TEST BANK for Modern Systems Analysis and Design 9th Edition by Joseph Valacich, Joey George and Jef

Page 1


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 1 The Systems Development Environment 1) ________ would be classified as software designed to support the payroll function. A) System software B) Design software C) Analysis software D) Application software Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 2) ________ is designed to support organizational functions or processes. A) Application software B) Design software C) Analysis software D) Testing software Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 3) What are computer programs that make it easy to use and benefit from techniques and to faithfully follow the guidelines of the overall development methodology? A) Tools B) Techniques C) Data flow D) Methodologies Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 4) Who has the primary responsibility for the design and analysis of information systems? A) Systems analyst B) Software engineer C) Employees D) Applications developer Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 1 Copyright © 2020 Pearson Education, Inc.


5) ________ is/are the process(es) that an analyst will follow to help ensure that his work is complete, well-done, and understood by project team members. A) Tools B) Techniques C) Data flow D) Methodologies Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 6) The first procedural, or third-generation, computer programming languages did not become available until the beginning of the ________. A) 1950s B) 1960s C) 1970s D) 1980s Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 7) Because computers were so expensive, computer memory was also at a premium, so system developers conserved as much memory as possible for ________. A) System design B) System analysis C) Data analysis D) Data storage Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 8) ________ are large, complex systems that consist of a series of independent system modules. A) Supply chain management systems B) Enterprise-wide systems C) Customer relationship management systems D) Transaction processing systems Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 2 Copyright © 2020 Pearson Education, Inc.


9) ________ were developed to make systems developers' work easier and more consistent. A) Data analysis tools B) Computer-aided software engineering (CASE) tools C) Software designing tools D) Modeling tools Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 10) Most organizations find it beneficial to use a standard set of steps, called ________, to develop and support their information systems. A) Systems development methodology B) Supply chain management systems C) Analytical processing systems D) Customer relationship management systems Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 11) Which of the below is a traditional methodology used to develop, maintain, and replace information systems? A) Prototyping B) OOAD C) RAD D) SDLC Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 12) Information systems analysis and design is a process to develop and maintain computerbased information systems. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


13) Ninety-four percent of companies report that they practice agile in their systems development efforts. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 14) To be effective, techniques and tools must both be consistent with an organization's systems development methodology. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 15) Techniques and tools must make it difficult for system developers to conduct the steps called for in the methodology. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 16) An organizational approach to systems analysis and design is not driven by methodologies. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 17) The analysis and design of computer-based information systems began in the 1950s. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 18) Most organizations never developed their applications from scratch using their in-house development staff. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


19) Who is a systems analyst and what are the duties of a systems analyst? Answer: Many people in organizations are responsible for systems analysis and design; in most organizations the systems analyst has the primary responsibility. When you begin your career in systems development, you will most likely begin as a systems analyst or as a programmer with some systems analysis responsibilities. The primary role of a systems analyst is to study the problems and needs of an organization in order to determine how people, methods, and information technology can best be combined to bring about improvements in the organization. A systems analyst helps system users and other business managers define their requirements for new or enhanced information services. As such, a systems analyst is an agent of change and innovation. Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Synthesis 20) What is an application software and its importance? Answer: An important (but not the only) result of systems analysis and design is application software, software designed to support a specific organizational function or process, such as inventory management, payroll, or market analysis. In addition to application software, the total information system includes the hardware and systems software on which the application software runs, documentation and training materials, the specific job roles associated with the overall system, controls, and the people who use the software along with their work methods. Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Synthesis 21) What is meant by system methodologies, techniques, and tools? Answer: Methodologies are comprehensive, multiple-step approaches to systems development. Techniques are particular processes that you follow to help ensure that your work is complete, well done, and understood by others. Tools are typically computer programs that make it easier to use and benefit from techniques and to follow faithfully the guidelines of the overall development methodology. The techniques and tools should support the chosen methodology. Methodologies, techniques, and tools work together to form an organizational approach to systems analysis and design. Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Synthesis

5 Copyright © 2020 Pearson Education, Inc.


22) What is a system development methodology? Answer: Most organizations find it beneficial to use a standard set of steps, called a systems development methodology, to develop and support their information systems. Like many processes, the development of information systems often follows a life cycle. For example, a commercial product follows a life cycle in that it is created, tested, and introduced to the market. Its sales increase, peak, and decline. Finally, the product is removed from the market and replaced by something else. Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Synthesis 23) What are the five major phases of the SDLC? Answer: The major SDLC phases include planning, analysis, design, implementation, and maintenance. Planning is the first phase of the SDLC in which an organization's total information system needs are identified, analyzed, prioritized, and arranged. Analysis is the second phase of the SDLC in which system requirements are studied and structured. During the third phase, the design phase, a description of the recommended solution is converted into logical and then physical system specifications. Implementation is the fourth phase of the SDLC in which the information system is coded, tested, installed, and supported in the organization. Maintenance is the fifth and final phase of the SDLC in which an information system is systematically repaired and improved. Difficulty: Moderate AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Synthesis 24) Which of the below is a true statement regarding the systems development life cycle? A) The SDLC is not iterative. B) It is not possible to complete some activities in one phase in parallel with those of another phase. C) The life cycle can be thought of as a circular process in which the end of the useful life of one system leads to the beginning of another project to develop a new version of or replace an existing system. D) The life cycle can be thought of as a linear process in which the end of the useful life of one system leads to the beginning of another project to develop a new version of or replace an existing system. Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


25) Which of the following is NOT a part of the Evolutionary model of the SDLC process? A) Analysis B) Design C) Planning D) Procedure Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 26) What is the first phase in the Systems Development Life Cycle? A) Analysis B) Design C) Planning D) Procedure Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 27) Which of the following activities happens during the SDLC planning phase? A) A presentation of why the system should or should not be developed by the organization is given. B) New system requirements are identified. C) The high level design is prepared. D) User acceptance testing is performed. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 28) In which phase of the SDLC are the system requirements studied and structured? A) Implementation B) Analysis C) Design D) Planning Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


29) Which SDLC phase focuses on the needs of the entire organization? A) Design B) Planning C) Logical D) Analysis Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 30) In which phase of the SDLC is the description of the recommended solution converted into logical and then physical system specifications? A) Implementation B) Analysis C) Design D) Planning Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 31) In which design phase of the SDLC are all functional features of the system chosen for development in analysis described independently of any computer platform? A) Logical design B) Physical design C) Conceptual design D) High level design Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 32) In which design phase of the SDLC are logical specifications of the system from logical design transformed into technology-specific details from which all programming and system construction can be accomplished? A) Logical design B) Physical design C) Conceptual design D) High level design Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 8 Copyright © 2020 Pearson Education, Inc.


33) In which phase of the SDLC is the information system coded, tested, installed, and supported in the organization? A) Implementation B) Analysis C) Design D) Planning Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 34) Which is the fourth phase in a SDLC cycle? A) Maintenance B) Analysis C) Design D) Implementation Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 35) In which part of the design phase of the SDLC are the logical specifications of the system from logical design transformed into technology-specific details from which all programming and system construction can be accomplished? A) Implementation B) Object modeling C) Physical design D) Logical design Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


36) Which of the following is correct with respect to the logical design? A) All functional features of the system chosen for development in analysis are described independently of any computer platform. B) Logical design does not concentrate on the business aspects of the system. C) Logical design is tied to a specific hardware and software platform. D) Technical specifications are developed. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 37) In which phase of the SDLC is an information system systematically repaired and improved? A) Implementation B) Analysis C) Design D) Maintenance Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 38) Which of the following are delivered after the completion of planning phase? A) Functional, detailed specifications of all system elements B) Description of all functional features of the proposed system C) Code, documentation, training procedures, and support capabilities D) Detailed steps, or work plan, for project Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 39) ________ is/are the final output from the analysis phase. A) Physical system specifications B) Work plan for the project C) Priorities for systems and projects proposal D) A description of the alternative solution Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


40) Which of the following are delivered after the completion of the implementation phase? A) Code, documentation, training procedures, and support capabilities B) Functional, detailed specifications of all system elements C) Description of current system and where problems and opportunities are with a general recommendation on how to fix, enhance, or replace current system D) Priorities for systems and projects; an architecture for data, networks, and selection hardware, and IS management are the result of associated systems Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 41) Which of the following are delivered after the completion of analysis phase? A) Functional, detailed specifications of all system elements B) Priorities for systems and projects; an architecture for data, networks, and selection hardware, and IS management are the result of associated systems C) Code, documentation, training procedures, and support capabilities D) Description of current system and where problems and opportunities are with a general recommendation on how to fix, enhance, or replace current system Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 42) Which of the below is NOT a true statement regarding the SDLC? A) It is a highly linked set of phases whose products feed the activities in subsequent phases. B) The different phases are clearly defined. C) The relationships between phases are well specified. D) It is a rapid method to prototype and develop an application. Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


43) Which of the following are delivered after the completion of the Maintenance phase of the SDLC? A) New versions or releases of software with associated updates to documentation, training, and support B) Functional, detailed specifications of all system elements C) Priorities for systems and projects; an architecture for data, networks, and selection hardware, and IS management are the result of associated systems D) Code, documentation, training procedures, and support capabilities Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 44) All of these are reasons to begin designing a system replacement except ________. A) when the information system is no longer performing as desired. B) when maintenance costs become prohibitive. C) when the organization needs have substantially changed. D) when the system has reached the time limit of seven years. Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 45) Which of the following is a drawback of the traditional waterfall SDLC approach? A) Users are locked into requirements. B) There are no criticisms. C) The process is too chaotic. D) It is too short of a process. Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 46) Which of the following is NOT a criticism of the traditional waterfall SDLC approach? A) Prototypes do not work properly. B) Users are locked into requirements. C) The role of customers is narrowly defined. D) Intangible processes are given hard and fast dates. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 12 Copyright © 2020 Pearson Education, Inc.


47) Which of the following is a criticism of the software development life cycle? A) Reliance on the life-cycle approach has forced dynamic processes into time phases doomed to fail. B) Life-cycle reliance has created a lack of documentation for the system. C) There it too much feedback in between phases causing the projects to take too long to complete. D) The life-cycle is too short to create meaningful applications. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 48) In the 1990s, developer used visual basic to design the user interfaces that ________. A) Used SAP B) Created the web C) Run client/server platforms D) Enhanced wireless protocols Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 49) Barbara has the primary responsibility for systems analysis and design for the new project because she is the ________. A) Chief information officer B) Primary user of the system C) Methodology specialist D) Systems analyst Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 50) Jim had to give a presentation and list the reasons why the system should not be developed during the organization because the project is in the ________. A) Planning phase B) Analysis phase C) Design phase D) Logical design phase Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 13 Copyright © 2020 Pearson Education, Inc.


51) Kyle is participating in the ________ of the design phase as he turns the logical design into technology specific details so the programming can be accomplished. A) Constructing of the system requirements portion B) Documentation C) Logical design D) Physical design Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 52) Which of the following is one of three key principles shared by the Agile Methodologies? A) A focus on self-adaptive processes B) A focus on roles C) A focus on predictive methodologies D) A focus on passive processes Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 53) Most organizations found it difficult to use the systems development methodology to develop and support their information systems. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 54) The systems development life cycle (SDLC) is a rare methodology for systems development in many organizations. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


55) The life cycle can be thought of as a linear process in which the end of the useful life of one system leads to the beginning of another project that will develop a new version or replace an existing system altogether. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 56) In the SDLC, it is not possible to complete some activities in one phase in parallel with some activities of another phase. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 57) The third phase in the SDLC is planning and in this phase the analyst thoroughly studies the organization's current procedures and the information systems used to perform organizational tasks. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 58) The part of the design process that is independent of any specific hardware or software platform is referred to as logical design. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 59) As part of logical design, analysts design the various parts of the system to perform the physical operations necessary to facilitate data capture, processing, and information output. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


60) Maintenance is a separate phase and not the repetition of the other life cycle phases to study and implement the needed changes. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 61) The SDLC is a highly linked set of phases whose products feed the activities in subsequent phases. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 62) New versions or releases of software with associated updates to documentation, training, and support are not part of the maintenance phase. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 63) Every company uses the same information systems development life cycle (SDLC) Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 64) Although almost all systems development projects adhere to some type of life cycle, the exact location of activities and the specific sequencing of steps can vary greatly from one project to the next. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


65) Explain in detail the importance of the analysis phase of the SDLC. Answer: The second phase in the SDLC is analysis. During this phase, the analyst thoroughly studies the organization's current procedures and the information systems used to perform organizational tasks. Analysis has two subphases. The first is requirements determination. In this sub-phase, analysts work with users to determine what the users want from a proposed system. The requirements determination process usually involves a careful study of any current systems, manual and computerized, that might be replaced or enhanced as part of the project. Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis 66) Explain the design phase in the SDLC and its types. Answer: The third phase in the SDLC is design. During design, analysts convert the description of the recommended alternative solution into logical and then physical system specifications. The analysts must design all aspects of the system, from input and output screens to reports, databases, and computer processes. The analysts must then provide the physical specifics of the system they have designed, either as a model or as detailed documentation, to guide those who will build the new system. That part of the design process that is independent of any specific hardware or software platform is referred to as logical design. Theoretically, the system could be implemented on any hardware and systems software. The idea is to make sure that the system functions as intended. Logical design concentrates on the business aspects of the system and tends to be oriented to a high level of specificity. Once the overall high-level design of the system is worked out, the analysts begin turning logical specifications into physical ones. This process is referred to as physical design. As part of physical design, analysts design the various parts of the system to perform the physical operations necessary to facilitate data capture, processing, and information output. Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis

17 Copyright © 2020 Pearson Education, Inc.


67) Explain the importance of the implementation phase in the SDLC process. Answer: The fourth phase in the SDLC is implementation. The physical system specifications, whether in the form of a detailed model or as detailed written specifications, are turned over to programmers as the first part of the implementation phase. During implementation, analysts turn system specifications into a working system that is tested and then put into use. Implementation includes coding, testing, and installation. During coding, programmers write the programs that make up the system. Sometimes the code is generated by the same system used to build the detailed model of the system. During testing, programmers and analysts test individual programs and the entire system in order to find and correct errors. During installation, the new system becomes part of the daily activities of the organization. Application software is installed, or loaded, on existing or new hardware, and users are introduced to the new system and trained. Testing and installation should be planned for as early as the project initiation and planning phase; both testing and installation require extensive analysis in order to develop exactly the right approach. Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis 68) Explain the importance of the maintenance phase in the SDLC process. Answer: The fifth and final phase in the SDLC is maintenance. When a system (including its training, documentation, and support) is operating in an organization, users sometimes find problems with how it works and often think of better ways to perform its functions. Also, the organization's needs with respect to the system change over time. In maintenance, programmers make the changes that users ask for and modify the system to reflect evolving business conditions. These changes are necessary to keep the system running and useful. In a sense, maintenance is not a separate phase but a repetition of the other life cycle phases required to study and implement the needed changes. One might think of maintenance as an overlay on the life cycle rather than as a separate phase. The amount of time and effort devoted to maintenance depends a great deal on the performance of the previous phases of the life cycle. There inevitably comes a time, however, when an information system is no longer performing as desired, when maintenance costs become prohibitive, or when an organization's needs have changed substantially. Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis

18 Copyright © 2020 Pearson Education, Inc.


69) List the outputs delivered from each of the SDLC phases. Answer: Products for the planning phase include priorities for systems and projects; an architecture for data, networks, and selection hardware as well as IS management; detailed steps, or work plan, for the project; specification of system scope and high-level system requirements or features; assignment of team members and other resources; and the system justification or business case. The products for the analysis phase include a description of the current system and where problems or opportunities are with a general recommendation on how to fix, enhance, or replace the current system; and an explanation of alternative systems and justification. The design phase provides functional, detailed specifications of all system elements; technical, detailed specifications of all system elements; and an acquisition plan for new technology. Implementation provides code, documentation, training procedures, and support capabilities. Maintenance products include new versions or releases of software with associated updates to documentation, training, and support. Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis 70) What happens during testing and installation of the new systems during the implementation phase of the software development life cycle? Answer: During testing, programmers and analysts test individual programs and the entire system in order to find and correct errors. During installation, the new system becomes part of the daily activities of the organization. Application software is installed, or loaded, on existing or new hardware, and users are introduced to the new system and trained. Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis 71) Describe the criticism of traditional waterfall SDLC process. Answer: There are several criticisms of the traditional life-cycle approach to systems development. One relates to the way the life cycle is organized. Note how the flow of the project begins in the planning phase and from there runs "downhill" to each subsequent phase, just like a stream that runs off a cliff. It became too tempting to ignore the need for feedback and to treat each phase as complete unto itself, never to be revisited once finished. Another criticism of the traditional waterfall SDLC is that the role of system users or customers was narrowly defined. User roles were often relegated to the requirements determination or analysis phases of the project, where it was assumed that all of the requirements could be specified in advance. Such an assumption, coupled with limited user involvement, reinforced the tendency of the waterfall model to lock in requirements too early, even after business conditions had changed. Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Synthesis

19 Copyright © 2020 Pearson Education, Inc.


72) Which of the following is NOT true regarding iterative development? A) It is a mechanism for dealing with a lack of predictability. B) It focuses on the frequent production of working versions of a system. C) It provides feedback to customers. D) Feedback is not provided to developers and customers. Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 73) Computer-aided software engineering (CASE) tools were developed to make systems developers' work easier and more consistent. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 74) Which of the following is NOT valued according to the Agile Manifesto for software development? A) Responding to change over following a plan B) Working software over comprehensive documentation C) Prioritizing the plan over the change required D) Individuals and interactions over processes and tools Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 75) Which of the below is NOT considered as the principle as per the agile manifesto? A) Working software is the primary measure of progress. B) Continuous attention to technical excellence and good design enhances agility. C) Businesspeople and developers work separately throughout the project. D) The best architectures, requirements, and designs emerge from self-organizing teams. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


76) There are five factors that separate agile from traditional approaches to systems development. The factor "Criticality" describes which of the following agile methods factors? A) Well matched to small products and teams B) Untested on safety-critical products C) Requires continuous presence of a critical mass of scarce experts D) Thrives in a culture where people feel comfortable and empowered by having many degrees of freedom Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 77) Under the five critical factors "Thrives in a culture where people feel comfortable and empowered by having many degrees of freedom" is related to which factor? A) Personnel B) Dynamism C) Size D) Culture Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 78) The critical factor "Personnel" is related to which of the following critical factors in distinguishing agile methods from traditional systems development? A) Well matched to small products and teams B) Untested on safety-critical products C) Requires continuous presence of a critical mass of scarce experts D) Thrives in a culture where people feel comfortable and empowered by having many degrees of freedom Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


79) The critical factor "Dynamism" refers to which of the following agile methods critical factors? A) Well matched to small products and teams. B) Simple design and continuous refactoring are excellent for highly dynamic environments but a source of potentially expensive rework for highly stable environments. C) Requires continuous presence of a critical mass of scarce experts. D) Thrives in a culture where people feel comfortable and empowered by having many degrees of freedom. Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 80) According to Fowler, which of the following is NOT considered a valid individual methodology that comes under the umbrella of Agile Methodologies? A) Passive Software development B) Crystal family of methodologies C) Adaptive Software Development D) Scrum Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 81) Which of the following is a critical factor that distinguishes agile methods from traditional approaches to systems development? A) Hard to tailor down to small projects B) Needs a critical mass of scarce experts during project definition C) People are more comfortable have their roles defined D) Thrives in a culture where people feel empowered by having many degrees of freedom Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


82) Which of the following is NOT a feature of eXtreme Programming? A) Long cycles B) Incremental planning approach C) Focus on automated tests written by programmers and customers to monitor the development process D) Reliance on an evolutionary approach to development Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 83) Under eXtreme Programming, ________ and ________ are intimately related parts of the same process. A) Design; coding B) Planning; design C) Coding; testing D) Testing; implementation Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 84) Compared to traditional coding practices, which of the below is NOT an advantage of pair programming? A) More (and better) communication among developers B) Higher levels of productivity C) Higher-quality code D) Coding written in silos Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 85) Systems development methodologies and techniques which are based on objects rather than data or processes are known as ________. A) Inheritance B) Objects C) Participatory design D) Object-oriented analysis and design Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 23 Copyright © 2020 Pearson Education, Inc.


86) eXtreme Programming is not an instance of one of the Agile Methodologies. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 87) Implementation is the final step of the traditional waterfall SDLC method. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 88) According to Griss, finding and fixing a software problem after the delivery of the system is often far more expensive than finding and fixing it during analysis and design. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 89) Agile programming has higher levels of productivity as compared to traditional coding practices. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 90) The Agile Methodologies focus on the roles that people perform rather than placing the emphasis on individuals. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


91) What are Agile Methodologies? What are the three key principles of the Agile Methodologies? Answer: The Agile Methodologies are a response to the problems associated with the traditional SDLC methodology. The Agile Methodologies group argues that software development methodologies adapted from engineering generally do not fit with real-world software development. The three key principles are a focus on adaptive rather than predictive methodologies, a focus on people rather than roles, and a focus on a self-adaptive process. Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Synthesis 92) The structure that encapsulates attributes and methods that operate on those attributes is called a(n) ________. A) Object B) Case C) Container D) Module Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 93) A logical grouping of objects that have the same attributes and behaviors is known as a(n) ________. A) Object B) Case C) Container D) Object class Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


94) ________ is/are the property that occurs when entity types or object classes are arranged in a hierarchy and each entity type or object class assumes the attributes and methods of its ancestors, that is, those higher up in the hierarchy. A) Inheritance B) Objects C) Participatory design D) Object-oriented analysis and design Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 95) ________ is/are often called the third approach to systems development, after the processoriented and data-oriented approaches. A) Inheritance B) Objects C) Participatory design D) Object-oriented analysis and design Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 96) One of the most popular realizations of the iterative approach for object-oriented development is the ________. A) JAD B) RAD C) RUP D) eXtreme Programming Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 97) Which of the following is NOT a phase in the Rational Unified Process? A) Inception B) Elaboration C) Construction D) Calculation Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 26 Copyright © 2020 Pearson Education, Inc.


98) In the inception phase, which of the following is NOT performed by the analysts? A) Implement the project B) Understand user requirements C) Prepare a software development plan D) Determine the feasibility of the project Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 99) Explain object-oriented analysis and design. Answer: Object-oriented analysis and design refers to systems development methodologies and techniques based on objects rather than data or processes. The goal of OOAD is to make systems elements reusable. OOAD is often called the third approach to systems development, after the process oriented and data-oriented approaches. The object-oriented approach combines data and processes (called methods) into single entities called objects. Objects usually correspond to the real things an information system deals with, such as customers, suppliers, contracts, and rental agreements. Putting data and processes together in one place recognizes the fact that there are a limited number of operations for any given data structure, and the object-oriented approach makes sense even though typical systems development keeps data and processes independent of each other. Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Synthesis 100) Describe the Rational Unified Process (RUP) and its phases. Answer: One of the most popular realizations of the iterative approach for object-oriented development is the Rational Unified Process (RUP), which is based on an iterative, incremental approach to systems development. RUP has four phases: inception, elaboration, construction, and transition. In the inception phase, analysts define the scope, determine the feasibility of the project, understand user requirements, and prepare a software development plan. In the elaboration phase, analysts detail user requirements and develop a baseline architecture. Analysis and design activities constitute the bulk of the elaboration phase. In the construction phase, the software is actually coded, tested, and documented. In the transition phase, the system is deployed, and the users are trained and supported. Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


101) The SDLC model has six phases. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 102) Projects produce ________ that are often reviewed by people outside the team. A) Methodologies B) Systems C) Life cycles D) Milestones Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 103) In the ________ phase of the SDLC cycle, the system may be modified so reflect the evolving business conditions. A) Implementation B) Design C) Maintenance D) Analysis Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 1.1 Define information systems analysis and design Classification: Concept 104) The design team just completed the explanation of alternative systems. Now the project progresses to which phase? A) Design B) Implementation C) Conceptual D) Maintenance Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


105) Techniques provide support for all of the following except ________. A) Verifying requirements with the user B) Planning the activities in a systems development project C) Diagramming the system's logic D) Designing the system's interface Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 106) During coding, programmers write the programs that make up the system. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 107) Describe the two major additional activities performed during the planning stage. Answer: Two additional major activities are also performed during the planning phase: the formal, yet still preliminary, investigation of the system problem or opportunity at hand and the presentation of reasons why the system should or should not be developed by the organization. Difficulty: Difficult AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 108) Implementation activities include ________ such as finalization of documentation and training. A) Testing support B) Executive support C) Initial user support D) Team support Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.2 Describe the information systems development life cycle (SDLC) Classification: Concept 109) Agile methods can be used in every project. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


110) Fowler recommends an agile process if your project involves all of the following except ________. A) Unpredictable requirements B) Motivated developers C) Customer who will get involved D) A low budget Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 111) The philosophy of eXtreme Programming is that code that is successfully tested will integrated into the system a few hours after it is written. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 112) The primary unit for Scrum is the ________. A) Sprint B) Analysis C) Milestone D) Goal Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 113) Agile methodologies were created because construction of a software development project accounted for 90 percent of the total project effort. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


114) In an agile methodology, what typically is associated with the completion of an iteration? A) A portion of the working a prototype B) A review process C) The end of a phase D) The end of the project Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 115) eXtreme programming is very rigorous and requires much athletic skill and agility. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 116) eXtreme programming works more smoothly than other methodologies because of the ________. A) Code-and-test process B) Object-oriented design point of view C) Ease of the programming methodology D) Longer development process Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.3 Describe the agile methodologies, eXtreme Programming, and Scrum Classification: Concept 117) All of the below are examples of object-oriented programming except ________. A) C++ B) Python C) COBOL D) Java Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


118) The four stages of the rational unified process (RUP) are inception, elaboration, construction, and implementation. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 119) Although the main activity in the construction phase in object-oriented development is coding, revised user requirements could require ________. A) More resources B) Advanced testing C) A beta version of the project D) Additional analysis and design Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 120) Which of the following is an iterative approach to programming in the object-oriented design process? A) Rational Unified Process (RUP) B) Software Development Life Cycle (SDLC) C) eXtreme Programming D) The Construction Process Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept 121) In OOAD-based development, a(n) ________ of the project signals the end of the construction phase. A) Iteration B) Beta version C) Diagram D) Transitional version Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 1.4 Explain object-oriented analysis and design and the Rational Unified Process (RUP) Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 2 The Origins of Software 1) What is the practice of a company running a computer application for another organization? A) Outsourcing B) Information Technology Development C) In-house Payroll System D) Reusing Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 2) All of the following are examples of company outsourcing except ________. A) payroll B) information technology (IT) C) running your applications at your site D) top executive teams Answer: D Difficulty: Moderate AACSB: Reflective Thinking L.O.: 2.1 Explain outsourcing Classification: Concept 3) Which of the following is a reason why a company may outsource certain operations? A) Decrease process efficiencies B) Outsource noncore activities C) Increase time to market D) Keep the information technology staff from being bored Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 4) What is one reason a company may outsource their operations? A) So internal resources can oversee the outsourcing at the new firm. B) To decrease process efficiencies. C) Reduce time to market. D) Because all companies outsource parts of their organization to focus on the core business. Answer: C Difficulty: Moderate AACSB: Reflective Thinking L.O.: 2.1 Explain outsourcing Classification: Concept 1 Copyright © 2020 Pearson Education, Inc.


