Backup and Recovery Strategies KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 20. Which backups process cannot be altered or deleted for a set period and provides an additional defense

against ransomware? Copyright Cengage Learning. Powered by Cognero.

Page 10


Ch 13 Managing Systems Security a. incremental b. immutable c. continuous d. full ANSWER: RATIONALE:

b

Implementing immutable backups, which cannot be altered or deleted for a set period, provides an additional defense against ransomware. These backups ensure that pristine copies of data remain available for recovery even in the event of an attack.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.6 - Identify the essential elements of effective backup policies. TOPICS: Backup and Recovery Strategies KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 21. Marion's company is developing a document that outlines the processes and procedures needed to restore IT

data systems, data access, and infrastructure after a catastrophic event. What is this document called? a. business continuity planning (BCP) b. disaster recovery planning (DRP) c. data backup planning (DBP) d. malware recovery planning (MRP) ANSWER: RATIONALE:

b

Disaster recovery planning (DRP) focuses on restoring IT systems, data access, and infrastructure following a catastrophic event. It is a specialized component of organizational resilience focusing on technical recovery, distinguishing itself from broader business continuity planning by emphasizing IT assets. DRP outlines the steps and technologies needed to recover lost data and restore IT operations, which is crucial for resuming business activities after a severe disruption.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.6 - Identify the essential elements of effective backup policies. TOPICS: Backup and Recovery Strategies KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 22. Which backup methodology employs real-time data streaming and ensures immediate data recovery by

leveraging RAID (redundant array of independent disks) systems for enhanced reliability and performance? a. incremental b. immutable Copyright Cengage Learning. Powered by Cognero.

Page 11


Ch 13 Managing Systems Security c. continuous d. full ANSWER: RATIONALE:

c

Continuous backups employ real-time data streaming to ensure immediate data recovery by leveraging RAID (redundant array of independent disks) systems for enhanced reliability and performance. RAID systems are called fault-tolerant because a failure of any one disk does not disable the system.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.6 - Identify the essential elements of effective backup policies. TOPICS: Backup and Recovery Strategies KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 23. Cyberethics encompasses the study and evaluation of ethical issues and standards related to the use of IT. a. true b. false ANSWER: RATIONALE:

a

Cyberethics encompasses the study and evaluation of ethical issues and standards related to the use of IT. It involves analyzing the impact of digital technologies on society, individuals, and organizations as well as establishing principles for responsible behavior in cyberspace.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.7 - List major cyberethics principles and data protection laws. TOPICS: Legal and Ethical Considerations in System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 24. What are some technical solutions for protecting intellectual property rights (IPR)? Choose all that apply. a. air gapping b. digital rights management (DRM) systems c. encryption d. access controls ANSWER: RATIONALE:

b, c, d

The protection of IPR requires a combination of legal, technical, and organizational processes. Technological solutions such as digital rights management (DRM) systems, encryption, and access controls can prevent unauthorized access and distribution of protected works. At the same time, legal mechanisms offer recourse

Copyright Cengage Learning. Powered by Cognero.

Page 12


Ch 13 Managing Systems Security

for rights holders in cases of infringement. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.7 - List major cyberethics principles and data protection laws. TOPICS: Legal and Ethical Considerations in System Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 25. What solutions exist for privacy issues related to data protection regulations and individual rights over

personal information? Choose all that apply. a. anonymization b. obfuscation c. encryption d. pseudonymization ANSWER: RATIONALE:

a, d

Solutions to privacy issues also involve regulatory frameworks that set standards for data protection and give individuals rights over their personal information. Technologies such as anonymization and pseudonymization can further enhance privacy by ensuring that data cannot be easily linked to specific individuals.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.7 - List major cyberethics principles and data protection laws. TOPICS: Legal and Ethical Considerations in System Security KEYWORDS: Bloom's: Apply DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 26. Cyberethics touches on privacy, intellectual property, and human rights, providing a framework for ethical

decision making in the face of emerging technological challenges. a. true b. false ANSWER: RATIONALE:

b

Cyberethics touches on privacy, intellectual property, and access rights, providing a framework for ethical decision making in the face of emerging technological challenges.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.7 - List major cyberethics principles and data protection laws. TOPICS: Legal and Ethical Considerations in System Security Copyright Cengage Learning. Powered by Cognero.

Page 13


Ch 13 Managing Systems Security KEYWORDS: DATE CREATED: DATE MODIFIED:

Bloom's: Remember/Understand 6/18/2024 1:10 PM 6/18/2024 1:10 PM

27. The use of AI in cybersecurity can enhance the speed and accuracy of threat detection, allowing

organizations to respond to attacks more quickly. However, challenges exist when using AI in cybersecurity. What could be considered a challenge? Choose all that apply. a. false positives b. continuous algorithm training c. analyzing vast amounts of data d. training on historical data ANSWER: RATIONALE:

a, b

Reliance on AI in cybersecurity introduces new challenges, such as the risk of false positives and the need for continuous algorithm training to adapt to evolving threats.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.8 - Describe the impact of emerging technologies on system security. TOPICS: Emerging Technologies and Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 28. Cloud service providers typically offer a range of built-in security features designed to protect their

infrastructure and services, and are responsible for securing the common cloud-hosted data and applications. a. true b. false ANSWER: RATIONALE:

b

Cloud service providers typically offer a range of built-in security features designed to protect their infrastructure and services. However, the users are ultimately responsible for securing cloud-hosted data and applications.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.8 - Describe the impact of emerging technologies on system security. TOPICS: Emerging Technologies and Security KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 29. Internet of Things (IoT) devices are commonly used in companies and homes. Unfortunately, security for

these devices is not a top priority for most manufacturers. With the availability of new Bluetooth hacking software and the absence of a universal security protocol, it's crucial to find the best solution to enable these Copyright Cengage Learning. Powered by Cognero.