5) ________ is the practice of turning over responsibility of some to all of an organization's information systems applications and operations to an outside firm. A) Outsourcing B) Reuse C) Nearshoring D) Time to market Answer: A Difficulty: Moderate AACSB: Reflective Thinking L.O.: 2.1 Explain outsourcing Classification: Concept 6) Which of the following is a reason why an organization might get rid of its entire information processing unit? A) To hire better IT staff B) Because the old system does not work anymore C) Because management does not like the IT department D) Because of political reasons Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 7) What is the practice of U.S. firms contracting with countries in Latin America? A) Nearshoring B) Offshoring C) Nextshoring D) Neighbor redevelopment Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 8) Choose the list that represents the top three countries that are used for outsourcing according to a report by A. T. Kearney. A) India, Asia, and Brazil B) India, China, and Malaysia C) Bulgaria, China, and Mexico D) Mexico, Egypt, and China Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 2 Copyright © 2020 Pearson Education, Inc.


9) Which of the following is NOT a major category of sources of software? A) Offshore B) Cloud computing vendors C) In-house developers D) Package software Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 10) Mexico is often seen as a complement to India for outsourcing. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 11) Because open source software is free, it is impossible to make money with it. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 12) Today's system analysts only have a few languages to choose from when creating applications. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 13) A component of outsourcing is development of applications outside of the organization. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 14) The first administrative information system was developed in the United States by J. Lyons & Sons. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 3 Copyright © 2020 Pearson Education, Inc.


15) Concerning outsourcing, some companies only supply inputs and take outputs. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 16) When an organization outsources to a company, the company fires the employees of the original organization. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 17) Companies outsource their information systems because they want to reduce their time to market. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 18) The city of Grand Rapids Michigan outsourced its computing center in order to better manage its employees. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 19) Malaysia is in the bottom ten of countries that organization's use for outsourcing. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 20) If a company chooses to not to outsource their information technology, their only other option is to build the systems in-house. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 4 Copyright © 2020 Pearson Education, Inc.


21) IT services assist organizations with developing applications for customers. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 22) Amazon.com is a leader in cloud computing services. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 23) Intuit is an example of an IT services firm. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 24) Microsoft is the best-known software company in the world. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 25) Some off-the-shelf software systems cannot be modified to meet the needs of an organization. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 26) Oracle is a software company known for productivity software. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


27) Software that can be modified to meet the needs of an organization are called turnkey systems. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 28) SAP provides ERP systems. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 29) An example of cloud computing is salesforce.com. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 30) Cloud computing has experienced decreased growth in recent years. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 31) QuickBooks is a popular off-the-shelf software system. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 32) Managed reuse is a less expensive method of managing software reuse. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


33) What is outsourcing? Identify two outsourcing arrangements. Identify two reasons for outsourcing. Answer: Outsourcing is the practice of turning over responsibility of some to all of an organization's information systems applications and operations to an outside firm. A company may hire a third party to develop and run its applications on the third party's computers. Another alternative is for the third party to run the applications on-site and on your computers. Reasons for outsourcing include cost-effectiveness and the company's core mission does not involve managing an information systems unit. Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Synthesis 34) Why would an analyst need to have an awareness of outsourcing as an alternative to handling IT services in-house? Answer: Analysts need to be aware of outsourcing as an alternative. When generating alternative system development strategies for a system, an analyst should consult with organizations in the area that provide outsourcing services. Perhaps outsourcing the replacement system should be one of your alternatives. Knowing what your system requirements are before you consider outsourcing means that you can carefully assess how well the suppliers of outsourcing services can respond to your needs. However, should you decide not to consider outsourcing, you need to determine whether some software components of your replacement system should be purchased and not built in-house. Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Synthesis 35) Why would an organization outsource information systems operations? Answer: Outsourcing may be cost-effective. If a company specializes in running payroll for other companies, it can leverage the economies of scale it achieves from running one stable computer application for many organizations into very low prices. Outsourcing also provides a way for firms to leapfrog their current position in information systems and to turn over development and operations to outside staff who possess knowledge and skills not found internally. Other reasons for outsourcing include: freeing up internal resources, increasing the revenue potential of the organization, reducing time to market, increasing process. Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Synthesis

7 Copyright © 2020 Pearson Education, Inc.


36) List development specializations and provide an example of the leading software firms for the specialty. Answer: The leading software firms and their specialties include: IT Services (Accenture, CSC, IBM, HP); Packaged software providers (Intuit, Microsoft, Oracle, SAP AG, Symantec); Enterprise Software Solutions (Oracle, SAP AG); Cloud Computing (Amazon.com, Google, IBM, Microsoft, salesforce.com); Open source (sourceforge.net). Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Synthesis 37) Describe how an IT service firm can meet the needs of an organization. Provide an example of an IT service firm. Answer: If a company needs an information system but does not have the expertise or the personnel to develop the system in-house, and a suitable off-the-shelf system is not available, the company will likely consult an information technology services firm. IT services firms help companies develop custom information systems for internal use, or they develop, host, and run applications for customers, or they provide other services. These firms employ people with expertise in the development of information systems. Their consultants may also have expertise in a given business area. Examples of IT firms include IBM, HP, and Computer Sciences Corp. Difficulty: Difficult AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Synthesis 38) Which of the following is a function of an IT service firm? A) Run applications for customers B) Support an order entry system C) Rent licenses D) Provide open source software Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 39) Which of the following is a firm that specializes in cloud computing? A) Accenture B) Intuit C) Oracle D) Salesforce.com Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 8 Copyright © 2020 Pearson Education, Inc.


40) Intuit's QuickBooks is an example of what type of software? A) ERP software B) In-house software C) Prepackaged software D) Open source software Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 41) ________ software solutions consist of a series of integrated modules. A) Quicken B) Cloud Computing C) Open Source D) Enterprise Resource Planning Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 42) Which firm is best known for its ERP software solution? A) SAP AG B) Oracle C) Microsoft D) Google Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 43) ________ is/are off-the-shelf software systems that cannot be modified to meet the specific, individual needs of a particular organization. A) In-house designs B) Custom software C) Turnkey systems D) Open source systems Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


44) ________ solutions integrate individual traditional business functions into a series of modules so that a single transaction occurs seamlessly within a single information system rather than several separate systems. A) Turnkey B) ERP C) IBM D) Consultants Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 45) Which solution enables a firm to integrate all parts of a business process into a unified information system? A) Prepackaged B) Off the shelf C) Enterprise software solutions D) Azure Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 46) If an organization is using applications rented from a third party vendor running in a remote location, they are most likely using what type of software system? A) ERP B) Mobile software C) Cloud computing D) SAP Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 47) Why is open-source software different than the other types of software? A) Companies make money by offering maintenance contracts. B) It is available via the Internet. C) The source code is free. D) Only major corporations offer it. Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 10 Copyright © 2020 Pearson Education, Inc.


48) Which of the following is a method for organizations to obtain applications for rent from a third-party provider who run the applications at a remote site? A) Enterprise Resource Planning (ERP) B) Pre-packaged software C) Cloud computing D) Information Technology (IT) service firms Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 49) ________ measures the difficulty of loading the software and making it operational. A) Ease of installation B) Installation viability C) Functionality D) Flexibility Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 50) Together, SAP controls the largest share of the ________ market. A) ERP B) Cloud computing C) Ad hoc reuse D) In-house development Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 51) What is the primary concern of IT managers as it relates to cloud computing? A) Selecting an appropriate vendor B) Losing control of their data C) Not knowing the physical location of their applications D) Security Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


52) Which of the following is NOT a step in the process of securing applications that an organization is migrating to the cloud? A) Conduct a security background check of the cloud computing organization B) Involve the organization's security experts C) Clearly define requirements D) Perform a risk assessment Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 53) Which of the following is NOT an example of open-source software? A) MySQL B) Excel C) Firefox D) Linux Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 54) When an organization has the resources and a system must be built from scratch, an organization should choose what type of software? A) In-house development B) Prepackaged software C) Off the shelf D) Open source Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 55) XYZ, Inc. is trying to decide when using ________ if the organization wants to pay per user or license the software. A) Outsourcing B) ERP systems C) Cloud computing D) In-house developers Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 12 Copyright © 2020 Pearson Education, Inc.


56) List the six sources of software used by organizations. Answer: Software sources can be categorized as information technology firms, packaged software providers, vendors of ERP software, cloud computing, open source, and the organization itself. Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Synthesis 57) Briefly describe why systems development is more difficult now than it was in the past. Answer: There was a time, not too long ago, when no systems analysts and no symbolic computer programming languages existed. Yet people still wrote and programmed applications for computers. Even though today's systems analyst has dozens of programming languages and development tools to work with, systems development is even more difficult now than it was 60 years ago. Then, as well as even more recently, certain issues were decided for you: If you wanted to write application software, you did it in-house and wrote the software from scratch. Today there are many different sources of software and the focus is no longer exclusively on inhouse development. Instead, the focus will be on where to obtain the many pieces and components that will be combined into the application system. Code will be written to mainly make all the different pieces work together. Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Synthesis 58) What are enterprise resource planning systems? How do they differ from traditional approaches? Identify three enterprise resource planning system vendors. Answer: Enterprise resource planning systems integrate individual traditional business functions into a series of modules so that a single transaction occurs seamlessly within a single information system rather than several separate systems. ERP modules focus on business processes rather than on business functional areas. SAP AG, Oracle, and PeopleSoft, Inc. are three ERP vendors. Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Synthesis

13 Copyright © 2020 Pearson Education, Inc.


59) What are the advantages and disadvantages of an ERP system? Answer: The benefits of the enterprise solutions approach include a single repository of data for all aspects of a business process and the flexibility of the modules. A single repository ensures more consistent and accurate data, as well as less maintenance. The modules are flexible because additional modules can be added as needed once the basic system is in place. There are disadvantages to enterprise solutions software. The systems are very complex, so implementation can take a long time to complete. Organizations typically do not have the necessary expertise inhouse to implement the systems, so they must rely on consultants or employees of the software vendor, which can be very expensive. In some cases, organizations must change how they do business in order to benefit from a migration to enterprise solutions. Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Synthesis 60) What is cloud computing? What are the advantages and disadvantages of using a cloud? Answer: Cloud computing provides a means for applications to be hosted and run for other companies by a provider. Advantages include less need for internal information technology staff, gaining access to applications faster than internal development, and achieving lower-cost access to corporate-quality applications. Some concerns are reliability, security and compliance with government regulations. Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Synthesis 61) Describe the advantages of a company using cloud computing? Answer: Cloud computing is rapidly growing. There are many advantages to engaging in cloud computing. Taking the cloud computing route has its advantages. The top three reasons for choosing to go with cloud computing, all of are (1) freeing internal IT staff, (2) gaining access to applications faster than via internal development, and (3) achieving lower cost access to corporate-quality applications. Especially appealing is the ability to gain access to large and complex systems without having to go through the expensive and time-consuming process of implementing the systems themselves in-house. Getting your computing through a cloud also makes it easier to walk away from an unsatisfactory systems solution. Other reasons include cost effectiveness, speed to market, and better performance. Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Synthesis

14 Copyright © 2020 Pearson Education, Inc.


62) Which of the following is NOT a common criterion when choosing off-the-shelf software? A) Cost B) Functionality C) Reputation of the firm D) Documentation Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 63) When considering off-the-shelf software, which choice is one of the most important criteria to consider? A) Vendor support B) Cost C) Flexibility D) Response time Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 64) If a company has a generic software need, they should consider acquiring its software from a(n) ________. A) In-house development B) Cloud sourcing C) Packaged software producer D) Using a ERP system Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 65) ________ refers to the tasks the software can perform and the mandatory, essential, and desired system features. A) Vendor support B) Documentation C) Ease of installation D) Functionality Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 15 Copyright © 2020 Pearson Education, Inc.


66) ________ refers to how long it takes the software package to respond to the user's request in an interactive session. A) Vendor support B) Flexibility C) Response time D) Ease of installation Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 67) Which criteria would be the ranked most important when an organization is choosing off-theshelf software? A) Look at cost and then go from there. B) Vendor reliability and vendor support. C) The organization chooses the cheapest option. D) It does not matter the criteria order as long as ease of installation is considered. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 68) Which of the following is NOT a function of vendor support? A) Assistance with choosing software B) Includes assistance to install the software C) Train user and systems staff on the software D) Provide help as problems arise after installation Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 69) Which criterion refers to how easy it is to customize the software? A) Response time B) Flexibility C) Vendor support D) Functionality Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


70) ________ refers to the tasks the software can perform and the mandatory, essential, and desired system features. A) Vendor support B) Documentation C) Response time D) Functionality Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 71) How long it takes the software package to respond to the user's requests in an interactive session refers to which software evaluation criteria? A) Functionality B) Return rate C) Response time D) Flexibility Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 72) All of the following are ways of validating purchased software information except ________. A) reviewing software documentation and technical marketing literature B) sending prospective vendors a questionnaire asking specific questions about their packages C) using the software yourself and running it through a series of tests based on the criteria for selecting software D) asking the manufacturer if they feel their software is best Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 73) The questionnaire sent to vendors asking them to propose hardware and software that will meet the requirements of your new system is called a ________. A) Requirements statement B) Request for proposal C) Baseline project plan D) Business case Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 17 Copyright © 2020 Pearson Education, Inc.


74) If an organization needs to free up their staff for other IT work, the organization should consider ________ in the producer category. A) IT service firms B) in-house developers C) cloud computing D) ERP Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 75) ________ periodically evaluate(s) software and collect(s) user opinions, thus providing a range of opinions about possible software packages. A) Analysts B) IBM C) Vendors D) Independent software testing services Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 76) Which of the following is a company that provides independent software testing subscription services? A) Auerbach Publishers B) IBM C) Google D) SAP Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


77) ________ refers to the use of previously written software resources, especially objects and components, in new applications. A) Reorganization B) Reuse C) IT vendor support D) Software Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 78) Identify the most common criteria for choosing off-the-shelf software. Which two criteria would be among the most important? Answer: The most common criteria are cost, functionality, vendor support, vendor viability, flexibility, documentation, response time, and ease of installation. Cost involves comparing the cost of developing the same system in-house to the cost of purchasing or licensing the software package. Functionality refers to the tasks the software can perform and the mandatory, essential, and desired system features. While vendor support identifies the amount of support the vendor can be expected to provide, vendor viability examines the vendor's marketplace strength. Flexibility refers to the flexibility of customizing the software. The documentation criterion examines issues relating to the user's manual, technical documentation, and cost of acquiring additional copies of the documentation. Response time questions the length of time it takes the software package to respond to the user's requests in an interactive session and how long it takes the software to complete running a job. The ease of installation criterion examines the difficulty of loading the software and making it operational. Vendor support and viability will be among the most important. Difficulty: Moderate AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Synthesis 79) Why would an organization use the request for proposal (RFP) process? Answer: One way to get all of the information you want about a software package is to collect it from the vendor. If all of the information is not available, you may have to submit a request for proposal (RFP) or a request for quote (RFQ) process your organization requires when major purchases are made. Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Synthesis

19 Copyright © 2020 Pearson Education, Inc.


80) How can a company validate purchased software information? Answer: Information about the software can be obtained from the vendor in the form of marketing literature, an RFP, and software documentation. The company can use and test the software on a trial basis; speak with current users of the software and use independent software testing and abstracting services. Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Synthesis 81) Which of the following is NOT a basic reuse software step? A) Abstraction B) Testing C) Storage D) Recontextualization Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 82) ________ is the software reuse step that involves the design of a reusable piece of software, starting from existing software assets or from scratch. A) Storage B) Facilitated reuse C) Abstraction D) Designed reuse Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 83) ________ is the software reuse step that involves making software assets available for others to use. A) Abstraction B) Designed reuse C) Component based development D) Storage Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


84) ________ is the software reuse step that involves making the reusable asset understandable to developers who want to use it in their systems. A) Recontextualization B) Storage C) Object class D) Component reuse library Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 85) What is a result of the reuse of object classes? A) Decreased duplication of efforts B) Reduced defect density C) Increased productivity D) All of the above Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 86) Which of the following issues should be addressed when considering reuse? A) The current lack of a methodology for creating and clearly defining and labeling reusable components for placement in a library B) The lack of commitment to reuse C) Lack of proper training and rewards needed to promote reuse D) Customer support Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 87) Which best describes facilitated reuses? A) Developers are required to practice reuse. B) Developers are not required to practice reuse, but are encouraged to do so. C) Developers practice reuse when they desire. D) Developers are mandated to reuse documentation. Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


88) Which of the following is a FALSE statement about reusing software? A) Reuse should increase programmer productivity. B) Reuse should decrease development time. C) Reuse should result in higher-quality software. D) Reuse is always expensive. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 89) Which of the following is NOT an approach that an organization can take to software reuse? A) Flexible reuse B) Facilitated reuse C) Ad hoc reuse D) Managed reuse Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 90) The software reuse approach that allows individuals to find or develop reusable assets on their own, and has few, if any, organizational rewards for reusing assets best describes ________. A) Flexible reuse B) Facilitated reuse C) Ad hoc reuse D) Managed reuse Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 91) ________ is where developers are not required to practice reuse, but are encouraged to do so. A) Flexible reuse B) Facilitated reuse C) Ad hoc reuse D) Managed reuse Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


92) Which of the following is a software reuse approach that mandates the development, sharing, and adoption of reusable assets? A) Flexible reuse B) Facilitated reuse C) Ad hoc reuse D) Managed reuse Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 93) The most expensive and extensive reuse approach is ________. A) Designed reuse B) Facilitated reuse C) Ad hoc reuse D) Managed reuse Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 94) Which of the following is an organization that hosts and runs computer applications for other companies, typically on a per use or license basis? A) ERP firm B) Cloud computing application provider C) The Internet D) A software analyst Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 95) Designed reuse is the most expensive approach to reuse. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


96) Component-based development is the opposite of object-oriented development. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 97) Briefly describe the process and policies for each reuse approach. Answer: The ad hoc approach does not have a process or policies. The facilitated approach uses incentives, an asset check-in process, and limited review before publication. The managed approach includes a reuse-adapted process, mandated with specific goals; reuse reviews and asset documentation, packaging, and certification guidelines, and specified metrics. The designed approach includes some domain analysis, reuse-oriented architecture, and specific steps to design for and with reuse. Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Synthesis 98) Describe the three basic steps of reuse. Answer: Software reuse has three basic steps: abstraction, storage, and recontextualization. Abstraction involves the design of a reusable piece of software, starting from existing software assets or from scratch. Storage involves making software assets available for others to use. Once an asset has been found, recontextualization becomes important. This involves making the reusable asset understandable to developers who want to use it in their systems. Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Synthesis 99) Describe the four approaches to reuse. Answer: There are four approaches to reuse: ad-hoc, facilitated, managed, and designed. The ad hoc approach to reuse is not really an approach at all. With this approach, individuals are free to find or develop reusable assets on their own, and there are few, if any, organizational rewards for reusing assets. With facilitated reuse developers are not required to practice reuse, but they are encouraged to do so. The organization makes available some tools and techniques that enable the development and sharing of reusable assets, and one or more employees may be assigned the role of evangelist to publicize and promote the program. With managed reuse, the development, sharing, and adoption of reusable assets is mandated The most expensive and extensive approach to reuse is designed reuse. Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Synthesis

24 Copyright © 2020 Pearson Education, Inc.


100) For each reuse approach, briefly describe its process and policies. Answer: The ad hoc approach does not have a process or policies. The facilitated approach uses incentives, an asset check-in process, and limited review before publication. The managed approach includes a reuse-adapted process, mandated with specific goals; reuse reviews and asset documentation, packaging, and certification guidelines, and specified metrics. The designed approach includes some domain analysis, reuse-oriented architecture, and specific steps to design for and with reuse. Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Synthesis 101) Most organizations outsource at least some aspect of their information systems activities. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 102) Many U.S. firms are turning to nearshoring, or contracting with companies in ________. A) Latin America B) the Philippines C) neighboring states D) Alaska Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept 103) Which of the following is a good practice when searching for alternative systems development strategies while considering outsourcing? A) Create a SWAT analysis. B) Consult organizations in your area. C) Ask the information technology (IT) department for help. D) Look for the cheapest outsourcing company. Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 2.1 Explain outsourcing Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


104) When searching for sources of software you have to choose one option. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 105) Consultants use many of the same instruments that companies use to develop systems inhouse except ________. A) techniques B) tools C) methodologies D) financing sources Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 106) Which of the following is an example of a prepackaged narrow, niche package offering? A) ERP software B) Microsoft Office Suite C) Day care management software D) Turbotax Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 107) Which answer choice is NOT a benefit of ERP? A) ERP is less expensive to implement because of economy of scale. B) ERP uses a single repository of data. C) ERP has flexible modules. D) ERP is less maintenance than all types of software. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 108) The global market for cloud computer is decreasing. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.2 Describe six different sources of software Classification: Concept 26 Copyright © 2020 Pearson Education, Inc.


109) In choosing an off-the-shelf software solution and the supported task is generic, which type of software package would you use? A) Packaged software producer B) IT Service firms C) Open-source software D) In-house developers Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 110) All of the following are types of vendor support except ________. A) installation B) software selection C) user training D) assistance after installation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 111) When you test off-the-shelf software, you should also test the documentation. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept 112) Software reviews in trade publications are unbiased and are a good source of reference when considering an off-the-shelf software solution. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 2.3 Discuss how to evaluate off-the-shelf software Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


113) Reuse has all of the following benefits except ________. A) decreased development time B) decreased programmer productivity C) decreased defect rates D) decreased maintenance costs Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 114) Component based development is similar to ________. A) jigsaw puzzles B) standardized programming C) object-oriented development D) project management Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 115) What issues must be addressed for reuse to work in an organizational setting? Answer: However, for reuse to work in an organizational setting, many different issues must be addressed. The most important factors related to successful reuse include knowledge of the domain in which reuse is to occur, customer support, the commitment and understanding of senior management, sound organizational processes, and skilled and experienced developers. Difficulty: Difficult AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept 116) The ________ approach to reuse involves individuals finding and developing reusable assets on their own. A) facilitated B) standardized programming C) managed reuse D) ad hoc Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


117) Managed reuse is the most expensive approach in reuse. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 2.4 Explain reuse and its role in software development Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 3 Managing the Information Systems Project 1) The ________ is a systems analyst with a diverse set of skills–management, leadership, technical, conflict management, and customer relationship–who is responsible for initiating, planning, executing, and closing down a project. A) Consultant B) Project scheduler C) Project manager D) Project assistant Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 2) A ________ is a planned undertaking of a series of related activities to reach an objective that has a beginning and an end. A) Project B) Technique C) Data flow D) Methodology Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 3) A ________ is an end product of an SDLC phase. A) System tester B) Requirement C) Modeler D) Deliverable Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) A ________, which is conducted by the project manager, involves determining if the information system makes sense for the organization from an economic and operational standpoint. A) Tool B) Feasibility study C) Data flow D) Methodology Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 5) To successfully orchestrate the construction of a complex information system, a project manager must have ________, leadership, and technical skills. A) Planning B) Initiating C) Executing D) Interpersonal Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 6) Which of the following is NOT a part of the project management process? A) Planning B) Initiating C) Executing D) Adjoining Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) ________ is a controlled process of initiating, planning, executing, and closing down a project. A) System design B) System analysis C) Project scheduling D) Project management Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 8) ________ is NOT a common skill pertaining to the leadership activity of a project manager. A) Communication B) Working on assigned activities C) Assigning activities D) Monitoring progress Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 9) Influencing the activities of others toward the attainment of a common goal through the use of intelligence, personality, and abilities refers to the ________ activity of a project manager. A) Management B) Leadership C) Team management D) Conflict management Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) ________ is NOT a skill pertaining to the management activity of a project manager. A) Monitoring outcomes B) Assigning resources to activities C) Communicating expectations D) Forecasting Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 11) ________ is NOT a skill pertaining to the customer relations activity of a project manager. A) Interpreting system requests B) Interpreting system specifications C) Contact point for developers D) User training Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 12) Getting projects completed through the effective utilization of resources is a ________ activity of a project manager. A) Management B) Risk management C) Change management D) Team management Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


13) Managing the project team for effective team performance represents a ________ activity of a project manager. A) Leadership B) Change management C) Risk management D) Team management Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 14) ________ is NOT a skill pertaining to the technical problem solving activity of a project manager. A) Contact point for payroll team B) Defining activities and their sequence C) Making trade-offs between alternative solutions D) Interpreting system requests and specifications Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 15) ________ is NOT a skill pertaining to the conflict management activity of a project manager. A) Problem solving B) Smoothing out personality differences C) Monitoring D) Compromising Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


16) ________ is NOT a skill pertaining to the team management activity of a project manager. A) Self-management B) Team-building C) Peer-evaluation D) Forecasting Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 17) Identifying, assessing, and managing the risks and day-to-day changes that occur during a project is attributed to ________. A) Forecasting B) Team-building C) Goal setting D) Risk and change management Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 18) ________ is NOT a skill pertaining to the risk and change management activity of a project manager. A) Environmental scanning B) Team-building C) Risk and opportunity identification and assessment D) Resource redeployment Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


19) Working closely with customers to ensure that project deliverables meet expectations is a ________ activity of a project manager. A) Resource redeployment B) Forecasting C) Management D) Customer relations Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 20) Which of the following is NOT an activity found in the project initiation phase? A) Establishing the project initiation team B) Establishing a relationship with the developer C) Establishing the project initiation plan D) Establishing management procedures Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 21) During ________, the project manager performs several activities to assess the size, scope, and complexity of the project and to establish procedures to support subsequent activities. A) Project bidding B) Project development C) Project initiation D) Project delivery Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


22) How many activities are involved in the project initiation phase? A) Four B) Five C) Six D) Three Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 23) Which of the following is FALSE in the context of the project workbook? A) It can be stored as an online electronic document. B) It can be stored in a large three-ring binder. C) The project workbook is used by all team members. D) It is not useful for project audits. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 24) Which of the following is FALSE in the context of the project charter? A) It will not have the project manager's name and contact information. B) It includes the project title and date of authorization. C) It outlines many of the key elements of the project. D) It is a high-level document prepared for the customer. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 25) The project charter will never include which of the following? A) Project objectives and description B) Organization competitor information C) Projected start and completion dates D) Key stakeholders, project role, and responsibilities Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 8 Copyright © 2020 Pearson Education, Inc.