Page 14


Ch 13 Managing Systems Security

devices to connect to a company network while keeping the network safe from potential attacks. At this time, what is the best solution to this problem? a. restrict IoT devices on the network b. keep IoT devices on a segmented network c. rely on updated anti-virus/anti-malware software d. keep the network patched and updated ANSWER: RATIONALE:

b

One of the most effective ways to prevent intruders from infiltrating the main production network is to isolate IoT devices on their own network segment. By applying the principle of least privilege, IoT devices should only be granted access to the minimum network resources they require, such as Internet access. This approach can help improve security until better IoT security solutions become available.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.8 - Describe the impact of emerging technologies on system security. TOPICS: Emerging Technologies and Security KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 30. In the field of cybersecurity, continuous education and training are vital due to the constantly evolving threat

landscape and technology ecosystem. a. true b. false ANSWER: RATIONALE:

a

In the field of cybersecurity, continuous education and training are vital due to the constantly evolving threat landscape and technology ecosystem. Such continuous learning initiatives inform the workforce about cybersecurity threats and the necessary measures to mitigate them.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.9 - Identify the components of a resilient cybersecurity culture. TOPICS: Building a Resilient Cybersecurity Culture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 31. What is the term used to denote when security features are embedded early in the development and adoption

phases to mitigate risks? a. integrity by design Copyright Cengage Learning. Powered by Cognero.

Page 15


Ch 13 Managing Systems Security b. encryption by design c. security by design d. defense by design ANSWER: RATIONALE:

c

Integrating emerging technologies into security strategies is a pivotal aspect of modern cybersecurity efforts, requiring a careful balance between innovation and risk management. Adopting a "security by design" approach is crucial, embedding security features early in the development and adoption phases to mitigate risks. The word "defense" may have a similar meaning but does not generally refer specifically to systems security.

POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.9 - Identify the components of a resilient cybersecurity culture. TOPICS: Building a Resilient Cybersecurity Culture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 32. Why is it essential to involve all employees in cybersecurity and incorporate their feedback? Choose all that

apply. a. risk management b. collective responsibility c. engaged culture d. forward-looking ANSWER: RATIONALE:

b, c, d

This focus on adaptability keeps security agile and aligned with the rapidly changing threat environment. Involving all employees in cybersecurity and incorporating their feedback emphasizes a collective responsibility for security and ongoing improvement. Additionally, planning for emerging threats is vital for a robust cybersecurity posture. This underscores the need for a dynamic, engaged, and forward-looking cybersecurity culture, enabling organizations to remain resilient and secure in a landscape of continuous digital evolution and new challenges.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.9 - Identify the components of a resilient cybersecurity culture. TOPICS: Building a Resilient Cybersecurity Culture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 33. An adaptive cybersecurity culture prioritizes agility and adaptability, enabling organizations to reassess and

refine their security tactics. What is required of the employees in this environment? Choose all that apply. Copyright Cengage Learning. Powered by Cognero.

Page 16


Ch 13 Managing Systems Security a. ongoing education b. open communication c. employee retention d. employee engagement ANSWER: RATIONALE:

a, b, d

An adaptive cybersecurity culture requires a commitment to ongoing education, open communication, and employee engagement. This culture prioritizes agility and adaptability, enabling organizations to continually reassess and refine their security tactics.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.9 - Identify the components of a resilient cybersecurity culture. TOPICS: Building a Resilient Cybersecurity Culture KEYWORDS: Bloom's: Remember/Understand DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 34. What should be considered the biggest threats to an organization's cybersecurity culture? Choose all that

apply. a. indecisiveness b. employee attrition c. complacency d. lack of leadership ANSWER: RATIONALE:

c, d

In today's rapidly changing threat landscape, it is important for organizations to avoid complacency since it is the biggest risk to their cybersecurity culture. If management does not lead the battle for cybersecurity and if employees are not up to date on the latest threat vectors and IT is not knowledgeable about the latest mitigation tools, it becomes easier for cybercriminals to infiltrate the company's network. Simply believing that "our company has nothing to offer" is not enough. Companies should be aware that it's not a matter of IF they will be attacked, but WHEN they will be attacked.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.9 - Identify the components of a resilient cybersecurity culture. TOPICS: Building a Resilient Cybersecurity Culture KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM 35. A policy is a high-level statement or principle that outlines the organization's stance, intent, or direction on a Copyright Cengage Learning. Powered by Cognero.

Page 17


Ch 13 Managing Systems Security

particular matter. A procedure is a detailed, step-by-step set of instructions that outlines how specific tasks or processes should be performed within the organization. Which of the following are considered policies? Choose all that apply. a. acceptable use b. employee conduct c. network shutdown d. emergency evacuation ANSWER: RATIONALE:

a, b

A policy is a statement or principle that outlines an organization's stance, intent, or direction on a particular matter. In the case of acceptable use policy, it outlines how employees are allowed to use company resources, while employee conduct policy outlines how employees must behave. However, implementing and enforcing such policies can be challenging without the unwavering support of management across all levels.

POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Tilley.SAD13e.25.13.9 - Identify the components of a resilient cybersecurity culture. TOPICS: Building a Resilient Cybersecurity Culture KEYWORDS: Bloom's: Analyze/Create/Evaluate DATE CREATED: 6/18/2024 1:10 PM DATE MODIFIED: 6/18/2024 1:10 PM

Copyright Cengage Learning. Powered by Cognero.

Page 18


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.