26) What is the next step taken after project initiation? A) Project bidding B) Project planning C) Project execution D) Project development Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 27) Which is the first activity in the project planning phase? A) Setting a baseline project plan B) Creating a preliminary budget C) Identifying and assessing risk D) Describing project scope, alternatives, and feasibility Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 28) ________ is the process of dividing the project into manageable tasks and logically ordering them to ensure a smooth evolution between tasks. A) Work breakdown structure B) Task breakdown structure C) Project breakdown structure D) Management breakdown structure Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


29) A Gantt chart is the graphical representation of a project that shows each task as a ________ bar whose length is proportional to its time for completion. A) Vertical B) Linear C) Curve D) Horizontal Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 30) Which of the following is FALSE with respect to a task in a project plan? A) It can be done by one person only. B) It has a single and identifiable deliverable. C) It has a known method or technique. D) It has well-accepted predecessor and successor steps. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 31) Which of the following is FALSE with respect to resource estimation activity? A) This information is used to create a project resource plan. B) Project managers use a variety of tools to assist in making estimates of project size and costs. The most widely used method is called COCOMO. C) Resource estimates may need not be revised based upon the skills of the actual person (or people) assigned to a particular activity. D) People are the most important, and expensive, part of project resource planning. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


32) Most project management software tools support a broad range of task durations, including minutes, hours, days, weeks, and ________. A) Months B) Years C) Centuries D) Decades Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 33) COCOMO stands for ________. A) Constructive Coordination Model B) Constructive Cost Model C) Collective Cost Model D) Constructive Correction Model Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 34) Defining tasks in too much detail will make the management of the project ________. A) Unnecessarily complex B) Simple C) Extremely streamlined D) Constructive Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


35) Tasks that are ________ in scope will provide a clear sense of the status of the project or of the interdependencies between tasks. A) Short B) Medium C) Long D) Optimal Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 36) Resource estimates may need to be revised based upon the skills of the actual person (or people) assigned to a particular ________. A) Activity B) Group C) Person D) Team Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 37) The distinguishing feature of a network diagram is that the ordering of tasks is shown by connecting tasks—depicted as ________ or ovals—with their predecessor and successor tasks. A) Circles B) Diamonds C) Ellipticals D) Rectangles Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


38) Which of the following is NOT true with respect to determining project standards and procedures? A) Specifies how various deliverables are produced and tested B) Specifies how the standard SDLC might be modified C) Specifies which SDLC methods will be used D) Specifies the budget and resource allocation Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 39) Which of the following is NOT true of a project communication plan? A) It outlines the communication procedures among management, project team members, and the customer. B) It includes when and how written and oral reports will be provided by the team. C) It does not define communication with vendors and external contractors. D) It includes how team members will coordinate work. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 40) Which of the following is a FALSE statement regarding the Project Scope Statement? A) It occurs near the end of the project planning phase. B) It is developed primarily for the customer. C) It clearly describes what the project will deliver. D) It is a description of the alternative solution. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


41) Which of the following is NOT a stakeholder involved in the project communication matrix? A) Team members B) Facilities team C) User group D) Contract programmers Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 42) At the end of the project planning phase, ________ of the Baseline Project Plan is conducted to double-check all information in the plan. A) Rating B) Testing C) Review D) Planning Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 43) ________ is the third phase of the project management process in which the plans created in the prior phases (project initiation and planning) are put into action. A) Project execution B) Project closure C) Project development D) Project planning Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


44) Which of the following is the first activity in the project execution phase? A) Communicating the project status B) Managing changes to the Baseline Project Plan C) Maintaining the project workbook D) Executing the Baseline Project Plan Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 45) Which of the following is NOT true about project closedown? A) It brings the project to an end. B) Projects can conclude with a natural or unnatural termination. C) Unnatural termination of a project can never happen. D) An unnatural termination occurs when the project is stopped before completion. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 46) Which of the following is FALSE with respect to the Gantt chart and network diagram? A) Gantt charts visually show the duration of tasks, whereas a network diagram visually shows the sequence dependencies between tasks. B) Gantt charts visually show the time overlap of tasks, whereas a network diagram does not show time overlap but does show which tasks could be done in parallel. C) Gantt charts visually show the time overlap of tasks, whereas a network diagram shows time overlap but does show which tasks could be done in parallel. D) Some forms of Gantt charts can visually show slack time available within an earliest start and latest finish duration. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


47) ________ are used by project managers to depict resource utilization by task. A) Textual reports B) Bar graphs C) Pie charts D) Flow charts Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 48) The project manager is a systems analyst with a diverse set of skills–management, leadership, technical, conflict management, and customer relationship–who is responsible for initiating, planning, executing, and closing down a project. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 49) In some organizations, the project manager is a very experienced systems analyst, whereas in others, both junior and senior analysts are expected to take on this role, managing parts of a project or actively supporting a more senior colleague who assumes the project manager role. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 50) A project is an unplanned undertaking of a series of related activities to reach an objective that has a beginning and an end. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


51) The last deliverable, or end product, produced by Chris and Juanita was a System Service Request (SSR), a standard form PVF uses for requesting systems development work. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 52) Systems development projects are undertaken for two primary reasons: to take advantage of business opportunities and to solve business problems. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 53) A study that determines if the proposed information system makes sense for the organization from an economic and operational standpoint is called non-feasibility study. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 54) Closing down a project is not an activity performed in the project management process. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 55) Executing the project is the third phase in the project management process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


56) Problem solving is a skill required in the conflict management activity for a project manager. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 57) Interpreting system requests and specifications is not a skill required as part of the customer relations activity for a project manager. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 58) Designing and sequencing activities to attain project goals describes the technical problem solving activity. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 59) An example of a project manager leadership activity is helping the team work towards a common goal. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 60) In project initiation, the developer performs several activities to assess the size, scope, and complexity of the project and to establish procedures to support subsequent activities. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


61) Establishing a relationship with the customer is the first step in project initiation. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 62) Successful projects require the development of effective management procedures. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 63) The Project Workbook is an offline or hard-copy repository for all project correspondence, inputs, outputs, deliverables, procedures, and standards that is used for performing project audits, orienting new team members, communicating with management and customers, identifying future projects, and performing post-project reviews. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 64) The project charter is a short (typically one page), high-level document prepared for the customer that describes what the project will deliver and outlines many of the key elements of the project. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 65) The project charter often includes a signature section for key stakeholders and key assumptions. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


66) There are 10 activities in total which are involved in the project planning phase. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 67) Defining a task with too little detail will make the project complex. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 68) The most widely used method for cost estimation is COCOMO. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 69) A network diagram depicts a Gantt chart. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 70) What is a project manager? What types of skills should a project manager possess? Answer: The project manager is a systems analyst with a diverse set of skills—management, leadership, technical, conflict management, and customer relationship—who is responsible for initiating, planning, executing, and closing down a project. As a project manager, your environment is one of continual change and problem solving. In some organizations, the project manager is a very experienced systems analyst, whereas in others, both junior and senior analysts are expected to take on this role, managing parts of a project or actively supporting a more senior colleague who assumes the project manager role. Understanding the project management process is a critical skill for your future success. Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 20 Copyright © 2020 Pearson Education, Inc.


71) Why are systems development projects initiated? Provide an example. Answer: Systems development projects are undertaken for two primary reasons: to take advantage of business opportunities and to solve business problems. Taking advantage of an opportunity might mean providing an innovative service to customers through the creation of a new system. For example, PVF may want to create a Web site so that customers can easily access its catalog and place orders at any time. Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 72) In order, what are the four steps in the project management process? Answer: Initiating the project, planning the project, executing the project, and closing down the project. Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis

21 Copyright © 2020 Pearson Education, Inc.


73) List at least 3 activities of a project manager and the skill associated with that activity. Answer: Leadership: Influencing the activities of others toward the attainment of a common goal through the use of intelligence, personality, and abilities. Skills: Communication; liaison between management, users, and developers; assigning activities; monitoring progress Management: Getting projects completed through the effective utilization of resources. Skills: Defining and sequencing activities; communicating expectations; assigning resources to activities; monitoring outcomes Customer relations: Working closely with customers to ensure that project deliverables meet expectations. Skills: Interpreting system requests and specifications; site preparation and user training; contact point for customers Technical problem solving: Designing and sequencing activities to attain project goals. Skills: Interpreting system requests and specifications; defining activities and their sequence; making trade-offs between alternative solutions; designing solutions to problems Conflict management: Managing conflict within a project team to assure that conflict is not too high or too low. Skills: Problem solving; smoothing out personality differences; compromising; goal setting Team management: Managing the project team for effective team performance. Skills: Communication within and between teams; peer evaluations; conflict resolution; team building; self-management Risk and change management: Identifying, assessing, and managing the risks and day-to-day changes that occur during a project. Skills: Environmental scanning; risk and opportunity identification and assessment; forecasting; resource redeployment. Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 74) List the six project initiation activities. Answer: Project initiation 1. Establishing the project initiation team 2. Establishing a relationship with the customer 3. Establishing the project initiation plan 4. Establishing management procedures 5. Establishing the project management environment and project workbook 6. Developing the project charter Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis

22 Copyright © 2020 Pearson Education, Inc.


75) What is a project charter? Describe elements that may be a part of the project charter. Answer: A project charter is a short document prepared for the customer during project initiation that describes what the project will deliver and outlines generally at a high level all work required to complete the project. The project charter ensures that both you and your customer gain a common understanding of the project. It is also a very useful communication tool; it helps to announce to the organization that a particular project has been chosen for development. A project charter can vary in the amount of detail it contains, but it often includes the following elements: Project title and date of authorization; Project manager name and contact information; Customer name and contact information; Projected start and completion dates; Key stakeholders, project role, and responsibilities; Project objectives and description; Key assumptions or approach; Signature section for key stakeholders. Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 76) What does project planning involve? Answer: Project planning involves defining clear, discrete activities and the work needed to complete each activity within a single project. It often requires you to make numerous assumptions about the availability of resources such as hardware, software, and personnel. It is much easier to plan nearer-term activities than those occurring in the future. In actual fact, you often have to construct longer-term plans that are more general in scope and nearer-term plans that are more detailed. The repetitive nature of the project management process requires that plans be constantly monitored throughout the project and period. Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 77) What is COCOMO and how is it used? Answer: The Constructive Cost Model (COCOMO; Concept) is an automated software estimation model that uses historical project data and current as well as future project characteristics to estimate project costs. It is the most widely used method and uses parameters that were derived from prior projects of differing complexity COCOMO uses these different parameters to predict human resource requirements for basic, intermediate, and very complex systems. Difficulty: Difficult AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis

23 Copyright © 2020 Pearson Education, Inc.


78) What does a project manager do during the project execution phase? List the steps in the project execution phase. Answer: As project manager, you oversee the execution of the baseline plan. This means that you initiate the execution of project activities, acquire and assign resources, orient and train new team members, keep the project on schedule, and ensure the quality of project deliverables. The steps in the project execution phase include: 1. Executing the Baseline Project Plan 2. Monitoring Project Progress against the Baseline Project Plan 3. Managing Changes to the Baseline Project Plan 4. Maintaining the Project Workbook 5. Communicating the Project Status. Difficulty: Moderate AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 79) Name four ways a project team can communicate. Indicate the type of formality, i.e., high, medium to low, etc. Answer: Project workbook–High Inform; Meetings–Medium to high; Seminars and workshops– Low to medium; Project newsletters–Medium to high; Status reports–High; Specification documents– High; Minutes of meetings–High; Bulletin boards–Low; Memos–Medium to high; Brown bag lunches–Low; Hallway discussions–Low. Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis 80) What are the ways a project can close? Provide an example of each. Answer: Projects can conclude with a natural or unnatural termination. A natural termination occurs when the requirements of the project have been met—the project has been completed and is a success. An unnatural termination occurs when the project is stopped before completion. Several events can cause an unnatural termination of a project. For example, it may be learned that the assumption used to guide the project proved to be false, that the performance of the systems or development group was somehow inadequate, or that the requirements are no longer relevant or valid in the customer's business environment. The most likely reasons for the unnatural termination of a project relate to running out of time or money, or both. Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Synthesis

24 Copyright © 2020 Pearson Education, Inc.


81) ________ is a critical path scheduling technique used for controlling resources. A) Network programming B) Network diagramming C) Networking D) Network scheduling Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 82) A critical path refers to a sequence of task activities whose ________ and ________ directly affect the completion date of a project. A) Duration; network B) Order; network C) Task; sequence D) Order; durations Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 83) A network diagram will never be used when the tasks ________. A) Cannot be worked on independently of other tasks B) Can be worked on independently of other tasks C) Are well defined and have a clear beginning and end point D) Serve the purpose of the project Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


84) Which of the following is NOT a feature of a network diagram? A) It represents how completion times vary for activities. B) It is more often used than Gantt charts to manage projects such as information systems development. C) Connecting arrows are not used. D) Variability in the duration of activities is the norm. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 85) Which of the following is NOT a component of PERT? A) Program B) Evolution C) Review D) Evaluation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 86) Which of the following is NOT a feature of PERT? A) Uses optimistic estimate B) Uses pessimistic estimate C) Uses realistic estimate D) Calculates budget for a project Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


87) To construct the Gantt chart, a ________ is drawn for each activity that reflects its sequence and duration. A) Horizontal line B) Horizontal bar C) Vertical line D) Vertical bar Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 88) The critical path represents the ________ time in which a project can be completed. A) Shortest B) Longest C) Farthest D) Tallest Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 89) Nodes not on the critical path contain ________ time and allow the project manager some flexibility in scheduling. A) Shortest B) Critical C) Slack D) Report Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 90) The acronym PERT stands for Program Evaluation Review Technique. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


91) List the key difference between a Gantt chart and a network diagram. Answer: Gantt charts visually show the duration of tasks, whereas a network diagram visually shows the sequence dependencies between tasks. Gantt charts visually show the time overlap of tasks, whereas a network diagram does not show time overlap but does show which tasks could be done in parallel. Some forms of Gantt charts can visually show slack time available within an earliest start and latest finish duration. A network diagram shows this by data within activity rectangles. Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Synthesis 92) Define and describe the PERT technique. Answer: PERT (Program Evaluation Review Technique; Concept) is a technique that uses optimistic, pessimistic, and realistic time estimates to calculate the expected time for a particular task. This technique can help you to obtain a better time estimate when there is some uncertainty as to how much time a task will require to be completed. The optimistic (o) and pessimistic (p) times reflect the minimum and maximum possible periods of time for an activity to be completed. The realistic (r) time, or most likely time, reflects the project manager's "best guess" of the amount of time the activity actually will require for completion. Once each of these estimates is made for an activity, an expected time (ET) can be calculated. Because the expected completion time should be closest to the realistic (r) time, it is typically weighted four times more than the optimistic (o) and pessimistic (p) times. Once you add these values together, it must be divided by six to determine the ET. This equation is shown in the following formula: ET = (o + 4r + p)/6 where ET = expected time for the completion for an activity; o = optimistic completion time for an activity; r = realistic completion time for an activity; p = pessimistic completion time for an activity. Difficulty: Difficult AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Synthesis 93) What is the critical path? Why is it important? Answer: The critical path of a network diagram is represented by the sequence of connected activities that produce the longest overall time period. All nodes and activities within this sequence are referred to as being "on" the critical path. The critical path represents the shortest time in which a project can be completed. In other words, any activity on the critical path that is delayed in completion delays the entire project. Nodes not on the critical path, however, can be delayed (for some amount of time) without delaying the final completion of the project. Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Synthesis 28 Copyright © 2020 Pearson Education, Inc.


94) What are some of the activities one can accomplish in project management software? Include examples of project management software. Answer: Most of the available tools have a set of common features that include the ability to define and order tasks, assign resources to tasks, and easily modify tasks and resources. Project management tools are available to run on IBM-compatible personal computers, the Macintosh, and larger mainframe and workstation-based systems. These systems vary in the number of task activities supported, the complexity of relationships, system processing and storage requirements, and, of course, cost. When using this system to manage a project, you need to perform at least the following activities: Establish a project starting or ending date; Enter tasks and assign task relationships; Select a scheduling method to review project reports. Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Synthesis 95) ________ refers to the amount of time a task can be delayed without delaying the early start of any immediately following tasks. A) Response time B) Total slack C) Shortest time D) Free slack Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 3.3 Explain how commercial project management software packages can be used to assist in representing and managing project schedules Classification: Concept 96) ________ refers to the amount of time a task can be delayed without delaying the completion of the project. A) Response time B) Total slack C) Shortest time D) Free slack Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.3 Explain how commercial project management software packages can be used to assist in representing and managing project schedules Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


97) Microsoft Excel is an example of project management software. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 3.3 Explain how commercial project management software packages can be used to assist in representing and managing project schedules Classification: Concept 98) Georgia was contacted by the CEO to research if adding a new data center makes sense for the organization from an economic and operational stand point. Georgia agreed to perform a(n) ________. A) A systems service request B) System enhancement study C) Feasibility study D) End product Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 99) Keith, the VP of Engineering, decides to put Joseph in charge of a new project because of his ________ skills. The members of that time are known to have clashing personalities and frequent disagreements. A) Conflict management B) Technical problem solving C) Risk management D) Change management Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 100) Establishing a relationship with the customer is an important part of the project initiation phase. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


101) Sasha reminded her team to add their project-related documents to the ________ so a proper audit could be conducted. A) Project database B) Project workbook C) Management team D) Customers Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 102) The project charter is the longest lower level document in the development of the project. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 3.1 Explain the process of managing an information systems project, including project initiation, project planning, project execution, and project closedown Classification: Concept 103) Barry asked Jerry for a diagram that shows the sequence of dependencies between tasks. Barry is asking for a ________. A) Network diagram B) Gantt chart C) PERT chart D) Project utilization document Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 104) Network diagramming is a ________ technique used for controlling resources. A) Preferred B) Critical path scheduling C) Difficult D) Mandatory project management Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


105) Because of its ability to represent how completion times vary for activities, network diagramming is used more often than Gannt charts in information systems development projects. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 106) Joshua is a new project manager. He is unsure of how much time a new task will require to be completed on the project. He decides to use ________ to estimate a realistic time frame for the task. A) A calculator B) The calendar from a previous project C) PERT D) A Gantt chart Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 3.2 Describe how to represent and schedule project plans using Gantt charts and network diagrams Classification: Concept 107) Understanding free slack and total slack allows the project manager to better identify where trade-offs can be made if changes to the project schedule need to be made. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 3.3 Explain how commercial project management software packages can be used to assist in representing and managing project schedules Classification: Concept 108) Most of the available tools have a set of common features that include all of the following except: ________. A) Accurate automated timed tasks B) The ability to define tasks C) The ability to modify tasks D) The ability to assign tasks Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 3.3 Explain how commercial project management software packages can be used to assist in representing and managing project schedules Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


109) In most project management software packages there is a feature that allows the project manager to establish holidays and work days. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 3.3 Explain how commercial project management software packages can be used to assist in representing and managing project schedules Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 4 Identifying and Selecting Systems Development Projects 1) What is another term for nonintegrated systems? A) Islands of information B) ERP systems C) SAP systems D) Enterprise systems Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 2) What is the first phase of the SDLC method? A) Analysis B) Planning C) Design D) Maintenance Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 3) The SDLC planning phase consists of which activity? A) Project completion B) Project reorganization C) Project selection D) Project testing Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 4) Which of the following is true as it pertains to project identification and small organizations? A) Small organizations normally have a formal process. B) Small organizations projects are normally borne out of a larger planning process. C) The proposal process is rigorous. D) The highest ranking IS manager typically selects the projects. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 1 Copyright © 2020 Pearson Education, Inc.


5) Which of the following is NOT a source for IS development requests? A) Customers B) Formal planning groups C) Business units D) IS managers Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 6) Why would an IS manager request an IS development project? A) To help meet the organization's goals B) To move to a new operating environment C) To provide a new service to customers D) To gain needed information Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 7) Which of the following is NOT a primary activity in project identification? A) Identify potential projects. B) Select IS projects. C) Stop current projects. D) Classify development projects. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 8) Which of the following roles does NOT identify potential development projects? A) CEO B) Steering committee C) User departments D) Customer focus groups Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


9) If a project has a small or narrow focus, it most likely was chosen by ________. A) A business unit B) Top management C) A steering committee D) The IS department Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 10) Which of the following factors does NOT have any influence on the selection of a potential project? A) Duration B) The IS manager list C) Risk D) Complexity Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 11) ________ will mostly likely choose projects that are easy to integrate with the current hardware and software. A) Top management B) Steering committees C) Development group D) User departments Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 12) Which of the following is NOT a characteristic of top management when choosing an IS project selection? A) Largest project size B) Strategic focus C) Enterprise wide consideration D) Faster development Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 3 Copyright © 2020 Pearson Education, Inc.


13) Which of the following is NOT a characteristic of a steering committee when making IS identification and selections? A) No concern with cost-benefit analysis B) Cross-functional focus C) Greater organizational change D) Larger and riskier projects Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 14) Which group chooses projects that most often reflect the larger needs of the organization? A) Business unit B) Steering committee C) Functional manager D) Development group Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 15) Which of the following is an example of a project coming from a top-down source? A) A project identified by a business unit B) A project identified by customers C) A project identified by a steering committee D) A project identified by managers Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 16) Which of the following groups does NOT identify a bottom-up development project? A) Business units B) Managers C) Top Management D) IS development group Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


17) As an analyst, which type of project would you most likely have contact with in the beginning of your career? A) Top-down projects B) Strategic goals projects C) Planning of projects D) Bottom-up projects Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 18) Which of the following is NOT a reason a project would be removed from the project selection list? A) The IS department feels it is too difficult to implement B) Inconsistency with overall objectives C) Redundant functionality D) Unnecessary Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 19) What is the second major activity in the project identification and selection process? A) Identifying potential projects B) Classifying IS development projects C) Choosing a final project D) Identifying a project team Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 20) Which of the following is NOT a possible evaluation criteria when ranking projects? A) Value chain analysis B) Strategic alignment C) Cross functional focus D) Technical difficulty Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


21) Which evaluation criteria for classifying and ranking projects deals with level of difficulty of the project? A) Value chain analysis B) Resource availability C) Potential benefits D) Technical difficulty Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 22) Considering evaluation criteria for classifying and ranking projects, which criterion concerns improving profits and customer service? A) Potential Benefits B) Project Duration C) Technical Risks D) Resource Availability Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 23) Which evaluation criterion for classifying and ranking projects deals with helping an organization achieve its long-term goals? A) Value chain analysis B) Strategic alignment C) Potential Benefits D) Resource availability Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 24) What has assisted value chains in having the greatest improvement? A) Value chain analysis B) Analysis of organization's activities C) Information systems D) Removing some processes in the value chain Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 6 Copyright © 2020 Pearson Education, Inc.


25) How should one think about an organization when conducting a value chain analysis? A) Understand the costs associated with value chain activities. B) Identify the projects that support the organizations goals. C) Consider the organization in terms of inputs/outputs. D) Look at each individual process within a value chain. Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 26) Which of the following is NOT an output in the value chain? A) Products sold to customers B) Services C) Distribution D) Costs Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 27) What is the final activity in the project identification and selection process? A) Selecting an IS project B) Producing the IS project C) Implementing the IS project D) Delete the project Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 28) ________ is a process of considering short- and long- term projects. A) Project selection B) Project identification C) Project determination D) Project analysis Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


29) If a project is selected, what is the most likely next step? A) The project will begin. B) The project will be funded. C) The project has to be signed off by management. D) The project is no longer considered. Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 30) Which of the following is NOT a possible decision outcome for a project? A) Accept the project B) Reject the project C) Evaluate criteria D) Proof of concept Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 31) Which of the following is NOT a factor when making a project selection decision? A) End-user development B) List of ongoing projects C) Current organizational environment D) Perceived and real needs Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 32) When choosing a weighted system to determine project viability, what should the organization keep in mind? A) All requirements should be weighted equally. B) Weights are subjective. C) The total points have to equal 100. D) Requirements and constraints have equal weights. Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


33) Which of the following is NOT included as a total when using a weighted multi-criteria project? A) Requirements B) Constraints C) Department rankings D) Overall totals Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 34) What is the primary deliverable in the initial part of the planning phase? A) To determine costs B) To rank projects C) A detailed project plan D) A schedule of specific IS development projects Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 35) The term ________ is used when a project is reviewed after each stage to determine its continuance. A) Incremental commitment B) Reevaluation C) Project continuance D) Project re-planning Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 36) How have organizations traditionally allocated IS resources? A) Through a formal process B) With a top-down process C) Through attempts to solve isolated organizational problems D) To update billing systems Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


37) Which of the following is NOT a reason why the planning-based approach for projects is better than the traditional approach? A) The planning-based approach plans for the future. B) Data structures remain stable. C) Business processes remain the same for at least five years. D) An organization's informational needs change more slowly. Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 38) Although there are numerous motivations for carefully planning the identification of projects, organizations have not used a planning process when allocating IS resources. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 39) The scope of information systems is concerned with the entire company. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 40) A large organization uses a less formal approach to project selection. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 41) A primary step in project planning is selecting IS development projects. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 42) Top management most often chooses projects with a narrow tactical focus. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 10 Copyright © 2020 Pearson Education, Inc.


43) A development group selection method looks for projects with fewer development delays. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 44) When a steering committee chooses a project, it is referred as a bottom-up source. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 45) Projects are identified by bottom- and top-up sources. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 46) The second step in selection of a project is reviewing the current projects and removing the ones that do not line up with strategic goals. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 47) Transforming raw materials into products is a part of a value chain. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 48) Rejection of a project is the only outcome in the classifying and ranking of projects. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


49) Using a weighted system, requirements and restraints should be given equal weights. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 50) An example of a requirement for project selection is ease of training. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 51) The primary deliverable form the planning phase of IS development projects is incremental commitment. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 52) If a project is in the incremental commitment stage, it is waiting to start. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 53) The organization should have a good understanding of the business strategy for good project selection to occur. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 54) The cost of information systems has steadily decreased over time. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


55) Every successful organization has a mission. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 56) Describe all of the sources of information systems development requests. Answer: During project identification and selection, a senior manager, a business group, an IS manager, or a steering committee identifies and assesses all possible systems development projects that an organization unit could undertake. Information systems development requests come from a variety of sources. One source is requests by managers and business units for replacing or extending an existing system to gain needed information or to provide a new service to customers. Another source for requests is IS managers who want to make a system more efficient and less costly to operate, or want to move it to a new operating environment. A final source of projects is a formal planning group that identifies projects for improvement to help the organization meet its corporate objectives. Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Synthesis 57) Identify the three activities in project identification and selection. Describe at least one step in each activity. Answer: Project identification and selection consists of three primary activities: 1. Identifying potential development projects; 2. Classifying and ranking IS development projects; 3. Selecting IS development projects. Organizations vary as to how they identify projects. This process can be performed by a key member of top management, a steering committee, user departments, systems analyst or the development group/senior IS manager. The final activity in the project identification and selection process is the actual selection of projects for further development. Project selection is a process of considering both short- and long-term projects and selecting those most likely to achieve business objectives. Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Synthesis 58) What is a top-down planning approach? Identify four advantages to the top-down planning approach over other planning approaches. Answer: A top-down planning approach is a generic information systems planning methodology that attempts to gain a broad understanding of the information system needs of the entire organization. Broader perspective, improved integration, improved management support, and better understanding are four advantages. Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Synthesis 13 Copyright © 2020 Pearson Education, Inc.


59) List and describe the six evaluation criteria for classifying and ranking projects. Answer: 1. Value Chain Analysis: Extent to which activities add value and costs when developing products and/or services. 2. Strategic Alignment: Extent to which the project is viewed as helping the organization achieve its strategic objectives and long-term goals. 3. Potential Benefits: Extent to which the project is viewed as improving profits, customer service, and so forth, and the duration of these benefits. 4. Resource Availability: Amount and type of resources the project requires and their availability. 5. Project Size/Duration: Number of individuals and the length of time needed to complete the project. 6. Technical Difficulty/Risks: Level of technical difficulty to successfully complete the project within given time and resource constraints. Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Synthesis 60) Define incremental commitment. Does it always result in a working system? Why or why not? Answer: Incremental commitment is a systems analysis and design strategy in which the project is reviewed after each phase and continuation of the project is rejustified in each of these reviews. Incremental commitment does not always result in a working system. Incremental commitment permits management and the project team to reevaluate the system's costs, benefits, and risks in light of changing business conditions. If business conditions, system costs, system benefits, and/or risks have changed, the project may be cancelled. Difficulty: Difficult AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Synthesis

14 Copyright © 2020 Pearson Education, Inc.


61) There is a need for improved information systems project and identification. Describe the indicators that support the previous statement. Answer: The need for improved information systems project identification and selection is readily apparent when we consider factors such as the following: 1. The cost of information systems has risen steadily and approaches 40 percent of total expenses in some organizations. 2. Many systems cannot handle applications that cross organizational boundaries. 3. Many systems often do not address the critical problems of the business as a whole or support strategic applications. 4. Data redundancy is often out of control, and users may have little confidence in the quality of data. 5. Systems maintenance costs are out of control as old, poorly planned systems must constantly be revised. 6. Application backlogs often extend three years or more, and frustrated end users are forced to create (or purchase) their own systems, often creating redundant databases and incompatible systems in the process. Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Synthesis 62) Which of the following is NOT a consideration when discussing the need for improved IS project selection? A) Systems cannot handle applications that cross organizational boundaries. B) Poorly planned systems must be constantly revised. C) Data redundancy is out of control. D) The cost of information systems has remained steady. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 63) Which of the following is NOT a step in the corporate strategic planning process? A) Current enterprise B) Future enterprise C) IS Corporate plan D) Strategic plan Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


64) A ________ clearly states what business a company is in. A) Corporate statement B) Current plan C) Mission statement D) Strategic plan Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 65) When do executives develop a mission statement? A) At the beginning of the fiscal year B) During corporate strategic planning C) At the beginning of the project D) During the board of director meeting Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 66) What kind of statement is "We are in the business of designing, fabricating, and selling to retail stores high-quality wood furniture"? A) Business statement B) Mission statement C) Goal statement D) Corporate policy Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 67) What refers to a broad and timeless goal for the organization? A) A competitive strategy B) The strategic plan C) The objective statements D) The mission statement Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


68) Which of the following is NOT a generic strategy identified by Porter? A) Low cost producer B) Product differentiation C) Product niche D) Product introduction Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 69) Which Porter strategy deals with competing in an industry on the basis of products to the consumer? A) Value added B) Low cost producer C) Product differentiation D) Product Focus Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 70) Which Porter strategy has a narrow market focus? A) Low cost producer B) Product niche C) Product differentiation D) Service cost to the consumer Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 71) Which of the following does a company NOT need to understand in order to build effective information systems? A) Its mission B) Its objectives C) Its current IS project list D) Its strategy Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


72) Information systems planning includes all of the following steps except ________. A) Current situation B) Future situation C) Schedule of projects D) Selection of projects Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 73) Which approach to planning begins with an analysis of an organization's mission? A) Top-down planning B) Top-down projects C) Bottom up planning D) Bottom up goals Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 74) Identifying the relationships between organizational entities and each business function relates to which kind of matrix? A) Unit-to-function B) Location-to-unit C) Function-to-process D) Entity-to-process Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 75) The second activity in the ISP process is ________. A) Describe the target situation, trends, and constraints B) Describe the current situation C) Develop a transition strategy and plans D) Develop the logical design Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


76) The third activity in the ISP process is ________. A) Describe the target situation, trends, and constraints B) Describe the current situation C) Develop a transition strategy and plans D) Develop the logical design Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 77) Which of the following is NOT a component on the typical information systems plan? A) Corporation history B) Constraints on IS development C) Informational inventory D) The short-term plan Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 78) The overall IS plan may influence ________. A) Whether a systems analyst will be on the project B) The organization's strategic plan C) All development projects D) The mission of the company Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 79) Which section of the ISP deals with the set of long-range strategies chosen by the IS department? A) Overall systems needs strategies B) Mission and objectives of IS C) Informational inventory D) Conclusion Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


80) Objective statements is the method of an organization fulfilling its mission and objectives. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 81) Hyundai practices the low-cost producer competitive strategy. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 82) In information systems planning, technology blueprints would be found in the current situation step. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 83) The most used approach to describing the current situation is a top-up approach. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 84) When an organization reviews their short and long term goals for development, the organization uses an IS plan to document it. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 85) Define and briefly discuss corporate strategic planning. Answer: To make effective project selection decisions, a corporation must know where it is, where it is going, and the path it will take to get there. Corporate strategic planning is based on this premise. Corporate strategic planning can be viewed as a three step process: (1) current enterprise, (2) future enterprise, and (3) strategic plan. During corporate strategic planning, mission statements, statements of future corporate objectives, and strategies are developed. Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis 20 Copyright © 2020 Pearson Education, Inc.


86) Identify and describe the generic competitive strategies. Provide an example for each strategy. Answer: Low-Cost Producer: This strategy reflects competing in an industry on the basis of product or service cost to the consumer. For example, in the automobile industry, the South Korean-produced Hyundai is a product line that competes on the basis of low cost. Product Differentiation: This competitive strategy reflects capitalizing on a key product criterion requested by the market (for example, high quality, style, performance, roominess). In the automobile industry, many manufacturers are trying to differentiate their products on the basis of quality (e.g., "At Ford, quality is job one."). Product Focus or Niche: This strategy is similar to both the low-cost and differentiation strategies but with a much narrower market focus. For example, a niche market in the automobile industry is the convertible sports car market. Within this market, some manufacturers may employ a low-cost strategy and others may employ a differentiation strategy based on performance or style. Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis 87) Define and discuss information systems planning. Answer: ISP is an orderly means of assessing the information needs of an organization, and defining the systems, databases, and technologies that will best satisfy those needs. During ISP, current and future organization informational needs will be modeled. Also, strategies and project plans to move the current information system and technologies to their desired future state will be developed. ISP looks at information systems and technologies in terms of how they can help the business achieve its objectives defined during corporate planning. ISP includes three key activities. The first activity involves assessing current IS-related assets; the second step involves developing target blueprints of the resources; a series of scheduled projects is defined in the third step. Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis

21 Copyright © 2020 Pearson Education, Inc.


88) Briefly describe four of the ten types of matrices that are beneficial during information systems planning. Answer: The types of matrices typically developed include the following: • Location-to-Function: This matrix identifies which business functions are being performed at various organizational locations. • Location-to-Unit: This matrix identifies which organizational units are located in or interact with a specific business location. • Unit-to-Function: This matrix identifies the relationships between organizational entities and each business function. • Function-to-Objective: This matrix identifies which functions are essential or desirable in achieving each organizational objective. • Function-to-Process: This matrix identifies which processes are used to support each business function. • Function-to-Data Entity: This matrix identifies which business functions utilize which data entities. • Process-to-Data Entity: This matrix identifies which data are captured, used, updated, or deleted within each process. • Process-to-Information System: This matrix identifies which information systems are used to support each process. • Data Entity-to-Information System: This matrix identifies which data are created, updated, accessed, or deleted in each system. • Information System-to-Objective: This matrix identifies which information systems support each business objective as identified during organizational planning. Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis 89) Describe three ways CASE tools help to sort out the information in matrices. Answer: Management of Information: A big part of working with complex matrices is managing the information. Using the dictionary features of the CASE tool repository, terms can be defined or modified in a single location. All planners will therefore have the most recent information. Matrix Construction: The reporting system within the CASE repository allows matrix reports to be easily produced. Because planning information can be changed at any time by many team members, an easy method to record changes and produce the most up-to-date reports is invaluable to the planning process. Matrix Analysis: Possibly the most important feature CASE tools provide to planners is the ability to perform complex analyses within and across matrices. This analysis is often referred to as affinity clustering. Difficulty: Easy AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis

22 Copyright © 2020 Pearson Education, Inc.


90) What is affinity clustering? Why is it important? Answer: Affinity clustering is the process of arranging planning matrix information so that clusters of information with a predetermined level or type of affinity are placed next to each other on a matrix report. It is important because it allows planners a means to perform complex analyses. Thus, affinity clustering is the process of arranging matrix information so that clusters of information with some predetermined level or type of affinity are placed next to each other on a matrix report. Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis 91) Define and briefly discuss information systems planning (ISP). Answer: Information systems planning is an orderly means of assessing the information needs of an organization, and defining the systems, databases, and technologies that will best satisfy those needs. During ISP, current and future organization informational needs will be modeled. Also, strategies and project plans to move the current information system and technologies to their desired future state will be developed. ISP looks at information systems and technologies in terms of how they can help the business achieve its objectives defined during corporate planning. ISP includes three key activities. The first activity involves assessing current IS-related assets; the second step involves developing target blueprints of the resources; a series of scheduled projects is defined in the third step. Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Synthesis 92) What is a large network of networks? A) Electronic commerce B) The Internet C) EDI D) A local area network Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


93) Which of the following is NOT a general class of Internet electronic commerce? A) B2B B) B2E C) G2B D) B2C Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 94) What is the first step in developing an Internet-EC application? A) Determining who on the executive board will be the sponsor of the project B) Getting approval from the Internet C) Gain a clear understanding of various unknowns D) Deciding the name of the product Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 95) Which of the following is an unknown that should be addressed when designing an Internet application? A) Connection speed B) How many users will access the application at one time C) How much it costs purchase satellite service D) What the time zone of the user is Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


96) What stands as the most outstanding representation of global networking? A) Business to business applications B) The Internet C) Protocols D) Electronic commerce Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 97) The most connected network in the world is the Internet. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 98) G2C is not a mode of electronic commerce. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 99) What is electronic commerce? List the electronic commerce models. Answer: Using the Internet to support day-to-day government, business, and consumer activities is broadly referred to as electronic commerce (EC). There are a broad range of EC business models, including: • Business-to-Business (B2B) • Business-to-Consumer (B2C) • Consumer-to-Consumer (C2C) • Consumer-to-Business (C2B) • Business-to-Government (B2C) • Government-to-Business (G2B) • Government-to-Citizen (G2C) • Thing-to-Thing (T2T) Difficulty: Moderate AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Synthesis 100) What are the unknowns when designing and building Internet applications? Provide an 25 Copyright © 2020 Pearson Education, Inc.


example of each. Answer: 1. User • Concern: Who is the user? • Example: Where is the user located? What is the user's expertise or education? What are the user's expectations? 2. Connection Speed • Concern: What is the speed of the connection and what information can be effectively displayed? • Example: Modem, Cable Modem, DSL, Satellite, Broadband, Cellular 3. Access Method • Concern: What is the method of accessing the net? • Example: Web Browser, Personal Digital Assistant (PDA), Web-enabled Cellular Phone, Tablet, Web-enabled Television. Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Synthesis 101) All of the following are sources that can request information systems development projects except ________. A) Managers B) Business units C) A formal planning group D) Other companies Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 102) Research has found that projects identified by steering committees more often have a narrow, tactical focus. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


103) Joshua is on a committee that is identifying projects with a cross-functional focus. His selection method committee is ________. A) A steering committee B) Top management C) A functional area D) A developmental group. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 104) If an organization is looking at classifying a project based on the extent to which the project is viewed as improving customer service, the evaluation criteria is ________. A) Technical difficulty B) Potential benefits C) Resource availability D) Project size Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept 105) Mary has just completed the analysis phase of her project. Now she is waiting to find out if the project will be changed because her group practices ________ after each phase to rejustify the project. A) Milestones B) Prototyping C) Incremental commitment D) Desktop reviews Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.1 Describe the project identification and selection process Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


106) Kia Motors competes using a generic strategy of ________ which takes into account the budget of the consumer. A) Low-cost producer B) Product differentiation C) Product focus D) Product niche Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 107) Keith has to develop the ________ matrix which identifies which processes are used to support each business function. A) Unit-to-function B) Location-to-function C) Data equity-to-information system D) Function-to-process Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 108) Summarize what an organization has to do to create the target situation. Answer: In summary to create a target situation, planners must first edit their initial lists and record the desired locations, units, functions, processes, data, and information systems within the constraints and trends of the organization environment. Next, matrices are updated to related information in a manner consistent with the desired future state. Planners then focus on the differences between the current and future list sand matrices to identify projects and transition strategies. Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 109) Goals that are expressed as a series of statements that are either qualitative or quantitative but not contain details likely to change over time are located in the ________. A) Objective statements B) Mission statement C) Competitive strategy D) Requirements document. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.2 Describe the corporate strategic planning and information systems planning process Classification: Concept 28 Copyright © 2020 Pearson Education, Inc.


110) The ________ refers to a broad class of physical objects that feature an Internet address and connectivity that communicate between these objects and other Internet-enabled devices and systems. A) B2B B) Internet C) Internet-of-Things D) LAN Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 111) All of these are examples of Internet-of-Things (IoT) except ________. A) Monitor B) Fitness tracker C) Tesla D) Amazon Echo Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 112) Internet-enabled devices and systems is a slow emerging area. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept 113) The Internet-of-Things (IoT) lives in software. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


114) Kathy has an idea for real time parking space finder app. The best way for her to implement this device is using the concept of ________. A) B2B B) The Internet C) The Internet-of-Things (IoT) D) LAN Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 4.3 Describe the three classes of Internet electronic commerce applications: business-toconsumer, business-to-employee, and business-to-business Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 5 Initiating and Planning Systems Development Projects 1) Project identification and selection is also known as ________. A) A preproject step B) The Project ID C) The first step D) Project selection Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 2) Which of the following is NOT a question asked to determine if project initiation and planning has ended and analysis has begun? A) What kind of effort should be expended on PIP? B) Who is going to pay for PIP? C) Who is responsible for performing PIP? D) Why is PIP so challenging? Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 3) Who is typically responsible for performing the PIP process? A) Managers B) Users C) Systems analyst D) The business unit Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 4) Why is PIP challenging? A) Because it is expensive B) Because only systems analysts participate in the process C) Because it is a closed-ended process D) Because it turns a vague system request into a project description Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 1 Copyright © 2020 Pearson Education, Inc.


5) ________ is the process of defining clear activities necessary to complete activities in a single project. A) Project planning B) Project initiation C) Baseline D) Business case Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 6) What is an example of a project assumption? A) Size B) Potential problems C) Scope D) Complexity Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 7) Which of the following is NOT a part of project initiation? A) Create the project initiation team B) Establish management procedures C) Create a project budget D) Develop the project charter Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 8) What is the term that describes the best estimate of a project's scope, benefits, cost, and resources? A) Management procedure B) Project charter C) Resource plan D) Baseline project plan Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 2 Copyright © 2020 Pearson Education, Inc.


9) All of the following are part of project planning except ________. A) Organizing the team B) Creating a resource plan C) Identifying risk D) Developing the project scope Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 10) What of the following is NOT a purpose for a baseline project plan? A) Resources are more quantifiable B) Eliminate risks C) Decide if a project should be rejected D) A depository for information collected during initiation Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 11) Which document outlines all work required to complete the project? A) Baseline project plan B) Business plan C) Project scope document D) Feasibility document Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 12) The more complex organizational settings are for projects, the less time it takes for analysis because the company has more resources. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


13) When projects are across departments with different objectives, it may be difficult to get parties to agree on the direction of the project. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 14) A major outcome and deliverable from the project initiation and planning phase is a baseline project plan. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 15) The useful life of many IS may not exceed five years. Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 16) A project must have a positive ROI to be approved for continuation. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 17) Building an economic case for a project is an open-ended activity. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 18) Small projects do not have any risk. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


19) For risker projects, the return is typically greater. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 20) Development of an executive support system is an example of risky project. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 21) A project with high risk may not be conducted. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 22) Operational feasibility deals with project duration. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 23) During schedule feasibility it is a good practice to not have system testing during holiday periods. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


24) What are the questions that should be considered when making decisions on the division between PIP and analysis? Explain each question. Answer: 1. How much effort should be expended on the project initiation and planning process? How much effort should be expended on the PIP process, is often difficult. Practical experience has found, however, that proper and insightful project planning, including determining project scope as well as identifying project activities, can easily reduce time in later project phases. 2. Who is responsible for performing the project initiation and planning process? Most organizations assign an experienced systems analyst, or a team of analysts for large projects, to perform PIP. The analyst will work with the proposed customers of the system and other technical development staff in preparing the final plan. 3. Why is project initiation and planning such a challenging activity? PIP is viewed as a challenging activity because the objective of the PIP study is to transform a vague system request document into a tangible project description. This is an open-ended process. The analyst must clearly understand the motivation for and objectives of the proposed system. Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Synthesis 25) What occurs during the project initiation and planning phase of the development process? Include an example of an activity in each step. Answer: Project initiation focuses on activities designed to assist in organizing a team to conduct project planning. Examples of the types of activities performed are establishing project initiation, developing the project charter, and establishing a relationship with the customer. One key activity of project initiation is the development of the project charter. Project planning, the second activity within PIP, focuses on assessing the information system needs of the entire organization. Project planning is the process of defining clear, discrete activities and the work needed to complete each activity within a single project. Some example activities include describing the project scope, setting a baseline project plan, and identifying and assessing risks. Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Synthesis

6 Copyright © 2020 Pearson Education, Inc.


26) Define Project Scope Statement (PSS) and Baseline Project Plan (BPP)? Compare and contrast the two. Answer: The Baseline Project Plan and the Project Scope Statement are the major outcomes and deliverables for the project initiation and planning phase. All information collected and analyzed during this phase is contained in the BPP. This plan reflects the best estimate of the project's scope, benefits, costs, risks, and resource requirements. It also specifies detailed project activities for the following phase and more general specifications for the remaining phases. The BPP can be used by the project selection committee to determine the project worth–accept, reject, or modify. The Project Scope Statement is a document prepared for the customer during project initiation and planning that describes what the project will deliver and outlines generally at a high level all work required to complete the project. The PSS consists of a high-level summary of the BPP. While the actual role of the PSS can vary, the PSS can be used by the analyst and the customer to gain an understanding of the project. Difficulty: Difficult AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Synthesis 27) Define tangible and intangible benefits and costs. What is the difference between the two? Answer: A tangible benefit refers to a benefit derived from the creation of an information system that can be measured in dollars and with certainty. Examples include reduced personnel expenses, lower transaction costs, and higher profit margins. Intangible benefit refers to a benefit derived from the creation of an information system that cannot be easily measured in dollars or with certainty. Examples include competitive necessity, promotion of organizational learning and understanding, and improved asset utilization. While tangible costs are costs associated with an information system that can be measured in dollars and with certainty, intangible costs are costs associated with an information system that cannot be easily measured in terms of dollars or with certainty. Hardware costs, labor costs, and operational costs are tangible costs. Loss of customer goodwill, employee morale, and operational inefficiency are intangible costs. Difficulty: Difficult AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Synthesis 28) Describe the differences between one-time and recurring benefits and costs. Answer: One-time costs are costs associated with project start-up and development or system start-up. This type of cost includes hardware and software purchases, user training, and site preparation. Recurring costs are costs resulting from the ongoing evolution and use of a system. New software and hardware leases, incremental communications, and incremental data storage expense are recurring costs. Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Synthesis

7 Copyright © 2020 Pearson Education, Inc.


29) A Project Scope Statement can be used to ________. A) Detail project estimates B) Outline a schedule C) Prepare the project for the analysis phase D) Serve as a contract Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 30) What makes all projects feasible? A) Unlimited resource and infinite time B) Limited scope C) A great budget D) A highly skilled project team Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 31) All of the following are categories of feasibility except ________. A) Technical B) Scope C) Scheduling D) Political Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 32) Which feasibility category deals with identifying financial benefits associated with the project? A) Political B) Legal C) Economic D) Technical Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


33) A(n) ________ comes from an information system that can be measured monetarily. A) Project benefit B) Economic feasibility C) Project plan D) Tangible benefit Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 34) All of the following are tangible benefits except ________. A) Decreased flexibility B) Cost reduction C) Increased speed of activity D) Improvement of management planning Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 35) Which of the following is an example of a tangible benefit? A) Error reduction in data entry B) Improvement of employee morale C) Faster decision making D) Positive impacts on society Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 36) Which of the following is an example of an intangible cost? A) Hardware costs B) Labor costs C) Customer goodwill D) Employee training Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


37) Which of the following is an example of a procurement IS cost? A) System maintenance B) User training C) Personnel recruiting D) Organizational disruptions Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 38) Which of the following is NOT a guideline for better cost estimation? A) Have clear guidelines for creating estimates. B) Use experienced developers. C) Update estimates at the end of the project. D) Use historical data. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 39) A new hardware purchase is classified as a(n) ________. A) Tangible benefit B) One-time cost C) Fixed cost D) IS fee Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 40) Which of the following is NOT an example of a recurring cost? A) Software maintenance B) Data storage expenses C) System conversion D) Hardware leases Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


41) Which term below means that money available today is worth more than the same amount tomorrow? A) Cost benefit B) Discount rate C) Variable costs D) Time value of money Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 42) ________ is/are the rate at which money can be borrowed or invested. A) Cost of capital B) Present value C) Fixed costs D) Time value of money Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 43) Which option identifies the point at which benefits equal costs? A) Net present value B) Break-even analysis C) Time value of money D) Present value Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 44) Which of the following is NOT an example of an economic cost-benefit analysis technique? A) Net present value B) Time value of money C) Return on investment D) Break-even analysis Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


45) Which of the options below means the organization has the ability to build the requested system? A) Economic feasibility B) Return on investment C) Technical Feasibility D) Break-even point Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 46) Which of the following is NOT a consideration during the assessing technical feasibility stage? A) System size B) System complexity C) System target hardware D) System cost Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 47) ________ need to be managed in order to be minimized. A) Risks B) ROIs C) Employees D) Estimates Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 48) Which of the following is NOT a potential consequence of not managing risks? A) Unqualified project management B) Inaccurate duration times C) Failure to achieve appropriate system performance levels D) Inaccurate cost estimates Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


49) Failure to integrate the new system with the old system is an example of ________. A) A poor break-even analysis B) Failure to create an adequate project scope statement C) Failure to recognize tangible benefits D) Failure to assess and manage risks Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 50) Which of the following is NOT a way to manage project risks? A) Changing the budget B) Changing the project plan C) Carefully assigning project team members D) Setting up monitoring methods Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 51) Which of the following is NOT an example of a project risk assessment factor? A) Project duration time B) Customer's commitment to system C) Familiarity with similar systems D) Organizational personnel changes resulting from system Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 52) Which of the following is a less risky approach to the technical parts of a project? A) User involvement B) Using a matrix C) Using standard technology D) Having a well-equipped IT staff Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


53) Each organization has to decide its acceptable mix of projects of varying ________. A) Cost B) Personnel C) Requirements D) Risk Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 54) Which type of project should companies not have too many of? A) High risk B) High cost C) Huge staff D) Unknown technical environment Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 55) Which of the following is NOT an example of a type of feasibility study? A) Operational feasibility B) Technical feasibility C) Economic feasibility D) Resource feasibility Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 56) Which feasibility is concerned with the project attaining its desired objectives? A) Technical feasibility B) Operational feasibility C) Schedule feasibility D) Legal feasibility Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


57) Which type of feasibility deals with project duration? A) Political feasibility B) Contract feasibility C) Time feasibility D) Schedule feasibility Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 58) Which of the following is NOT a factor in determining schedule feasibility? A) A 45-hour work week B) Government-imposed deadline C) Business cycles D) Vacation Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 59) Explain the time value of money. Incorporate terms such as discount rate and present value. Answer: Most techniques used to determine economic feasibility encompass the concept of the time value of money (TVM), which reflects the notion that money available today is worth more than the same amount tomorrow. Benefits from systems development will likely occur sometime in the future. Because many projects may be competing for the same investment dollars and may have different useful life expectancies, all costs and benefits must be viewed in relation to their present value when comparing investment options. The rate at which money can be borrowed or invested is referred to as the cost of capital, and is called the discount rate for TVM calculations. Present value is the current value of a future cash flow. Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis

15 Copyright © 2020 Pearson Education, Inc.


60) Define the most commonly used economic cost-benefit analysis techniques. Answer: Net Present Value (NPV) uses a discount rate determined from the company's cost of capital to establish the present value of a project. The discount rate is used to determine the present value of both cash receipts and outlays. Return on Investment (ROI) is the ratio of the net cash receipts of the project divided by the cash outlays of the project. Trade-off analysis can be made among projects competing for investment by comparing their representative ROI ratios. Break-Even Analysis (BEA) finds the amount of time required for the cumulative cash flow from a project to equal its initial and ongoing investment. Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis 61) What is the objective of a break-even analysis? Answer: The objective of the break-even analysis is to discover at what point (if ever) benefits equal costs. Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis 62) Define technical feasibility. What are the assessments associated with this feasibility study? Answer: The purpose of assessing technical feasibility is to gain an understanding of the organization's ability to construct the proposed system. This analysis should include an assessment of the development group's understanding of the possible target hardware, software, and operating environments to be used, as well as system size, complexity, and the group's experience with similar systems. In this section, we will discuss a framework you can use for assessing the technical feasibility of a project in which a level of project risk can be determined after answering a few fundamental questions. Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis

16 Copyright © 2020 Pearson Education, Inc.


63) List the factors associated with technical risks. Describe the rules involved in assessing a technical risk assessment. Answer: The amount of technical risk associated with a given project is contingent on four primary factors: project size, project structure, the development group's experience with the application and technology area, and the user group's experience with systems development projects and the application area. The rules are: 1. large projects are riskier than small projects. Project size, of course, relates to the relative project size with which the development group typically works. 2. A system in which the requirements are easily obtained and highly structured will be less risky than one in which requirements are messy, ill-structured, ill-defined, or subject to the judgment of an individual. 3. The development of a system employing commonly used or standard technology will be less risky than one employing novel or nonstandard technology. 4. A project is less risky when the user group is familiar with the systems development process and application area than if the user group is unfamiliar with them. Difficulty: Moderate AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis 64) Describe how one can manage project risk. Answer: You can manage risk on a project by changing the project plan to avoid risky factors, assigning project team members to carefully manage the risky aspects, and setting up monitoring methods to determine whether or not potential risk is, in fact, materializing. The amount of technical risk associated with a given project is contingent on four primary factors: project size, project structure, the development group's experience with the application and technology area, and the user group's experience with systems development projects and the application area. Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis 65) Briefly describe schedule feasibility. Provide an example. Answer: The purpose of assessing schedule feasibility is for you, as a systems analyst, to gain an understanding of the likelihood that all potential time frames and completion date schedules can be met and that meeting these dates will be sufficient for dealing with the needs of the organization. Detailed activities may only be feasible if resources are available when called for in the schedule. The schedule of activities produced during project initiation and planning will be very precise and detailed for the analysis phase. Example: a system may have to be operational by a government-imposed deadline. Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Synthesis

17 Copyright © 2020 Pearson Education, Inc.


66) Which of the following is NOT a factor in determining legal and contractual feasibility? A) Labor laws B) Financial budgets C) Copyright infringements D) Foreign trade regulations Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 67) A common legal and contractual development in new application development is ________. A) Understanding how stakeholders feel about the system B) Determining which IS to develop C) Expanding software licenses D) The political ramifications of a new system Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 68) All of the following are included in the Baseline Project Plan except ________. A) Introduction B) System description C) Feasibility assessment D) Conclusion Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 69) Which part of the Baseline Project Plan contains an outline of the recommended course of action? A) Introduction B) Feasibility assessment C) Management issues D) System description Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


70) The ________ outlines possible alternative solutions. A) Design strategies B) System description C) Project scope D) Introduction Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 71) Which of the following is NOT an example of a system description? A) Web-based online system B) Management issues C) LAN with decentralized databases D) Mainframe with central databases Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 72) At what point in the project should you identify the alternative solutions? A) The introduction section of the BPP B) During the project initiation phase C) In the system description section of the BPP D) During baseline planning Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 73) Which of the following is NOT included in the feasibility assessment? A) Project costs B) Technical difficulties C) Project benefits D) System alternatives Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


74) Where do you identify the types of people needed for a project? A) Team configuration and management part of the management issues plan B) Communications part of the management issues plan C) Project standards and procedures of the management issues plan D) Work breakdown structure of the management issues plan Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 75) The Baseline Project Plan has all of the primary objectives except ________. A) Helps provide the budget B) Helps provide a clear idea of the scope C) Helps provide an understanding of the benefits D) Defines the duration of the project Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 76) Who must review the Baseline Project Plan before it moves to the next phase in the SDLC? A) The Customers B) The CEO C) The IS Manager D) The uses, managers, and development group Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 77) ________ are peer group reviews of products created via the systems development process. A) Staff meetings B) Walk-throughs C) Steering committee meetings D) Project approval bodies Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


78) Which of the following is NOT a role in a walk-through meeting? A) Secretary B) Treasurer C) User D) Presenter Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 79) Which role in the walkthrough normally has done all or some of the work presented? A) Coordinator B) User C) Presenter D) Standards bearer Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 80) Joseph wants to make sure the proposed system conforms to organizational standards, so he schedules a ________. A) Milestone B) Communication review C) Baseline project plan review D) Walk-through Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 81) Which of the following types of documents do NOT make use of a walk-through? A) System specifications B) Code segments C) Test procedures D) Project budget Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


82) Which of the following is a guideline for presentation design in making an effective presentation? A) Keep it simple. B) Practice. C) Have a backup plan. D) Know your audience. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 83) The introduction portion of the Baseline Project Plan is often the first section to be written. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 84) Detailed task and activities estimates are completed during the project initiation and planning phase. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 85) The baseline business plan is a type of project and contains steps for overall systems development. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 86) Ensuring the customer and development group have a common understanding of the project is a primary objective of the PSSBPP. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


87) Define legal and contractual feasibility. Describe activities that may be involved in this feasibility study. Answer: Legal and contractual feasibility is the process of assessing potential legal and contractual ramifications due to the construction of a system. Possible considerations might include copyright or nondisclosure infringements, labor laws, antitrust legislation, foreign trade regulations, and financial reporting standards, as well as current or pending contractual obligations. Contractual obligations may involve ownership of software used in joint ventures, license agreements for use of hardware or software, nondisclosure agreements with partners, or elements of a labor agreement. A common situation is that development of a new application system for use on new computers may require new or expanded, and more costly, system software licenses. Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Synthesis 88) What is political feasibility and why is it important? Answer: Political feasibility in which you attempt to gain an understanding of how key stakeholders within the organization view the proposed system. Because an information system may affect the distribution of information within the organization, and thus the distribution of power, the construction of an information system can have political ramifications. Those stakeholders not supporting the project may take steps to block, disrupt, or change the intended focus of the project. Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Synthesis 89) Describe the sections of a Baseline Project Plan. Answer: The major sections of a Baseline Project Plan are: 1. Introduction–a brief overview of the entire document and outline of recommended course of action for the project. 2. System Description–an outline of possible alternative solutions in addition to the one deemed most appropriate for the given situation. 3. Feasibility Assessment–issues related to project costs and benefits, technical difficulties, and other such concerns are outlined. 4. Management Issues–a short section outlines a number of managerial concerns related to the project. Difficulty: Difficult AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Synthesis

23 Copyright © 2020 Pearson Education, Inc.


90) List and describe the parts of the feasibility assessment portion of a Baseline Project Plan. Answer: Economic Analysis–Provides an economic justification for the system using costbenefit analysis. Technical Analysis–Provides a discussion of relevant technical risk factors and an overall risk rating of the project. Operational Analysis–Provides an analysis of how the proposed system solves business problems or takes advantage of business opportunities in addition to an assessment of how current day-today activities will be changed by the system. Legal and Contractual Analysis–Provides a description of any legal or contractual risks related to the project. Political Analysis–Provides a description of how key stakeholders within the organization view the proposed system. Schedules, Time Line, and Resource Analysis–Provides a description of potential time frame and completion date scenarios using various resource allocation schemes. Difficulty: Difficult AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Synthesis 91) List and describe the sections of the management issues portion of a Baseline Project Plan. Answer: Team configuration and management–Provides a description of the team member roles and reporting relationships. Communication plan–Provides a description of the communication procedures to be followed by management, team members, and the customer. Project standards and procedures–Provides a description of how deliverables will be evaluated and accepted by the customer. Other project-specific topics–Provides a description of any other relevant issues related to the project uncovered during planning. Difficulty: Difficult AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Synthesis

24 Copyright © 2020 Pearson Education, Inc.


92) Briefly define the introduction and system description portions of a Baseline Project Plan. Answer: The introduction includes the following: Project overview–Provides an executive summary that specifies the project's scope, feasibility, justification, resource requirements, and schedules. Additionally, a brief statement of the problem, the environment in which the system is to be implemented, and constraints that affect the project are provided. Recommendation–Provides a summary of important findings from the planning process and recommendations for subsequent activities. System description includes: Alternatives—Provides a brief presentation of alternative system configurations. System description–Provides a description of the selected configuration and a narrative of input information, tasks performed, and resultant information. Difficulty: Difficult AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Synthesis 93) Users, management, and customers verify the BPP. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Concept 94) Database integration is a part of the development category in Web-based system costs. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Concept 95) An example of a recurring tangible cost is software. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Concept 96) Personal appearance matters during a presentation. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


97) Briefly define walkthrough and describe the role of each participant. Answer: A walk-through is a peer group review of any product created during the systems development process. During the review users, management, and the development group participate through various roles. These roles are coordinator, presenter, user, secretary, standards bearer, and maintenance oracle. The coordinator is the person who plans the meeting and facilitates a smooth meeting process. The presenter is the individual who describes the work product to the group. Ensuring that the work product meets the needs of the project's customers is the role fulfilled by the user. The person taking notes and recording decisions or recommendations made by the group is the secretary. The standards bearer role is to ensure that the work product adheres to organizational technical standards. The maintenance oracle is the individual who reviews the work product in terms of future maintenance activities. Difficulty: Easy AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Synthesis 98) What are the guidelines for making an effective presentation? Be sure to include the steps in the process. Elaborate on each step. Answer: Presentation planning includes: Who is the audience? What is the message? What is the presentation environment? Presentation design includes: Organize the sequence. Be consistent. Use variety. Don't rely on the spell checker alone. Use bells and whistles sparingly. Presentation Delivery includes: Practice. Arrive early and cue up your presentation. Learn to use the "special" software keys. Have a backup plan. Personal appearance matters. Difficulty: Moderate AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Synthesis 99) Why is it a good idea to participate in the PIP process? A) Because everyone does it. B) Customers require it. C) PIP pays for itself later on in the project. D) To produce a model. Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 100) Customers can be involved in the PIP process. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 26 Copyright © 2020 Pearson Education, Inc.


101) What is a crucial part of the PIP process that should happen between the systems analyst, users, and management? A) Effective communication B) A clear understanding that the analyst is in charge C) Lots of documentation D) An understanding of the requirements Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 102) Judy, the lead systems analysis on the PIP, is getting ready to present an analysis assumptions, systems costs, and benefit forms. The formal name for this document is ________. A) Goals and objectives B) Business case C) Mission statement D) Requirements document Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 103) All of these are elements of project planning except ________. A) Describing the project scope, alternatives, and feasibility B) Setting a baseline project plan C) Identifying the entire team for the project D) Identifying and assessing risk Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.1 Describe the steps involved in the project initiation and planning process Classification: Concept 104) During economic analysis, an analysis can precisely define all benefits and costs related to a project. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


105) The completion of the ________ forms the business case to justify project expenditure resources. A) Feasibility analyses B) Use case C) Data model D) Mission statement Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 106) All of these are guidelines for better cost estimating except ________. A) Clear guidelines B) Use your best guess C) Historical data D) Update estimates Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 107) Marcus was working on the costs for the project. His part of the project was to identify the ________ costs or costs resulting from ongoing use of a system. A) Milestones B) Recurring C) Fixed D) One-time Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept 108) All of the following are needed to calculate time present value except ________. A) Discount rate B) Amount C) Years from now D) Inflation rate Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.2 List and describe various methods for assessing project feasibility Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


109) Julie is preparing for a(n) ________ to verify all of the information and assumptions in the baseline plan. A) Introduction B) Feasibility assessment C) Walk-through D) System description Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 110) Joshua is working on the Baseline Project Plan. He is working on the outline of alternative solutions to be included in the ________ portion of the project plan. A) Introduction B) Feasibility assessment C) Management issues D) System description Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 111) The final section of the Baseline Project Plan is the feasibility assessment. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 5.3 Describe the activities needed to build and review the baseline project plan Classification: Concept 112) ________ are peer group reviews of any product created during the systems development process. A) Group meetings B) Feasibility assessment meetings C) Management issues D) Walk-throughs Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


113) It is important to establish a ________ for a walk-through so all attendees understand what is to be covered and completion time. A) Specific agenda B) List of all of the issues in the project C) Baseline plan D) Feasibility study Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 5.4 Describe the activities and participant roles within a structured walk-through Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 6 Determining System Requirements 1) The second phase in the SDLC is ________. A) Planning B) Analysis C) Design D) Implementation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 2) Which of the following is NOT a source of requirements gathering for the systems analyst? A) Market conditions B) Users of the current system C) Reports D) Procedures Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 3) Which of the following is NOT a characteristic of good systems analyst? A) Impertinence B) Relax constraints C) Attention to detail D) Great at finances Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) If a systems analyst is questioning everything, they are showing the ________ characteristic. A) Impertinence B) Impartiality C) Relax constraints D) Attention to details Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 5) If an analyst can recognize that all of the facts must fit with every other fact, the analyst is displaying ________. A) Impartiality B) Attention to details C) Relaxing constraints D) Reframing Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 6) Which of the following is NOT source of information for deliverables? A) Notes from observations B) Reports C) The news D) Job descriptions Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) In systems analysis, which of the following is NOT a component you need to understand? A) Business objectives B) The information people need to do their job C) The rules governing data D) The size of the budget Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 8) Which term describes a systems development project that is plagued with too much analysis work? A) Analysis Paralysis B) The Analysis Phase C) Documentation D) Reframing Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 9) Which of the following is a new, faster, and more flexible technique for analysis gathering requirements? A) Observing users B) Procedures C) The planning game D) Users Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) What is at the core of systems analysis? A) The project B) The systems analyst C) Procedures D) Collection of information Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 11) A characteristics a good systems analysts is question everything concerning requirements. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 12) The second phase in the SDLC is Design. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 13) In an interview, the interviewer will know all possible questions. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 14) Open-ended questions have a pre-specified answer. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) In the analysis phase, the amount of data that is gathered is small. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 16) In an interview, once you skip a question you can return to it. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 17) When interviewing someone, the interviewer should make sure the questions do NOT imply an answer is right or wrong. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 18) List some specific deliverables examples from requirements determination. Answer: Answers may vary. Anything collected as part of determining system requirements is included in the deliverables. Following are some examples of deliverables. 1. Information collected from conversations with or observations of users: interview transcripts, notes from observation, meeting minutes 2. Existing written information: business mission and strategy statements, sample business forms and reports and computer displays, procedure manuals, job descriptions, training manuals, flowcharts and documentation of existing systems, consultant reports 3. Computer-based information: results from JAD sessions, reports of existing systems, and displays and reports from system prototypes Difficulty: Difficult AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Synthesis

5 Copyright © 2020 Pearson Education, Inc.


19) Describe the characteristics of a good systems analyst. Answer: • Impertinence. You should question everything. • Impartiality. Your role is to find the best solution to a business problem or opportunity. • Relax constraints. Assume that anything is possible and eliminate the infeasible. For example, do not accept this statement: "We've always done it that way, so we have to continue the practice." Traditions are different from rules and policies. • Attention to details. Every fact must fit with every other fact. One element out of place means that even the best system will fail at some time. • Reframing. Analysis is, in part, a creative process. You must challenge yourself to look at the organization in new ways. You must consider how each user views his or her requirements. Difficulty: Difficult AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Synthesis 20) List the traditional methods of collecting systems requirements. Answer: • Individually interview people informed about the operation and issues of the current system and future systems needs. • Interview groups of people with diverse needs to find synergies and contrasts among system requirements. • Observe workers at selected times to see how data is handled and what information people need to do their jobs. • Study business documents to discover reported issues, policies, rules, and directions as well as concrete examples of the use of data and information in the organization. Difficulty: Easy AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Synthesis 21) What is the first guideline in effective interviewing? A) Prepare a checklist B) Set an appointment C) Take notes D) Prepare questions Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


22) Which of the following is NOT a part of the guidelines for effective interviewing? A) Prime questions. B) Listen carefully. C) Review notes within 96 hours of interview. D) Be neutral. Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 23) The first page of the interview guide contains all of the following except ________. A) An outline of the interview B) Who is being interviewed C) Major objectives D) The outcome of the interview Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 24) What information do the objectives cover in an interview guide? A) A list of issues the analysts have with the current system B) Information about the interviewer C) Specific questions on what the analyst wants to confirm D) Data collection questions Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 25) Which of the following is an example of an open-ended question? A) List the three most frequently used menu options. B) What unit are sales currently shown in? C) Do you participate in flextime? D) When was the last time the system malfunctioned? Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 7 Copyright © 2020 Pearson Education, Inc.


26) Which of the following is a disadvantage of closed-ended questions? A) They are difficult to write. B) Useful information that does not quite fit into the defined answers may be overlooked C) It is difficult to take notes. D) Interviewees do not like them. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 27) Which of the following is NOT a form of closed-ended questions? A) True/False B) Multiple Choice C) Essay D) Ranking Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 28) Which of the following is NOT a guideline to use during the actual interview? A) Listen carefully. B) Do not set expectations about the new system. C) Look for a variety of perspectives. D) Type up notes during the interview. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


29) Which of the following is NOT true during the first 48 hours after an interview? A) Schedule a follow up interview. B) Type up the notes. C) List any unclear points. D) Organize your notes. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 30) Which of the following is NOT a common source used to find out about the current issues in a system? A) Users of other systems B) The new systems analyst C) Management D) Information systems staff Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 31) Which of the following is a reason why an analyst would NOT choose to conduct a group interview? A) Because a single interview answers all of the questions. B) It is difficult to schedule a single person. C) New questions may be created during an interview. D) New interviews can be time consuming. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


32) Which of the following is NOT an advantage of a group interview? A) It is a waste of an analyst's time to interview a group. B) The interviewees can hear each other's opinions. C) Synergy D) It is easier to ascertain the general agreements. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 33) What is the primary disadvantage of a group interview? A) Interviewees argue with each other. B) Scheduling C) Participants do not want to voice their opinion. D) It slows down the process. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 34) If group members work alone in the beginning of the project and then pool the ideas with guidance, they are participating in ________. A) A group interview B) A single interview C) A Nominal Group Technique D) The JAD process Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


35) What is a possible outcome of NGT? A) Times for a new meeting B) The analysts' favorite projects C) A list of user roles in the project D) Ideas for new features in a system Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 36) All of the following can create bias when observing an employee working except ________. A) Observation yields too much data B) The observation may make the employee nervous C) The observation may cause the employee to make more mistakes than normal D) The observation may cause the employee to follow exact procedures they do not typically follow Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 37) What did Mintzberg observe about a manager's day? A) Managers have a lot of work. B) Managers experience a lot of interruptions. C) Managers are effective because they work for long lengths of time. D) Managers control the pace of their work. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) What is the purpose of gathering system records? A) To watch employee behavior for wrong doing B) To gain an objective view of employee interaction with information systems C) To match what the employee claims he does to what he actually does D) To have accurate information for a performance review Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 39) What of the following is NOT a consequence of employees knowing they are being observed in their work? A) Employees may be nervous and make more mistakes. B) Employees may follow procedures they normally do not follow. C) A snapshot observation may not include important activities. D) Employees may miss work. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 40) ________ current system users is a more direct way of seeing how an existing system operates. A) Observing B) Asking C) Polling D) Surveying Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


41) An effective way to gather information about the system from users is ________. A) Taking Internet surveys B) Asking them questions C) Reading corporate memos D) Reading redesign documents Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 42) It is better to gather information from people, because they are always reliable. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 43) As analyst you want to pick normal and abnormal conditions when observing employees. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 44) Describe the guidelines of effectively interviewing someone. Answer: First, you should prepare thoroughly before the interview. Set up an appointment at a time and for a duration convenient for the interviewee. The general nature of the interview should be explained to the interviewee in advance. You should prepare an interview guide or checklist so that you know in which sequence you intend to ask your questions and how much time you want to spend in each area of the interview. Listen carefully and take notes. Review notes within 48 hours of interview. Be neutral. Seek diverse views. Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Synthesis

13 Copyright © 2020 Pearson Education, Inc.


45) What is the difference between open-ended and closed-ended questions? Assume you are analyzing a classroom scheduling system. Identify two open-ended questions and two closedended questions you might ask. Answer: Open-ended questions are usually used to probe for information for which you cannot anticipate all possible responses or for which you do not know the precise question to ask. Openended questions might include the following: What information is currently provided by the scheduling system? What information would you like to have that the current scheduling system does not provide? Closed-ended questions provide a range of answers from which the interviewee may choose. Closed-ended questions might ask the system users to rate a response to the following questions: Does the existing system provide hourly-scheduling information in a timely manner? Is the existing system easy to use? Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Synthesis 46) An analyst comes to you to ask for some assistance with interview guidelines. What do you tell the analyst? Answer: First, with either open- or closed-ended questions, do not phrase a question in a way that implies a right or wrong answer. The respondent must feel that he or she can state his or her true opinion and perspective and that his or her idea will be considered equally with those of others. The second guideline to remember about interviews is to listen very carefully to what is being said. Take careful notes or, if possible, record the interview. Third, once the interview is over, go back to your office and type up your notes within 48 hours. If you recorded the interview, use the recording to verify the material in your notes. As you type and organize your notes, write down any additional questions that might arise from lapses in your notes or from ambiguous information. Separate facts from your opinions and interpretations. Make a list of unclear points that need clarification. Call the person you interviewed and get answers to these new questions. Fourth, be careful during the interview not to set expectations about the new or replacement system unless you are sure these features will be part of the delivered system. Fifth, seek a variety of perspectives from the interviews. Find out what potential users of the system, users of other systems that might be affected by changes, managers and superiors, information systems staff who have experience with the current system, and others think the current problems and opportunities are and what new information services might better serve the organization. Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Synthesis

14 Copyright © 2020 Pearson Education, Inc.


47) What can analysis of a document tell you about the future system? Answer: In documents, you can find information about the following: • Problems with existing systems • Opportunities to meet new needs if only certain information or information processing were available • Organizational direction that can influence information system requirements • Titles and names of key individuals who have an interest in relevant existing systems • Values of the organization or individuals who can help determine priorities for different capabilities desired by different users • Special information processing circumstances that occur irregularly that may not be identified by any other requirements determination technique • The reason why current systems are designed as they are, which can suggest features left out of current software, which may now be feasible and more desirable • Data, rules for processing data, and principles by which the organization operates that must be enforced by the information system Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Synthesis 48) Describe the difference between formal and informal systems. Answer: Formal systems are recognized in the official documentation of the organization; informal systems are the way in which the organization actually works. Informal systems develop because of inadequacies of formal procedures, individual work habits and preferences, resistance to control, and other factors. It is important to understand both formal and informal systems because each provides insight into information requirements and what will be required to convert from present to future information services. Difficulty: Moderate AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Synthesis 49) Which of the following is a primary way to gather information? A) Interviewing B) Gather documentation C) Review procedures D) Read the manual Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


50) All of the following are documents that are helpful in understanding future systems, except ________. A) Business plans B) External correspondence C) Reports from future organizational studies D) Job descriptions Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 51) Which of the following is NOT an example of what an analysis of documents can reveal about the future system? A) Completely accurate information B) Analysis of customer type C) Behavior of key customers D) Data rules Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 52) The ________ is a document written to describe how a particular job is performed. A) System document B) Work procedure C) Mission statement D) Goals document Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 53) What can analysis of work procedure documents reveal? A) When a procedure is missing B) When a procedure is correct C) A future enhancement for the system D) A most used procedure Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


54) Which option below is NOT an issue that occurs when analyzing work procedures? A) Duplication of effort B) A missing procedure C) Out-of-date procedure D) Procedures that match information collected from interviews Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 55) ________ are recognized in official documentation of the organization. A) Work procedure B) System documents C) Formal systems D) Disclosures Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 56) Which of the following is NOT a way informal systems develop? A) Individual work habits B) Resistance to control C) Inadequate formal procedures D) Top management does not mandate it. Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 57) Why are forms important? A) Because they explain what data flows in or out of a system B) Because they are documentation C) Because every company uses them D) A form is not important. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


58) When are forms most useful to the analyst? A) When the form is printed in duplicate B) When the customer signs the form C) When they contain organizational data D) When they are actually used by the sales team Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 59) Which of the following is NOT a useful document in the analysis process? A) Reports generated by the current system B) Forms C) Work procedures D) E-mails Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 60) All of the following are examples of computer-based documents except ________. A) Flowcharts B) User manuals C) Memos D) Data dictionaries Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 61) ________ uses story cards as way to gather requirements. A) JAD meeting B) Agile Usage-Centered Design C) Prototyping D) eXtreme Programming Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


62) What is the Nominal Group Technique? How is it beneficial to requirements determination? Answer: The Nominal Group Technique is a facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator. During requirements determination, the group will identify and prioritize a list of problems associated with the existing system, or they may identify and prioritize a list of requirements for the new system. Difficulty: Moderate AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Synthesis 63) List at least four types of information an analyst can locate in documents during the analysis phase? Answer: The following information can be found in documents: • Problems with existing systems • Opportunities to meet new needs if only certain information or information processing were available • Organizational direction that can influence information system requirements • Titles and names of key individuals who have an interest in relevant existing systems • Values of the organization or individuals who can help determine priorities for different capabilities desired by different users • Special information processing circumstances that occur irregularly that may not be identified by any other requirements determination technique • The reason why current systems are designed as they are, which can suggest features left out of current software, which may now be feasible and more desirable • Data, rules for processing data, and principles by which the organization operates that must be enforced by the information system Difficulty: Moderate AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Synthesis 64) Which of the following is NOT a fact about JAD? A) It was started in the late 1970s by Google. B) It brings together key users of the system. C) The result is an intense and structured, but highly effective, process. D) It helps to resolve conflicts. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


65) What is the primary purpose of JAD? A) To diagram forms and report generation B) To gather systems requirements simultaneously C) To create a prototype D) To assist with business process reengineering Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 66) Where are JAD sessions normally held? A) At the corporate office B) In the meeting room C) In an executive's office D) Off-site at conference facilities Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 67) If you organize and run the JAD session, you are most likely the ________. A) Session leader B) Scribe C) Systems analyst D) Sponsor Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 68) If you are sitting in a corner with a laptop preparing to take notes on the days activities, you are probably the ________. A) User B) Scribe C) Analyst D) IS staff Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


69) What is the end result of a JAD? A) A flowchart B) A CASE diagram C) Detailed documents of the current system D) A list of issues that need to be resolved Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 70) What typically does the first day entail in the JAD? A) An analysis of the current system B) Analysis of reports C) A review of roles in the JAD D) Overview of major problems Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 71) JAD is similar to a ________ because it brings together the key users, managers, and systems analysts involved in the analysis of a current system. A) Group interview B) Executive board meeting C) Corporate retreat D) Business process reengineering meeting Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 72) Which tool enables you to quickly take basic requirements and create a limited working system? A) CASE tools B) Prototyping C) User manual D) JAD Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


73) JADs are best held at the corporate office where everyone's office is nearby. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 74) Describe the contemporary methods for collection systems requirements. Answer: • Bringing session users, sponsors, analysts, and others together in a JAD session to discuss and review system requirements • Iteratively developing system prototypes that refine the understanding of system requirements in concrete terms by showing working versions of system features Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Synthesis 75) Describe the typical participants in a JAD. Answer: • JAD session leader. The JAD session leader organizes and runs the JAD. • Users. The key users of the system under consideration are vital participants in a JAD. • Managers. Managers of the work groups who use the system in question provide insight into new organizational directions, motivations for and organizational impacts of systems, and support for requirements determined during the JAD. • Sponsor. A JAD must be sponsored by someone at a relatively high level in the company. If the sponsor attends any sessions, it is usually only at the very beginning or the end. • Systems analysts. Members of the systems analysis team attend the JAD • Scribe. The scribe takes notes during the JAD sessions. • IS staff. Besides systems analysts, other information systems (IS) staff, such as programmers, database analysts, IS planners, and data center personnel, may attend to learn from the discussion and possibly contribute their ideas on the technical feasibility of proposed ideas or the technical limitations of current systems. Difficulty: Moderate AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Synthesis

22 Copyright © 2020 Pearson Education, Inc.


76) ________ and ________ are the two processes of prototypes. A) New process; old process B) Long term; short-term C) Evolutionary; throwaway D) Throwaway; permanent Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 77) Which of the following is a situation in which prototyping is useful for requirements determination? A) When formal documentation of system requirements are needed B) When stand-alone systems aren't needed C) When user requirements are clear and well understood D) When tools and data are rapidly available to working systems Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 78) The overall process by which current methods are replaced with new methods is referred to as ________. A) Business process reengineering B) JAD C) CASE D) Systems analysis Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 79) JAD stands for joint application design and is an intense, highly effective process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


80) Evolutionary prototyping is used to model parts of the system, and if it is unsuccessful you throw away the system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 81) With throwaway prototyping there is never an intention to create a working system. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 82) Identify four disadvantages to using prototyping as a requirements determination tool. Answer: The four drawbacks mentioned in the textbook are: (1) a tendency to avoid creating formal documentation of system requirements; (2) prototypes become very idiosyncratic to the initial user and difficult to diffuse or adapt to other potential users; (3) prototypes are often built as stand-alone systems, often ignoring issues of sharing data, interactions with other existing systems, and scaling up applications; and (4) checks in the SDLC are bypassed so that some more subtle system requirements might be forgotten. Difficulty: Difficult AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Synthesis 83) What is the first step in the BPR effort? A) Use induction. B) Understand the key processes. C) List disruptive technologies. D) Translate the key processes. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 84) Analysts only use systems requirements to determine future needs. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


85) Business process reengineering is a management fad that disappeared in the 1990s. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 86) BPR advocates believe radical increases in the quality of business processes can be accomplished with IT. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 87) Key business processes are management focused. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 88) "How dysfunctional is the activity" is a question used in identifying activities for radical change. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 89) Managers should consider disruptive technologies when applying inductive thinking. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 90) During the Agile method the user can provide information on requirements and then watch and evaluate as those requirements are designed, coded, and tested. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


91) Continual user involvement works best with a large development team. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 92) Grouping task cards together is a step in the agile usage-centered design method for requirements determination. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 93) One of the key emphases of eXtreme Programming is to use a three-person programming team. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 94) In the eXtreme Programming Planning Game, the business reviews progress in the commitment phase. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


95) What is the definition of disruptive technologies? Identify eight disruptive technologies and how they have eliminated long-held organizational rules. Answer: Disruptive technologies enable the breaking of long-held business rules that inhibit organizations from making radical business changes. Distributed databases, expert systems, advanced telecommunications networks, decision support tools, wireless data communication and portable computers, interactive communication technologies, automatic identification and tracking technologies, and high-performance computing are eight disruptive technologies. Distributed databases allow the sharing of information, and expert systems can aid nonexperts. Advanced telecommunications networks can support dynamic organizational structures; decision-support tools can aid nonmanagers. Wireless data communication and portable computers provide a "virtual" office for workers. Interactive communication technologies allow complex messaging capabilities. Automatic identification and tracking technology know where things are, and high-performance computing can provide real-time updating. Difficulty: Difficult AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Synthesis 96) Which of the following is NOT a phase in the Planning Game? A) Exploration B) Commitment C) Documentation D) Steering Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.7 Understand how requirements determination techniques apply to the development of electronic commerce applications Classification: Concept 97) Determining system requirements for an electronic commerce application is not different than for other applications. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.7 Understand how requirements determination techniques apply to the development of electronic commerce applications Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


98) Describe three newer methods of requirements determination. Answer: The first is continual user involvement in the development process, a technique that works especially well with small and dedicated development teams. The second approach is a JAD-like process called Agile Usage-Centered Design. The third approach is the Planning Game, which was developed as part of eXtreme Programming. Difficulty: Difficult AACSB: Information Technology L.O.: 6.7 Understand how requirements determination techniques apply to the development of electronic commerce applications Classification: Synthesis 99) Jerry is interviewing for a systems analyst position. He realizes he needs to work on which of the following characteristics? A) Being more of a team leader B) Learning how to stay within the constraints of the project C) Developing an attention to detail D) Being great at finances Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 100) Interviewing is one of the primary ways to gather information about systems projects. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 101) All of the following are guidelines for effective interviewing except ________. A) Preparing an agenda B) Preparing a checklist C) Not taking notes during the meeting D) Being neutral Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


102) Which of the following is NOT a closed-ended question? A) Pick the best option from the list. B) Is the system good or bad? C) Rank this list of issues from least to greatest. D) List the three most frequently used menu options. Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 103) In the Nominal Group Technique, the group members work together to solve the problem. Individual work is discouraged. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 6.1 Describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements Classification: Concept 104) There is only one good method for interviewing. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 105) You should review notes within ________ of an interview. A) 48 hours B) 2 days C) 1 hour D) 12 hours Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


106) It is the analyst's job to create a document for a missing procedure. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.2 Explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements Classification: Concept 107) Many information systems developed in-house lack complete documentation. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.3 Explain how computing can provide support for requirements determination Classification: Concept 108) Joshua is bringing together the key users, managers, and systems analysts involved in the analysis of the current system. He believes it should be a great ________. A) JAD meeting B) Department meeting C) Corporate meeting D) Walkthrough Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 109) JAD sessions are typically held at corporate headquarters. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 110) The ________ takes notes during the JAD sessions. A) Scribe B) Sponsor C) User D) IS staff Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


111) What typically happens during the last two days of a JAD? A) Analysts review their notes. B) An overview of the current system is presented. C) Analysis of reports D) Overview of major issues of the system Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 112) Who prepares a report at the end of the JAD session? A) The IS staff B) The users C) The team D) The session leader and assistants Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.4 Participate in and help plan a Joint Application Design session Classification: Concept 113) Prototypes are fully functional versions of the proposed system. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 114) If the prototyping is successful during ________, it eventually becomes the system. A) Evolutionary prototyping B) Throwaway prototyping C) Design specifications D) The JAD Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


115) Which of the following is a drawback for prototyping? A) Tools are not readily available for use. B) It takes a long time to produce a product. C) It is a complex way to develop systems. D) There is typically no formal documentation created. Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.5 Use prototyping during requirements determination Classification: Concept 116) Process orientation remains a lasting legacy of the BPR movement. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 117) Which of the following is an idea of BPR advocates? A) Changing the way work is performed does not change the way information is stored. B) Radical improvement cannot be achieved by tweaking existing processes. C) Decreases in quality of business processes may occur. D) The results of many BPR efforts are the development of information system maintenance requests or requests for system replacement. Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept 118) The skills of system analysts are often central to BPR efforts. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 6.6 Describe contemporary approaches to requirements determination Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


119) The following development approach is known for its short cycles. A) eXtreme Programming B) Agile C) SDLC D) Steering Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 6.7 Understand how requirements determination techniques apply to the development of electronic commerce applications Classification: Concept 120) In the commitment phase, the business analysts sorts Story Cards into all of the following stacks except ________. A) Essential features B) Nice to have features C) Not essential features but add value D) Management driven essentials Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 6.7 Understand how requirements determination techniques apply to the development of electronic commerce applications Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 7 Structuring System Process Requirements 1) A ________ is a picture of the movement of data between external entities and the processes and data stores within a system. A) Process flow diagram B) Data flow diagram C) Data diagram D) Procedure flow diagram Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 2) ________ is NOT a phase in a systems development life cycle. A) Maintenance B) Planning C) Attributes D) Design Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 3) A data flow diagram (DFD) is a picture of the movement of data between external entities and the processes and data stores within or outside a system. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 4) Context DFD is one of the deliverables for process modeling. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


5) Because requirements determination and structuring are often parallel steps, DFDs evolve from the more general to the more detailed as current and replacement systems are better understood. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 6) DFDs do not provide notation but illustrate important concepts about the movement of data between manual and automated steps. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 7) What is a DFD? Why are DFDs used? Answer: A data flow diagram (DFD) is a picture of the movement of data between external entities and the processes and data stores within a system. A context diagram shows the scope of the system, indicating which elements are inside and which are outside the system. Second, DFDs of the system specify which processes move and transform data, accepting inputs and producing outputs. These diagrams are developed with sufficient detail to understand the current system and to provide notation as well as illustrate important concepts about the movement of data between manual and automated steps, and they offer a way to depict work flow in an organization. DFDs continue to be beneficial to information systems professionals as tools for both analysis and communication. Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Synthesis 8) What is process modeling? What are the deliverables for process modeling? Answer: Process modeling involves graphically representing the functions, or processes, that capture, manipulate, store, and distribute data between a system and its environment and between components within a system. Deliverables include: Context DFD, DFSs of the system, and thorough descriptions of each DFD component. Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Synthesis

2 Copyright © 2020 Pearson Education, Inc.


9) ________ is/are NOT a deliverable for process modeling. A) Context DFD B) DFDs of the system C) Thorough descriptions of each DFD component D) Inadequately decomposed diagrams Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 10) With only ________ symbols, you can use DFDs to represent both physical and logical information systems. A) Four B) Three C) Five D) Six Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 11) Flowcharting has been criticized by proponents of structured analysis and design because it is too ________. A) Geometrically oriented B) Diagrammatic C) Physically oriented D) Methodological Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


12) ________ are NOT a component of data flow diagram symbols. A) Processes B) Data stores C) Data flows D) Data programs Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 13) A ________ can be best understood as data in motion, moving from one place in a system to another. A) Process B) Data flow C) Data store D) Data source Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 14) A ________ is the work or actions performed on data so that they are transformed, stored, or distributed. A) Process B) Data store C) Flowchart D) Data flow Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) A ________ is the origin and/or destination of the data, and these are sometimes referred to as external entities because they are outside the system. A) Data graph B) Data flow C) Process D) Source Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 16) According to the DFD conventions, the data flow is always depicted by a(n) ________. A) Rectangle B) Circle C) Arrow D) Triangle Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 17) A ________ is used in both conventions for sources/sinks and has a name that states what the external agent is, such as Customer, Teller, EPA Office, or Inventory Control System. A) Circle B) Triangle C) Rectangle D) Square Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


18) A ________ is a DFD that represents a system's major processes, data flows, and data stores at a high level of detail. A) Level-1 diagram B) Level-0 diagram C) Level-2 diagram D) Level-3 diagram Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 19) When two ________ have the same data flow name, you must be careful that these flows are exactly the same. A) Rectangles B) DFDs C) Arrows D) Processes Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 20) No process can have only ________. It would be making data from nothing (a miracle). If an object has only outputs, then it must be a source. A) Sources B) Sinks C) Inputs D) Outputs Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


21) Data flow diagrams are non-versatile diagramming tools and consist of only three symbols. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 22) DFDs are not as good as flowcharts for depicting the details of physical systems; on the other hand, flowcharts are not very useful for depicting purely logical information flows. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 23) There are two different standard sets of DFD symbols and each set consists of three symbols that represent the same things. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 24) A data flow is data that move together, so it can be composed of many individual pieces of data that are generated at the same time and that flow together to common destinations. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 25) A data store is data at rest and may represent only one physical location for data. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


26) Sources/sinks are sometimes referred to as external entities because they are outside the system. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 27) A source/sink does NOT consist of a person inside or outside the business unit supported by the system you are analyzing who interacts with the system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 28) The information system is depicted as a DFD and the highest-level view of this system is called a context diagram. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 29) A level-1 diagram is a DFD that represents a system's major processes, data flows, and data stores at a high level of detail. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 30) A level-0 diagram represents the primary individual processes in the system at the highest possible level. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


31) According to the DFD guidelines, the inputs to a process are different from the outputs of that process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 32) A data flow has multiple directions of flow between symbols. It may flow in both directions between a process and a data store to show a read before an update. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 33) Compare and contrast DFDs and flowcharts. Answer: DFDs are versatile diagramming tools. With only four symbols, you can use DFDs to represent both physical and logical information systems. DFDs are not as good as flowcharts for depicting the details of physical systems; on the other hand, flowcharts are not very useful for depicting purely logical information flows. In fact, flowcharting has been criticized by proponents of structured analysis and design because it is too physically oriented. Flowcharting symbols primarily represent physical computing equipment, such as terminals and permanent storage. One continual criticism of system flowcharts has been that overreliance on such charts tends to result in premature physical system design. DFDs do not share this problem of premature physical design because they do not rely on any symbols to represent specific physical computing equipment. They are also easier to use than flowcharts because they involve only four different symbols. Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Synthesis

9 Copyright © 2020 Pearson Education, Inc.


34) What do each of the four symbols in a DFD represent? Explain the terms used in describing the processes in the DFD. Answer: DFD symbols consist of four symbols that represent the same things: data flows, data stores, processes, and sources/sinks (or external entities). A data flow can be best understood as data in motion, moving from one place in a system to another. A data flow is data that move together, so it can be composed of many individual pieces of data that are generated at the same time and that flow together to common destinations. A data store is data at rest. A process is the work or actions performed on data so that they are transformed, stored, or distributed. When modeling the data processing of a system, it does not matter whether a process is performed manually or by a computer. Finally, a source/sink is the origin and/or destination of the data. Difficulty: Difficult AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Synthesis 35) Which characteristics of sources and sinks are of no importance? Answer: Characteristics we do not consider include: What a source or sink does with information or how it operates. How to control or redesign a source or sink because, from the perspective of the system we are studying, the data a sink receives and often what data a source provides are fixed. How to provide sources and sinks direct access to stored data because, as external agents, they cannot directly access or manipulate data stored within the system. Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Synthesis 36) No process can have only ________ and if an object has only that, then it must be a sink. A) Inputs B) Procedure C) Outputs D) Arrow Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


37) Data cannot move directly from one data store to another data store. Data must be moved by a ________. A) Flow chart B) Procedure C) Process D) Data source Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 38) Data cannot move directly from a source to a sink. It must be moved by a process if the data are of any concern to our system. Otherwise, the data flow is not shown on the ________. A) Sink B) Procedure C) Flow chart D) DFD Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 39) A data flow has ________ direction(s) of flow between symbols. It may flow in both directions between a process and a data store to show a read before an update. A) No B) Three C) One D) Multi Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


40) A(n) ________ in a data flow means that exactly the same data goes from a common location to two or more different processes, data stores, or sources/sinks. (This usually indicates different copies of the same data going to different locations.) A) Arrow B) Join C) Break D) Fork Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 41) A(n) ________ in a data flow means that exactly the same data come from any of two or more different processes, data stores, or sources/sinks to a common location. A) Join B) Fork C) Break D) Arrow Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 42) A data flow cannot go directly back to the same process it leaves. There must be at least ________ other process(es) that handle(s) the data flow, produce(s) some other data flow, and return(s) the original data flow to the beginning process. A) Three B) Two C) One D) Four Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


43) A data flow to a data store means ________. A) Join B) Update C) Process D) Fork Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 44) A data flow has a noun phrase label. More than one data flow noun phrase can appear on a single ________ as long as all of the flows on the same arrow move together as one package. A) Circle B) Rectangle C) Join D) Arrow Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 45) Functional decomposition is a(n) ________ process of breaking the description of a system down into finer and finer detail, which creates a set of charts in which one process on a given chart is explained in greater detail on another chart. A) Iterative B) Never-ending C) Continuous D) Static Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 46) The act of going from a single system to ________ component processes is called (functional) decomposition. A) Two B) Three C) Four D) Six Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 13 Copyright © 2020 Pearson Education, Inc.


47) The lowest level of a DFD is called a ________ data flow diagram. A) Low-level B) Primitive C) Level-0 D) Basic Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 48) A ________ diagram is a DFD that is generated from n nested decompositions from a level-0 diagram. A) Level-n B) Level-0 C) Level-1 D) Level-2 Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 49) A data flow to a data store means retrieve and a data flow from a data store means change. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 50) A data flow has a noun phrase label. More than one data flow noun phrase can appear on a single arrow as long as all of the flows on the same arrow move together as one package. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 51) When you decompose a DFD from one level to the next, there is a conservation principle at work and we must conserve inputs and outputs to a process at the next level of decomposition. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 14 Copyright © 2020 Pearson Education, Inc.


52) A data flow consisting of several sub-flows on a level-n diagram can be split apart on a level0 diagram for a process that accepts this composite data flow as input. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 53) The inputs to a process must be sufficient to produce the outputs (including data placed in data stores) from the process. Thus, all outputs can be produced, and all data in inputs move somewhere: to another process or to a data store outside the process or onto a more detailed DFD showing a decomposition of that process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 54) List the parts of a DFD diagram and at least one rule for each one. Answer: Process: A. No process can have only outputs. It would be making data from nothing. If an object has only outputs, then it must be a source. B. No process can have only inputs (a black hole). If an object has only inputs, then it must be a sink. C. A process has a verb phrase label. Data Store: D. Data cannot move directly from one data store to another data store. Data must be moved by a process. E. Data cannot move directly from an outside source to a data store. Data must be moved by a process that receives data from the source and places the data into the data store. F. Data cannot move directly to an outside sink from a data store. Data must be moved by a process. G. A data store has a noun phrase label. Source/Sink: H. Data cannot move directly from a source to a sink. It must be moved by a process if the data are of any concern to our system. Otherwise, the data flow is not shown on the DFD. I. A source/sink has a noun phrase label. Data Flow: J. A data flow has only one direction of flow between symbols. It may flow in both directions between a process and a data store to show a read before an update. The latter is usually indicated, however, by two separate arrows because these happen at different times. K. A fork in a data flow means that exactly the same data goes from a common location to two or more different processes, data stores, or sources/sinks. L. A join in a data flow means that exactly the same data come from any of two or more different processes, data stores, or sources/sinks to a common location. M. A data flow cannot go directly back to the same process it leaves. There must be at least one other process that handles the data flow, produces some other data flow, and returns the original data flow to the beginning process. N. A data flow to a data store means update (delete or change). O. A data flow from a data store means retrieve or use. P. A data flow has a noun phrase label. More than one data flow noun phrase can appear on a single arrow as long as all of the flows on the same arrow move together as one package. Difficulty: Difficult AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Synthesis 15 Copyright © 2020 Pearson Education, Inc.


55) Explain the process of functional decomposition. Answer: The act of going from a single system to four component processes is called (functional) decomposition. Functional decomposition is an iterative process of breaking the description or perspective of a system down into finer and finer detail. This process creates a set of hierarchically related charts in which one process on a given chart is explained in greater detail on another chart. Each resulting process (or subsystem) is also a candidate for decomposition. Each process may consist of several subprocesses. Each subprocess may also be broken down into smaller units. Decomposition continues until you have reached the point at which no subprocess can logically be broken down any further. The lowest level of a DFD is called a primitive DFD. Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Synthesis 56) List the advanced rules governing DFDs. Answer: Q. A composite data flow on one level can be split into component data flows at the next level, but no new data can be added and all data in the composite must be accounted for in one or more subflows. R. The inputs to a process must be sufficient to produce the outputs from the process. Thus, all outputs can be produced, and all data in inputs move somewhere: to another process or to a data store outside the process or onto a more detailed DFD showing a decomposition of that process. S. At the lowest level of DFDs, new data flows may be added to represent data that are transmitted under exceptional conditions; these data flows typically represent error messages. T. To avoid having data flow lines cross each other, you may repeat data stores or sources/sinks on a DFD. Use an additional symbol, like a double line on the middle vertical line of a data store symbol or a diagonal line in a corner of a sink/source square, to indicate a repeated symbol. Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Synthesis 57) Balancing is the conservation of inputs and outputs to a DFD process when that process is decomposed to a ________ level. A) Balanced B) Similar C) Lower D) Higher Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


58) At the ________ level of DFDs, new data flows may be added to represent data that are transmitted under exceptional conditions. These data flows typically represent error messages or confirmation notices. A) Highest B) Lowest C) Basic D) Medium Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Concept 59) The concept of DFD ________ refers to whether you have included in your DFDs all of the components necessary for the system you are modeling. A) Completeness B) Accuracy C) Balancing D) Processing Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Concept 60) Data flow repository entries typically will NOT include ________. A) The label or name for the data flow as entered on the DFDs B) A list of other repository objects grouped into categories by type of object C) The composition or list of data elements contained in the data flow D) A long description defining the data flow Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Concept 61) If your DFD contains data flows that do not lead anywhere or data stores, processes or external entities that are not connected to anything else, your DFD is not accurate. Answer: FALSE Difficulty: Difficult AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


62) What is typically included in a data flow repository? Answer: Data flow repository entries typically include the following: • The label or name for the data flow as entered on the DFDs • A short description defining the data flow • A list of other repository objects grouped into categories by type of object • The composition or list of data elements contained in the data flow • Notes supplementing the limited space for the description that go beyond defining the data flow to explaining the context and nature of this repository object • A list of locations (the names of the DFDs) on which this data flow appears and the names of the sources and destinations on each of these DFDs for the data flow Difficulty: Easy AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Synthesis 63) What are the guidelines for drawing DFDs? Answer: These guidelines include: (1) completeness, (2) consistency, (3) timing considerations, (4) the iterative nature of drawing DFDs, and (5) primitive DFDs. Completeness: The concept of DFD completeness refers to whether you have included in your DFDs all of the components necessary for the system you are modeling. If your DFD contains data flows that do not lead anywhere or data stores, processes, or external entities that are not connected to anything else, your DFD is not complete. Consistency: DFD consistency refers to whether or not the depiction of the system shown at one level of a nested set of DFDs is compatible with the depictions of the system shown at other levels. Timing: On a given DFD, there is no indication of whether a data flow occurs constantly in real time, once per week, or once per year. There is also no indication of when a system would run. Iterative DFD development recognizes that requirements determination and requirements structuring are interacting, not sequential, subphases of the analysis phase of the SDLC. Primitive DFD: One of the more difficult decisions you need to make when drawing DFDs is when to stop decomposing processes. One rule is to stop drawing when you have reached the lowest logical level. Difficulty: Moderate AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Synthesis

18 Copyright © 2020 Pearson Education, Inc.


64) Describe the process in knowing when to stop decomposing a DFD. Answer: One rule is to stop drawing when you have reached the lowest logical level; however, it is not always easy to know what the lowest logical level is. Other, more concrete rules for when to stop decomposing include the following: • When you have reduced each process to a single decision or calculation or to a single database operation, such as retrieve, update, create, delete, or read • When each data store represents data about a single entity, such as a customer, employee, product, or order • When the system user does not care to see any more detail or when you and other analysts have documented sufficient detail to do subsequent systems development tasks • When every data flow does not need to be split further to show that different data are handled in different ways • When you believe that you have shown each business form or transaction, computer online display, and report as a single data flow • When you believe there is a separate process for each choice on all lowest-level menu options for the system Difficulty: Moderate AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Synthesis 65) The concept of DFD ________ refers to whether or not the depiction of the system shown at one level of a nested set of DFDs is compatible with the depictions of the system shown at other levels. A) Consistency B) Completeness C) Balancing D) Accuracy Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept 66) ________ DFD development recognizes that requirements determination and requirements structuring are interacting, not sequential, subphases of the analysis phase of the SDLC. A) Primitive B) Iterative C) Subjective D) Consistent Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


67) ________ is the process of discovering discrepancies between two or more sets of DFDs or discrepancies within a single DFD. A) Timing B) Primitive DFD C) Basic analysis D) Gap analysis Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept 68) A ________ is a diagram of process logic where the logic is reasonably complicated. A) Decision table B) Decision box C) Decision column D) Decision flow Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept 69) ________ are NOT a part of a decision table. A) Condition stubs B) Action stubs C) Rules D) Policies Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept 70) A use-case consists of a set of possible sequences of interactions between a system and ________ in a particular environment, possible sequences that are related to a particular goal. A) User B) Procedure C) Function D) Company Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


71) How can you use DFDs as an analysis tool? Answer: DFDs can also be used in a process called gap analysis. Analysts can use gap analysis to discover discrepancies between two or more sets of DFDs, representing two or more states of an information system, or discrepancies within a single DFD. Once the DFDs are complete, you can examine the details of individual DFDs for such problems as redundant data flows, data that are captured but are not used by the system, and data that are updated identically in more than one location. These problems may not have been evident to members of the analysis team or to other participants in the analysis process when the DFDs were created. Inefficiencies can also be identified by studying DFDs, and there are a wide variety of inefficiencies that might exist. Some inefficiencies relate to violations of DFD drawing rules. Similarly, a set of DFDs that models the current logical system can be compared with DFDs that model the new logical system to better determine which processes systems developers need to add or revise when building the new system. Difficulty: Moderate AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Synthesis 72) Provide an example of DFDs being used in BPR. Answer: DFDs can be used to model the processes of the business. It is easier to see the process graphically than to read a document about the process. The DFD can assist with finding potential issues in the process. The text uses the example of IBM. IBM realized it only to 90 minutes for the entire sales process to be completed; however, days were wasted because documents were in someone's inbox. From the DFD process documents, management was able to simplify the process. Difficulty: Moderate AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Synthesis 73) Explain the three parts of a decision table. Answer: The table has three parts: the condition stubs, the action stubs, and the rules. The condition stubs contain the various conditions that apply to the situation the table is modeling. The action stubs contain all the possible courses of action that result from combining values of the condition stubs. The part of the table that links conditions to actions is the section that contains the rules. Difficulty: Easy AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Synthesis

21 Copyright © 2020 Pearson Education, Inc.


74) A(n) ________ is an external entity that interacts with a system and is someone or something that exchanges information with the systems. A) Procedure B) DFD C) User D) Actor Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 75) A(n) ________ arises when one use case uses another use case and is shown diagrammatically as a dotted-line arrow pointed toward the use case that is being used. A) Extend relationship B) Include relationship C) System boundary D) Connection Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 76) ________ is NOT one of the levels of details suggested by Cockburn. A) White B) Kite C) Red D) Blue Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 77) As seen from the clouds, as if flying in a plane at 35,000 feet, refers to which level according to Cockburn? A) White B) Kite C) Blue D) Fish Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 22 Copyright © 2020 Pearson Education, Inc.


78) Both the white and ________ levels provide a summary of the use case goals. A) Blue B) Black C) Kite D) Fish Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 79) Use cases written at the ________ level focus on user goals. A) White B) Blue C) Black D) Kite Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 80) Use cases written at the fish and ________ levels (sometimes called the clam level) are much more detailed and focus on subfunction goals. A) Black B) White C) Kite D) Sea Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 81) An example of inconsistency would be a data flow that appears on a higher-level DFD but not on lower levels (also a violation of balancing). Answer: TRUE Difficulty: Difficult AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


82) DFDs do a very good job of representing time. On a given DFD, there is an indication of whether a data flow occurs constantly in real time, once per week, or once per year. There is also an indication of when a system would run. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 83) A ________ lists what it takes to satisfy stakeholders if the use case is completed successfully. A) Precondition B) Minimal guarantee C) Success guarantee D) Trigger Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 84) According to Cockburn's template, ________ are those things the system must ensure are true before the use case can start. A) Preconditions B) Minimal guarantee C) Success guarantee D) Triggers Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 85) ________ is the set of behaviors or functions in a use case that follow exceptions to the main success scenario. A) Triggers B) Extension C) Preconditions D) Connections Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


86) A(n) ________ diagram shows the conditional logic for the sequence of system activities needed to accomplish a business process. A) Fork B) Branch C) Business D) Activity Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 87) An activity diagram cannot be used to ________. A) Depict the flow of control from activity to activity B) Help in identifying extensions in a use case C) Model work flow but not business processes D) Model the sequential and concurrent steps in a computation process Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 88) A ________ is a matrix representation of the logic of a decision. A) Condition stubs B) Decision table C) Action stubs D) Rule Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 89) If there is a situation where a decision table has a logic decision where an employee data type can have one of two values, those values are listed in the ________. A) Condition stub B) Action stub C) Rules D) Data flow diagram Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


90) In a decision table a value that does not affect the action taken is known as ________. A) An action stub B) A rule C) A logical dilemma D) An indifferent condition Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 91) Joshua has removed any rules that have impossible actions in the decision table. He has completed the ________ step. A) "simply the decision table" B) "define the actions for each rule" C) "list all possible rules" D) "name all possible actions that can occur" Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 92) ________ allow you to check for the extent to which your logic is complete, consistent, and not redundant. A) Gap analysis B) Action stubs C) Process modeling D) Decision tables Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 93) What should one do first when creating a decision table? A) Simply the decision table. B) Name the conditions. C) List all possible rules. D) Identify the value each condition can assume. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


94) BPMN stands for ________. A) Basic Process Modeling Notation B) Business Process Multi Notation C) Business Process Modeling Notation D) Business Procedure Modeling Notation Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 95) A(n) ________ in business process modeling shows the sequence of action in a process. A) Graph B) Flow C) Event D) Activity Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 96) A(n) ________ in business process modeling is an action that must take place for a process to be completed. A) Gateway B) Event C) Flow D) Activity Answer: D Difficulty: Difficult AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 97) A(n) ________ in business process modeling is a decision point. A) Event B) Swim-lane C) Gateway D) Flow Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


98) A ________ in business process modeling is a way to visually encapsulate a process. A) Gateway B) Swimlane C) Pool D) Flow Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 99) Once the DFDs are complete, we can examine the details of individual DFDs for such problems as redundant data flows, data that are captured but are not used by the system, and data that are updated identically in more than one location. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept 100) What are the procedures when constructing a decision table? Answer: 1. Name the conditions and the values that each condition can assume. Determine all of the conditions that are relevant to your problem and then determine all of the values each condition can take. 2. Name all possible actions that can occur. The purpose of creating decision tables is to determine the proper course of action given a particular set of conditions. 3. List all possible rules. When you first create a decision table, you have to create an exhaustive set of rules. Every possible combination of conditions must be represented. 4. Define the actions for each rule. Now that all possible rules have been identified, provide an action for each rule. 5. Simplify the decision table. Make the decision table as simple as possible by removing any rules with impossible actions. Difficulty: Difficult AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Synthesis 101) Together process, logic, and human intervention provide a thorough specification of an information system. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


102) A ________ shows the scope of the system, indicating which elements are inside and which are outside of the system. A) Process flow diagram B) Context diagram C) Data diagram D) Procedure flow diagram Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 103) All of the following are deliverables for process modeling except ________. A) Context DFD B) Database DFD with metadata C) DFDs of the system D) Descriptions of each DFD component Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 7.1 Understand the logical modeling of processes by studying examples of data flow diagrams Classification: Concept 104) DFDs are just as good as flowcharts for depicting the details of physical systems. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 105) When thinking about sources and sinks, all of the following are of no interest to us except ________. A) What a source does with information B) How to control the design of a source/sink C) Connecting sinks/sources directly to the stored data D) How the information leaves the internal DFD to the sink/source Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


106) A data flow diagram does not representative time very well, therefore the analyst must ________. A) Model the system as if the system has never started and will never stop B) Design the diagram as if the perfect model for the system exists C) Indicate time sequences in a legend D) Stop decomposing the model when it appears the system should be completed Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 107) As a DFD guideline, every process should have a unique name. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 7.2 Draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models Classification: Concept 108) To create a set of hierarchal related charts in finer and finer detail, one must use ________. A) A hierarchy chart B) A flowchart C) Functional decomposition D) A subprocess Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 109) Functional decomposition stops when ________. A) No subprocesses can be broken down B) There are a max of 5 levels C) The team decides to stop D) The hierarchy chart becomes too cumbersome to read Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


110) Typically process names begin with ________. A) A noun B) The name of a person C) An action verb D) Decomposition Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.3 Decompose data flow diagrams into lower-level diagrams Classification: Concept 111) Which of the following is an advanced rule governing data flow diagramming? A) Data flows cannot be split. B) The inputs to a process must be sufficient to produce the outputs. C) At the highest level, new data flows may be added. D) It is good to have data flow lines cross each other. Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 7.4 Balance higher-level and lower-level data flow diagrams Classification: Concept 112) Primitive DFDs may be very detailed. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept 113) Kathy was reviewing the DFD and found there was a discrepancy between the order process and the customer credit approval process. Kathy was involved in a(n) ________. A) Gap analysis B) JAD C) Walkthrough D) Audit Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


114) Violations of DFD drawing rules can produce ________. A) A gap analysis B) Confusion C) Inefficiencies D) An audit Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 7.5 Use data flow diagrams as a tool to support the analysis of information systems Classification: Concept 115) Use cases written at the fish and ________ levels (sometimes called the clam level) are much more detailed and focus on sub-function goals. A) Black B) White C) Kite D) Sea Answer: A Difficulty: Difficult AACSB: Information Technology L.O.: 7.6 Discuss process modeling for electronic commerce applications Classification: Concept 116) ________ is used to represent an indifferent decision in the decision table. A) A greater than sign B) A blank C) The letter X D) A dash Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 7.7 Use decision tables to represent the logic of choice in conditional statements Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 8 Structuring System Data Requirements 1) The most common format used for data modeling is ________ diagramming. A) Entity-class B) Entity-object C) Entity-subject D) Entity-relationship Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 2) During requirements structuring, a ________ model represents conceptual data requirements for a particular system. A) Business B) Project C) Data D) Relationship Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 3) A(n) ________ data model is a detailed model that captures the overall structure of organizational data that is independent of any database management system or other implementation considerations. A) Conceptual B) Physical C) Logical D) Entity Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) A physical data model is a detailed model that captures the overall structure of organizational data that is independent of any database management system or other implementation considerations. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 5) Mastery of the requirements structuring methods and techniques is critical to one's success on a systems development project team. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 6) The process of conceptual data modeling begins with developing a conceptual data model for the system being replaced, if a system already exists. This is essential for planning the conversion of the current files or database into the database of the new system. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 7) The primary deliverable from the physical data modeling step within the analysis phase is an E-R diagram. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 8) The other deliverable from conceptual data modeling is a full set of entries about data objects that will be stored in the project dictionary, repository, or data modeling software. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 2 Copyright © 2020 Pearson Education, Inc.


9) Why do some systems developers believe the data model is the most important part of IS requirements? Answer: First, the characteristics of data captured during data modeling are crucial in the design of databases, programs, computer screens, and printed reports. Second, data, not processes, are the most complex aspects of many modern information systems and hence require a central role in structuring system requirements. Third, the characteristics about data are reasonably permanent and have significant similarity for different organizations in the same business. Finally, structural information about data is essential for automatic program generation. Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Synthesis 10) Describe conceptual data modeling. How is it used? Describe the process. Answer: A conceptual data model is a representation of organizational data. The purpose of a conceptual data model is to show as many rules about the meaning and interrelationships among data as possible. Analysts develop (or use from prior systems development) a conceptual data model for the current system and then build or refine a purchased conceptual data model that supports the scope and requirements for the proposed or enhanced system. The process of conceptual data modeling begins with developing a conceptual data model for the system being replaced, if a system already exists. Then, a new conceptual data model is built (or a standard one is purchased) that includes all of the data requirements for the new system. Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Synthesis 11) What unique characteristic(s) distinguish(es) each object from other objects of the same type? A) Secondary key B) Primary key C) Composite key D) Index Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.2 Describe the information gathering process for conceptual data modeling Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


12) On what basis are objects referenced, selected, qualified, sorted, and categorized? A) Attributes and secondary keys B) Entities C) Primary keys D) Index Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.2 Describe the information gathering process for conceptual data modeling Classification: Concept 13) An ________ model is a detailed, logical representation of the entities, associations, and data elements for an organization or business area. A) E-D B) E-O C) E-R D) E-A Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 8.2 Describe the information gathering process for conceptual data modeling Classification: Concept 14) A(n) ________ is a person, place, object, event, or concept in the user environment about which the organization wishes to maintain data. A) Dimension B) Attribute C) Object D) Entity Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) An entity ________ is a collection of entities that share common properties or characteristics. A) Object B) Type C) Subject D) Relationship Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 16) Each entity type in an E-R model is given a ________ because it represents a class or set, it is singular. A) Class B) Type C) Name D) Degree Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 17) An entity ________ is a single occurrence of an entity type. A) Instance B) Object C) Attribute D) Class Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


18) An entity ________ is described just once in a data model, whereas many ________ of that may be represented by data stored in the database. A) Type; instances B) Type; classes C) Instance; types D) Class; objects Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 19) A common mistake many people make when they are just learning to draw E-R diagrams, especially if they already know how to do data flow diagramming, is to confuse data entities with ________ and relationships with data flows. A) Classes B) Sinks C) Relationships D) Attributes Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 20) Event entity types should be named for the result of the ________, not the activity or process of the event. A) Event B) Class C) Entity D) Object Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


21) A(n) ________ is a named property or characteristic of an entity that is of interest to the organization. A) Event B) Instance C) Relationship D) Attribute Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 22) Similar attributes of different entity types should use ________ but distinguishing names. A) Similar B) Different C) Unique D) Duplicate Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 23) A ________ key is an attribute (or combination of attributes) that uniquely identifies each instance of an entity type. A) Primary B) Unique C) Candidate D) Duplicate Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


24) A(n) ________ is an attribute that may take on more than one value for each entity instance. A) Multivalued attribute B) Single valued attribute C) Identifier D) Candidate key Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 25) A(n) ________ is an attribute that must have a value for every entity instance. A) Derived attribute B) Composite attribute C) Required attribute D) Optional attribute Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 26) A(n) ________ is an attribute that may not have a value for every entity instance. A) Required attribute B) Derived attribute C) Composite attribute D) Optional attribute Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 27) A(n) ________ is an attribute that has meaningful component parts. A) Optional attribute B) Composite attribute C) Required attribute D) Derived attribute Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 8 Copyright © 2020 Pearson Education, Inc.


28) A(n) ________ is an attribute whose value can be computed from related attribute values. A) Derived attribute B) Composite attribute C) Required attribute D) Optional attribute Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 29) A(n) ________ is an association between the instances of one or more entity types that is of interest to the organization. A) Attribute B) Repeating group C) Relationship D) Identifier Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 30) The ________ of a relationship is the number of entity types that participate in that relationship. A) Object B) Degree C) Identifier D) Measure Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


31) A unary relationship is a relationship between the instances of ________ entity type(s). A) One B) Two C) Three D) Five Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 32) A recursive relationship is also known as a ________ relationship. A) Binary B) Ternary C) Secondary D) Unary Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 33) A ________ relationship is a relationship between instances of two entity types and is the most common type of relationship encountered in data modeling. A) Secondary B) Binary C) Primary D) Ternary Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


34) A ternary relationship is a simultaneous relationship among instances of ________ entity type(s). A) One B) Two C) Three D) Ten Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 35) The ________ defines the number of instances of entity B that can (or must) be associated with each instance of entity A. A) Cardinality B) Relationship C) Identifier D) Association Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 36) A(n) ________ is an entity type that associates the instances of one or more entity types and contains attributes that are peculiar to the relationship between those entity instances. A) Relationship B) Associative entity C) Identifier D) Cardinality Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 37) An entity has its own identity that distinguishes it from each other entity. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 11 Copyright © 2020 Pearson Education, Inc.


38) An object type is a collection of entities that share common properties or characteristics. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 39) An entity instance (also known simply as an instance) is a single occurrence of an entity type and is described just once in a data model, whereas many instances of that entity type may be represented by data stored in the database. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 40) Event entity types should be named for the result of the event, not the activity or process of the event. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 41) A state is a named property or characteristic of an entity that is of interest to the organization. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 42) A primary key is an attribute (or combination of attributes) that uniquely identifies each instance of an entity type. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


43) An identifier is a candidate key that has been selected to be used as the unique characteristic for an entity type. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 44) An aggregation is an association between the instances of one or more entity types that is of interest to the organization. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 45) What is the link between a data model and a DFD? Answer: Data elements included in data flows also appear in the data model, and vice versa. You must include in the data model any raw data captured and retained in a data store, and a data model can include only data that have been captured or that have been computed from captured data. Because a data model is a general business picture of data, both manual and automated data stores will be included. Each data store in a process model must relate to business objects represented in the data model. You can use an automated repository to verify these linkages. Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Synthesis

13 Copyright © 2020 Pearson Education, Inc.


46) List at least four requirements for determination questions for data modeling. Include a question and which asset is related to that determination. Answer: 1.What are the subjects/objects of the business? What types of people, places, things, materials, events, etc. are used or interact in this business, about which data must be maintained? How many instances of each object might exist?–data entities and their descriptions 2. What unique characteristic (or characteristics) distinguishes each object from other objects of the same type? Might this distinguishing feature change over time or is it permanent? Might this characteristic of an object be missing even though we know the object exists?–primary key 3. What characteristics describe each object? On what basis are objects referenced, selected, qualified, sorted, and categorized? What must we know about each object in order to run the business?–attributes and secondary keys 4. How do you use these data? That is, are you the source of the data for the organization, do you refer to the data, do you modify it, and do you destroy it? Who is not permitted to use these data? Who is responsible for establishing legitimate values for these data?–security controls and understanding who really knows the meaning of data 5. Over what period of time are you interested in these data? Do you need historical trends, current "snapshot" values, and/or estimates or projections? If a characteristic of an object changes over time, must you know the obsolete values?–cardinality and time dimensions of data 6. Are all instances of each object the same? That is, are there special kinds of each object that are described or handled differently by the organization? Are some objects summaries or combinations of more detailed objects?–supertypes, subtypes, and aggregations 7. What events occur that imply associations among various objects? What natural activities or transactions of the business involve handling data about several objects of the same or a different type?–relationships and their cardinality and degree 8. Is each activity or event always handled the same way or are there special circumstances? Can an event occur with only some of the associated objects, or must all objects be involved? Can the associations between objects change over time (for example, employees change departments)? Are values for data characteristics limited in any way?—integrity rules, minimum and maximum cardinality, time dimensions of data Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Synthesis

14 Copyright © 2020 Pearson Education, Inc.


47) List and explain the following key data modeling terms: entity, attribute, relationship, degree, cardinality, and associative entity. Answer: An entity is a person, place, object, event, or concept in the user environment about which the organization wishes to collect and maintain data. An attribute is a named property or characteristic of an entity that is of interest to the organization. A relationship is an association between the instances of one or more entity types that is of interest to the organization. Degree defines the number of entity types that participate in a relationship. Cardinality specifies the number of instances of entity B that can (or must) be associated with each instance of entity A. An associative entity is a many-to-many (or one-to-one) relationship that the data modeler chooses to model as an entity type with several associated one-to-many relationships with other entity types. Difficulty: Difficult AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Synthesis 48) Define entity type. Provide the guidelines for creating entity types. Answer: When naming and defining entity types, you should use the following guidelines: • An entity type name is a singular noun. • An entity type name should be descriptive and specific to the organization. • An entity type name should be concise. • Event entity types should be named for the result of the event, not the activity or process of the event. Some specific guidelines for defining entity types follow: • An entity type definition should include a statement of what the unique characteristic(s) is/are for each instance of the entity type. • An entity type definition should make clear what entity instances are included and not included in the entity type. • An entity type definition often includes a description of when an instance of the entity type is created and deleted. • For some entity types, the definition must specify when an instance might change into an instance of another entity type. • For some entity types, the definition must specify what history is to be kept about entity instances. Difficulty: Difficult AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Synthesis

15 Copyright © 2020 Pearson Education, Inc.


49) What are the rules for naming and defining attributes? Answer: Name attributes using the following guidelines: • An attribute name is a noun. • An attribute name should be unique. • To make an attribute name unique and for clarity, each attribute name should follow a standard format. • Similar attributes of different entity types should use similar but distinguishing names. • An attribute definition states what the attribute is and possibly why it is important. • An attribute definition should make it clear what is included and what is not included in the attribute's value. • Any aliases, or alternative names, for the attribute can be specified in the definition. • It may also be desirable to state in the definition the source of values for the attribute. • An attribute definition should indicate if a value for the attribute is required or optional. • An attribute definition may indicate if a value for the attribute may change once a value is provided and before the entity instance is deleted. • An attribute definition may also indicate any relationships that attribute has with other attributes. Difficulty: Difficult AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Synthesis 50) What are repeating groups and multivalued attributes? Provide an example of each. Answer: A multivalued attribute is an attribute that may assume more than one value for each entity instance. A repeating group is a related set of multivalued attributes. Using a student and the courses she takes as an example, the course number, name, and grade are multivalued attributes and repeat for each course that the student takes. Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Synthesis 51) An association usually means that an event has occurred or that some natural linkage exists between entity instances. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


52) A ternary relationship is a relationship between instances of two entity types and is the most common type of relationship encountered in data modeling. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 53) The minimum cardinality of a relationship is the minimum number of instances of entity B that may be associated with each instance of entity A. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 54) A relationship definition explains what action is being taken and possibly why it is important. It may be important to state who or what does the action, but it is not important to explain how the action is taken. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 55) An associative entity is an entity type that associates the instances of only one type and contains attributes that are peculiar to the relationship between those entity instances. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 56) One situation in which a relationship must be turned into an associative entity is when the associative entity has other relationships with entities besides the relationship that caused its creation. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 17 Copyright © 2020 Pearson Education, Inc.


57) Define unary, binary, and ternary relationships. Provide an example of each relationship. Answer: The number of entity types participating in a relationship defines the degree of the relationship. The most common relationships are unary, binary, and ternary. A unary relationship is a relationship between the instances of one entity type. An example of this type of relationship is of the "person" entity. One person (or instance) can be married to another person (or instance). The binary relationship is a relationship between instances of two entity types. An example of this relationship is of a supplier and part. The binary relationship is the most common type of relationship encountered in data modeling. The ternary relationship is a simultaneous relationship among instances of three entity types. An example is a supplier shipping a part to a warehouse. Difficulty: Easy AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Synthesis 58) Explain the concept of cardinality. Give an example. Answer: Suppose there are two entity types, A and B, connected by a relationship. The cardinality of a relationship is the number of instances of entity B that can (or must) be associated with each instance of entity A. Clearly, a video store may stock more than one DVD of a given movie. In the terminology we have used so far, this example is intuitively a "many" relationship. Yet it is also true that the store may not have a single copy of a particular movie in stock. We need a more precise notation to indicate the range of cardinalities for a relationship. The minimum cardinality of a relationship is the minimum number of instances of entity B that may be associated with each instance of entity A. The maximum cardinality is the maximum number of instances. Cardinality constraints include mandatory cardinality, one optional, on mandatory cardinality, optional cardinalities. Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Synthesis

18 Copyright © 2020 Pearson Education, Inc.


59) Naming relationships can be difficult. Describe at least three guidelines for naming relationships. Answer: You should use a few special guidelines for naming relationships, such as the following: • A relationship name is a verb phrase. Relationships represent actions, usually in the present tense. A relationship name states the action taken, not the result of the action. • You should avoid vague names, such as Has or Is related to. Use descriptive verb phrases taken from the action verbs found in the definition of the relationship. • A relationship definition explains what action is being taken and possibly why it is important. It may be important to state who or what does the action, but it is not important to explain how the action is taken. • It may be important to give examples to clarify the action. The definition should explain any optional participation. You should explain what conditions lead to zero associated instances, whether this can happen only when an entity instance is first created or whether this can happen at any time. • A relationship definition should also explain the reason for any explicit maximum cardinality other than many. • A relationship definition should explain any restrictions on participation in the relationship. • A relationship definition should explain the extent of history that is kept in the relationship. • A relationship definition should explain whether an entity instance involved in a relationship instance can transfer participation to another relationship instance. Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Synthesis 60) A ________ is an entity type that is meaningful to the organization and that shares common attributes or relationships distinct from other sub-groupings. A) Repeating group B) Multi-valued C) Super-type D) Subtype Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


61) The ________ rule specifies that an entity instance of the supertype does not have to belong to any subtype. A) Total specialization B) Partial specialization C) Overlap D) Disjoint Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept 62) The ________ rule specifies that each entity instance of the supertype must be a member of some subtype of the relationship. A) Partial specialization B) Business C) Overlap D) Total specialization Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept 63) The ________ rule specifies that if an entity instance of the super type is a member of one subtype, it cannot simultaneously be a member of any other subtype. A) Business B) Overlap C) Disjoint D) Partial specialization Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept 64) A supertype is a generic entity type that has a relationship with one or more subtypes. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept 20 Copyright © 2020 Pearson Education, Inc.


65) Briefly identify four important business rules for supertype/subtype relationships. Answer: Total specialization, partial specialization, disjoint, and overlap are four business rules for supertype/subtype relationships. The total specialization rule specifies that each entity instance of the supertype must be a member of some subtype in the relationship. The partial specialization rule specifies that an entity instance of the supertype is allowed not to belong to any subtype. The disjoint rule specifies that if an entity instance of the supertype is a member of one subtype, it cannot simultaneously be a member of any other subtype. The overlap rule specifies that an entity instance can simultaneously be a member of two (or more) subtypes. Difficulty: Easy AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Synthesis 66) The ________ rule specifies that an entity instance can simultaneously be a member of two (or more) subtypes. A) Business B) Overlap C) Disjoint D) Total specialization Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 67) ________ rules are specifications that preserve the integrity of the logical data model. A) Business B) Disjoint C) Overlap D) Total specialization Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 68) How many types of business rules are there in conceptual data modeling? A) One B) Two C) Three D) Four Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 21 Copyright © 2020 Pearson Education, Inc.


69) Which business rule specifies that each instance of an entity type must have a unique identifier that is not null? A) Triggering operations B) Referential integrity C) Entity integrity D) Domains Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 70) Which business rule specifies the validity of attribute values? A) Triggering operations B) Referential integrity C) Entity integrity D) Domains Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 71) Which business rule specifies constraints on valid values for attributes? A) Triggering operations B) Referential integrity C) Entity integrity D) Domains Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 72) Which business rule specifies rules concerning the relationships between entity types? A) Triggering operations B) Referential integrity constraints C) Entity integrity D) Domains Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


73) A domain is the set of all data types and ranges of values that ________ may assume. A) Entities B) Instances C) Attributes D) Events Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 74) A(n) ________ is an assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete. A) Domain B) Event C) Referential integrity D) Triggering operation Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 75) A(n) ________ is a concise statement of the business rule to be enforced by the triggering operation. A) Event B) User rule C) Action D) Condition Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 76) A(n) ________ is the data manipulation operation (insert, delete, or update) that initiates the operation. A) Event B) User rule C) Action D) Condition Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 23 Copyright © 2020 Pearson Education, Inc.


77) There is/are ________ principal type(s) of packaged data model(s). A) One B) Two C) Three D) Five Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 78) The disjoint rule specifies that if an entity instance of the supertype is a member of one subtype, it can simultaneously be a member of any other subtype. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 79) Domain definitions typically specify some (or all) of the following characteristics of attributes: data type, length, format, range, allowable values, meaning, uniqueness, and null support (whether an attribute value may or may not be null). Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 80) Projects with purchased models take less time and cost more because the initial discovery steps are no longer necessary, leaving only iterative tailoring and refinement to the local situation. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


81) List the advantages of using a domain. Answer: • Domains verify that the values for an attribute (stored by insert or update operations) are valid. • Domains ensure that various data manipulation operations (such as joins or unions in a relational database system) are logical. • Domains help conserve effort in describing attribute characteristics. • Domains can conserve effort because we can define domains and then associate each attribute in the data model with an appropriate domain. Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Synthesis 82) Define triggering operation. Provide an example and include the components. Answer: A triggering operation (also called a trigger) is an assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete. The scope of triggering operations may be limited to attributes within one entity or it may extend to attributes in two or more entities. Other examples may be used. Example: User rule: WITHDRAWAL Amount may not exceed ACCOUNT Balance Event: Insert Entity Name: WITHDRAWAL Condition: WITHDRAWAL Amount > ACCOUNT Balance Action: Reject the insert transaction Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Synthesis 83) ________ data models are generic data models that are designed to be used by organizations within specific industries. A) Universal B) Conceptual C) Logical D) Industry-specific Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


84) The term ________ data model means a conceptual data model with some additional properties associated with the most popular type of database technology like relational databases. A) Universal B) Physical C) Logical D) Industry-specific Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 85) Which benefit of purchased data models refers to the fact that they are very general, covering almost all options employed by the associated functional area or industry? A) Consistent and complete B) Validated C) Cost reduction D) Facilitates systems analysis Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 86) Which benefit of purchased data models provides database planning and analysis by providing a first data model, which we can use to generate specific analysis questions and concrete, not hypothetical or abstract, examples of what might be in the appropriate database? A) Validated B) Consistent and complete C) Cost reduction D) Facilitates systems analysis Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


87) A(n) ________ has a well-defined role in the application domain, and it has state (data), behavior, and identity characteristics. A) Event B) Object C) Activity D) Class Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 88) The ________ of an object encompasses its properties (attributes and relationships) and the values of those properties. A) State B) Condition C) Behavior D) Event Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 89) The ________ shows the static structure of an object-oriented model: the object classes, their internal structure, and the relationships in which they participate. A) Data model B) Object class C) Object diagram D) Class diagram Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 90) The ________ is a logical grouping of objects that have the same (or similar) attributes, relationships, and behaviors; also called class. A) Operation B) Encapsulation C) Object class D) Object diagram Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 27 Copyright © 2020 Pearson Education, Inc.


91) The ________ is the technique of hiding the internal implementation details of an object from its external view. A) Query operation B) Encapsulation C) Constructor operation D) Update operation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 92) A(n) ________ is an operation that does not have any side effects; it accesses the state of an object but does not alter the state. A) Encapsulation B) Constructor operation C) Update operation D) Query operation Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 93) A(n) ________ is a specification that indicates how many objects participate in a given relationship. A) Association role B) Multiplicity C) Association D) Object class Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


94) A(n) ________ class is a class that has no direct instances but whose descendants may have direct instances. A) Abstract B) Concrete C) Object D) Associative Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 95) A class that can have direct instances (e.g., Outpatient or Resident Patient) is called a(n) ________ class. A) Object B) Abstract C) Associative D) Concrete Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 96) A part-of relationship in which parts belong to only one whole object, and the parts live and die with the whole object is called ________. A) Method B) Composition C) Aggregation D) Polymorphism Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 97) The fact that the same operation may apply to two or more classes in different ways is known as ________. A) Aggregation B) Abstract operation C) Polymorphism D) Composition Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 29 Copyright © 2020 Pearson Education, Inc.


98) The technique of hiding the internal implementation details of an object from its external view is known as encapsulation. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 99) Operations can be classified into four types, depending on the kind of service requested by clients. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 100) What are the benefits of beginning an operation with a packaged logical data model? Answer: An advantage of LDMs is that a packaged data model now exists for almost every industry and application area. Other advantages include: • Validated. Purchased models are proven through extensive experience. • Cost reduction. Projects with purchased models take less time and cost less because the initial discovery steps are no longer necessary, leaving only iterative tailoring and refinement to the local situation. • Anticipate future requirements, not just initial requirements. Purchased models anticipate future needs, not just those recognized during the first version of an application. Thus, because the database structure does not require structural change, their benefits are recurring, not onetime. • Facilitates systems analysis. The purchased model actually facilitates database planning and analysis by providing a first data model, which you can use to generate specific analysis questions and concrete, not hypothetical or abstract, examples of what might be in the appropriate database. • Consistent and complete. The purchased data models are very general, covering almost all options employed by the associated functional area or industry. Thus, they provide a structure that, when tailored, will be consistent and complete. Difficulty: Difficult AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Synthesis

30 Copyright © 2020 Pearson Education, Inc.


101) ________ are the most complex aspects of modern information systems. A) Processes B) Entities C) Subjects D) Data Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 102) Which of the following is a reason some developers believe a data model is the most important part of the information systems requirement? A) Data captured during data modeling is crucial to the design of computer screens. B) Processes are the most complex aspects of modern information systems. C) Data characteristics are temporary. D) Structural information about process improvement is essential for automatic program generation. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 8.1 Explain the role of conceptual data modeling in the overall analysis and design of an information system Classification: Concept 103) What is the purpose of a conceptual data model? A) To help create spreadsheets B) To show as many rules about the meaning and interrelationships among data as are possible C) To connect processes with inputs and outputs D) To make sure the executive team sees the data Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.2 Describe the information gathering process for conceptual data modeling Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


104) Which of the following is an example of an object entity? A) Patient B) Account C) Product D) Sale Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 105) It is not necessary to clearly name and define data, such as entity types. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 106) Sometimes a combination of attributes is required to identify a unique entity. In this case, ________ should be used. A) A common name B) A candidate key C) The source of the values D) A different name Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept 107) Karen is creating an E-R model. Skill is one of the attributes of worker. But a worker can have more than one skill, therefore Karen knows this is a(n) ________. A) Instance B) Aliases C) Entity D) Multivalued attribute Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 8.3 Describe how to represent an entity-relationship model and be able to define the terms: entity type, attribute, identifier, multivalued attribute, and relationship Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


108) In an entity relationship diagram if one person may only be married to one other person, the relationship is a ________. A) Unary relationship B) Binary relationship C) Ternary relationship D) Bilateral relationship Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 109) The ________ of a relationship is the number of entity types that participate in that relationship. A) Angle B) Degree C) Number of steps between entities D) Attributes Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 110) A ________relationship is a relationship between instances of two entity types. A) Ternary B) Dual C) Binary D) Unary Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept

33 Copyright © 2020 Pearson Education, Inc.


111) Which relationship is the most common type of relationship encountered in data modeling? A) Ternary B) Dual C) Binary D) Unary Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 112) A ________ is a simultaneous relationship among instances of three entity types. A) Ternary B) Dual C) Binary D) Unary Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.4 Distinguish among unary, binary, and ternary relationships as well as associative entities, providing an example of each Classification: Concept 113) The only relationships that can exist in E-R models is unary, binary, and ternary. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept 114) Peter had to correct an E-R model because an entity instance of the supertype was not a member of some subtype in the relationship. The E-R model broke the ________ rule. A) Total specialization B) Partial specialization C) Overlap D) Disjoint Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 8.5 Define supertypes and subtypes, showing how to represent these entity types with entity-relationship diagramming notation Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


115) All of the following are business rules except ________. A) Entity integrity B) Unary relationship C) Domains D) Triggering operations Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 116) Which of the following is an advantage of the use of domains? A) They are easier to understand than entities. B) Domains are easier to define in an E-R model than entities. C) Domains ensure data manipulation operations are logical. D) Domains are non-null. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 117) Business rules should be documented in the CASE repository. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept 118) All of the following are advantages to incorporating business rules in the repository except ________. A) Reduces maintenance B) Faster application development C) Faster response to business changes D) Does not promote ease of use of a database Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.6 Define four basic types of business rules in a conceptual data model Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


119) Common database patterns for different business situations are availed in packaged data models. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 120) One of the benefits of starting with and then tailoring a purchased data model is ________. A) Invalidation B) Anticipation of future requirements C) Aggregation D) Polymorphism Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept 121) If a purchased model is proven through extensive experience it is said to be ________. A) Consistent B) Complete C) Aggregate D) Validated Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 8.7 Explain the role of prepackaged database models (patterns) in data modeling Classification: Concept

36 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 9 Designing Databases 1) One purpose of database design is to structure the data in stable structures, called normalized tables, that are not likely to change over time and that have minimal ________. A) Data B) Space C) Redundancy D) Columns Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 2) Logical and ________ database design is typically performed in parallel with other systems design steps. A) Normal B) Physical C) Conceptual D) Normalized Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 3) ________ database design is driven not only from the previously developed E-R data model for the application or enterprise but also from form and report layouts. A) Logical B) Physical C) Normalized D) De-normalized Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) In logical database design, we use a process called ________, which is a way to build a data model that has the properties of simplicity, non-redundancy, and minimal maintenance. A) Data modeling B) Database designing C) De-normalization D) Normalization Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 5) In most situations, many physical database design decisions are implicit or eliminated when we choose the ________ technologies to use with the application. A) Data management B) System management C) Software management D) SDLC Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 6) There are ________ key steps in logical database modeling and design. A) Two B) Three C) Four D) Five Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 7) In logical database modeling and design, we combine normalized data requirements from all user interfaces into one consolidated logical database model; this step is called view ________. A) Summation B) Integration C) Addition D) Combination Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 2 Copyright © 2020 Pearson Education, Inc.


8) In logical database modeling and design, we translate the ________ E-R data model for the application or enterprise, developed without explicit consideration of specific user interfaces, into normalized data requirements. A) Normal B) Physical C) Logical D) Conceptual Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 9) A(n) ________ is an attribute (or combination of attributes) whose value is unique across all occurrences of a relation. A) Composite key B) Primary key C) Identifier D) Index Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 10) During logical database design, you must account for every data element on a system input or output form or report and on the ________. A) E-R diagram B) Conceptual design C) Physical design D) Logical design Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 11) In a ________ database model, data is represented as a set of related tables or relations. A) Logical B) Conventional C) Relational D) Physical Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 3 Copyright © 2020 Pearson Education, Inc.


12) A relation is a named, ________-dimensional table of data. Each relation (or table) consists of a set of named columns and an arbitrary number of unnamed rows. A) Two B) One C) Three D) Four Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 13) Each ________ in a relation corresponds to an attribute of that relation. A) Entity B) Data C) Column D) Row Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 14) Each ________ of a relation corresponds to a record that contains data values for an entity. A) Column B) Entity C) Attribute D) Row Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 15) Entries in cells are simple and an entry at the intersection of each row and column has a ________ value. A) Duplicate B) Single C) Multi D) Repeating Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 4 Copyright © 2020 Pearson Education, Inc.


16) In a relation, each row is unique and uniqueness is guaranteed because the relation has a nonempty ________ key value. A) Unique B) Composite C) Candidate D) Primary Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 17) In a relation, the sequence of columns can be interchanged without changing the meaning or use of the ________. A) Relation B) Attribute C) Row D) Primary key Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 18) A well-structured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies and is also known as a ________. A) Column B) Row C) Table D) Key Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 19) Logical database design is driven not only from the previously developed E-R data model for the application or enterprise but also from form and report layouts. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


20) During logical database design, you must account for every data element on a system input or output–form or report–and on the flow chart. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 21) A foreign key is an attribute (or combination of attributes) whose value is unique across all occurrences of a relation. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 22) A relation is a named, two-dimensional table of data and each relation (or table) consists of a set of named columns and an arbitrary number of unnamed rows. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 23) In an object-oriented database model, data is represented as a set of related tables or relations. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 24) In a relational table, each row is unique and uniqueness is guaranteed because the relation has a non-empty primary key value. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 25) An unstructured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 6 Copyright © 2020 Pearson Education, Inc.


26) What are the five purposes of data design? Answer: Structure the data in stable structures, called normalized tables, that are not likely to change over time and that have minimal redundancy. Develop a logical database design that reflects the actual data requirements that exist in the forms and reports of an information system. Develop a logical database design from which we can do physical database design. Translate a relational database model into a technical file and database design that balances several performance factors. Choose data storage technologies that will efficiently, accurately, and securely process database activities. Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Synthesis 27) What are the four key steps to logical database modeling and design? Answer: 1. Develop a logical data model for each known user interface for the application using normalization principles. 2. Combine normalized data requirements from all user interfaces into one consolidated logical database model; this step is called view integration. 3. Translate the conceptual E-R data model for the application or enterprise, developed without explicit consideration of specific user interfaces, into normalized data requirements. 4. Compare the consolidated logical database design with the translated E-R model and produce, through view integration, one final logical database model for the application. Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Synthesis 28) What is a relational database model? How do relations differ from nonrelation tables? Answer: The relational database model represents data in the form of related tables, or relations. A relation is a named, two-dimensional table of data. Each relation (or table) consists of a set of named columns and an arbitrary number of unnamed rows. Each column in a relation corresponds to an attribute of that relation. Each row of a relation corresponds to a record that contains data values for an entity. Relations have several properties that distinguish them from nonrelational tables: 1. Entries in cells are simple. An entry at the intersection of each row and column has a single value. 2. Entries in a given column are from the same set of values. 3. Each row is unique. Uniqueness is guaranteed because the relation has a nonempty primary key value. 4. The sequence of columns can be interchanged without changing the meaning or use of the relation. 5. The rows may be interchanged or stored in any sequences. Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Synthesis

7 Copyright © 2020 Pearson Education, Inc.


29) ________ is a process for converting complex data structures into simple, stable data structures. A) De-normalization B) Normalization C) Database modeling D) Relation Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 30) In ________ normal form, each nonprimary key attribute is identified by the whole key (what we call full functional dependency). A) First B) Fourth C) Third D) Second Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 31) In ________ normal form, nonprimary key attributes do not depend on each other (what we call no transitive dependencies). A) First B) Fourth C) Third D) Second Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 32) A functional dependency is a particular relationship between two ________. A) Attributes B) Rows C) Databases D) Tables Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 8 Copyright © 2020 Pearson Education, Inc.


33) The result of normalization is that every ________ key attribute depends upon the whole primary key. A) Candidate B) Unique C) Primary D) Nonprimary Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 34) A relation is in ________ if every non-primary key attribute is functionally dependent on the whole primary key. A) 1NF B) 2NF C) 3NF D) 4NF Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 35) To designate a foreign key in a relation, the name contains ________. A) A dash B) An arrow C) A circle D) A functional dependency Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 36) De-normalization is a process for converting complex data structures into simple, stable data structures. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


37) A relation is in first normal form if every nonprimary key attribute is functionally dependent on the whole primary key. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 38) A relation is in third normal form if it is in second normal form and there are no functional dependencies between two (or more) non-primary key attributes. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 39) Each relationship in an E-R diagram must be represented in the relational database design and how we represent a relationship depends on its nature. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 40) Define normalization and list the rules for second and third form. Answer: Normalization is the process for converting complex data structures into simple, stable data structures. Relations are in second normal form if every nonprimary key attribute is functionally dependent on the whole primary key. Relations are in third normal form if nonprimary key attributes do not depend on each other. Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Synthesis 41) A ________ is an attribute that appears as a non-primary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation. A) Referential integrity B) Primary key C) Foreign key D) Unique key Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 10 Copyright © 2020 Pearson Education, Inc.


42) A(n) ________ must satisfy referential integrity, which specifies that the value of an attribute in one relation depends on the value of the same attribute in another relation. A) Foreign key B) Primary key C) Unique key D) Index Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 43) Each entity type in the E-R diagram becomes a relation. The identifier of the entity type becomes the ________ of the relation, and other attributes of the entity type become non-primary key attributes of the relation. A) Foreign key B) Index C) Unique key D) Primary key Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 44) Each regular entity type in an E-R diagram is transformed into a(n) ________. A) Identifier B) Relation C) Attribute D) Row Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


45) The key should be ________; that is, no attribute in the key can be deleted without destroying its unique identification. A) De-normalized B) Normalized C) Redundant D) Nonredundant Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 46) ________ is NOT a valid degree of the relationship. A) Binary B) Unary C) N-ary D) Ternary Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 47) A binary one-to-many (1:N) relationship in an E-R diagram is represented by adding the primary key attribute (or attributes) of the entity on the one side of the relationship as a(n) ________ in the relation that is on the many side of the relationship. A) Primary key B) Foreign key C) Unique key D) Index Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


48) A unary relationship is a relationship between the instances of a ________ entity type, which are also called recursive relationships. A) Single B) Double C) Triple D) Many Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 49) A recursive foreign key is a foreign key in a relation that references the ________ values of that same relation. A) Nonprimary key B) Unique key C) Primary key D) Foreign key Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 50) While representing an entity, each nonkey attribute of the entity type becomes a key attribute of the relation. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 51) The procedure for representing relationships depends on the degree of the relationship and not on the cardinalities of the relationship. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


52) A recursive foreign key is a foreign key in a relation that references the foreign key values of that same relation. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 53) Which relation is created with the primary key associated with the relationship or associative entity, plus any nonkey attributes of the relationship or associative entity and the primary keys of the related entities (as foreign key attributes)? A) Associative entity B) Associative entity with its own key C) Associative entity with additional key D) Binary 1:N relationship Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 54) Which relation is created with a composite primary key using the primary keys of the related entities and additional primary key attributes associated with the relationship or associative entity, plus any non-key attributes of the relationship or associative entity? A) Binary 1:N relationship B) Associative entity C) Associative entity with its own key D) Associative entity with additional key Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


55) Which relation is created with a composite primary key using the primary keys of the related entities, plus any nonkey attributes associative entity of the relationship or associative entity? A) Associative entity B) Associative entity with its own key C) Associative entity with additional key D) Weak entity Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 56) Which relation is created by placing the primary key of the entity on the one side of the relationship as a foreign key in the relation for the entity on the many side? A) Associative entity B) Weak entity C) Binary 1:N relationship D) Associative entity with additional key Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 57) Which relation is created by placing the primary key of either entity in the relation for the other entity or by doing this for both entities? A) Binary 1:N relationship B) Unary 1:1 relationship C) Weak entity D) Associative entity with additional key Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


58) Which relation is created with a composite primary key (which includes the primary key of the entity on which this weak entity depends) and nonkey attributes? A) Associative entity with additional key B) Super-type C) Regular entity D) Weak entity Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 59) Which relation is created with primary key and nonkey attributes only? A) Regular entity B) Weak entity C) Sub-type D) Associative entity Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 60) In some situations, two or more attributes may have different names but the same meaning, as when they describe the same characteristic of an entity. Such attributes are called ________. A) Homonyms B) Antonyms C) Synonyms D) Duplicates Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


61) In some situations, a single attribute name, called a(n) ________, may have more than one meaning or describe more than one characteristic. A) Homonym B) Antonym C) Synonym D) Duplicate Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 62) When merging relations that contain synonyms, we should obtain, if possible, agreement from users on a single standardized name for the attribute and eliminate the other synonym. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 63) When two 3NF relations are merged to form a single relation, dependencies between nonkeys may result. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


64) Summarize the four steps involved in transforming an E-R diagram into normalized relations and then merging them into one consolidated set of relations. Answer: 1. Represent entities. Each entity type in the E-R diagram becomes a relation. The identifier of the entity type becomes the primary key of the relation, and other attributes of the entity type become nonprimary key attributes of the relation. 2. Represent relationships. Each relationship in an E-R diagram must be represented in the relational database design. How we represent a relationship depends on its nature. 3. Normalize the relations. The relations created in steps 1 and 2 may have unnecessary redundancy. So we need to normalize these relations to make them well structured. 4. Merge the relations. So far in database design we have created various relations from both a bottom-up normalization of user views and from transforming one or more E-R diagrams into sets of relations. Across these different sets of relations, there may be redundant relations (two or more relations that describe the same entity type) that must be merged and renormalized to remove the redundancy. Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Synthesis 65) When integrating relations what is the difference between a synonym attribute and a homonym attribute? Provide an example of each. Answer: In a synonym attribute, two or more attributes may have different names but the same meaning. In other situations, a single attribute name called a homonym may have more than one meaning to describe more than one characteristic. Examples may vary. An example of synonym is Emp_ID and Employee_Number. An example of a homonym is the term account. An account at a bank could mean savings account, checking account, or any other type of account. Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Synthesis

18 Copyright © 2020 Pearson Education, Inc.


66) Describe at least three E-R structures and their relational representation. Answer: • Regular entity: Create a relation with primary key and nonkey attributes. • Weak entity: Create a relation with a composite primary key (which includes the primary key of the entity on which this weak entity depends) and nonkey attributes. • Binary or unary 1:1 relationship: Place the primary key of either entity in the relation for the other entity or do this for both entities. • Binary 1:N relationship: Place the primary key of the entity on the one side of the relationship as a foreign key in the relation for the entity on the many side. • Binary or unary M:N relationship or associative entity: Create a relation with a composite primary key using the primary keys of the related entities, plus any nonkey attributes associative entity of the relationship or associative entity. • Binary or unary M:N relationship or associative entity with additional key(s): Create a relation with a composite primary key using the primary keys of the related entities and additional primary key attributes associated with the relationship or associative entity, plus any nonkey attributes of the relationship or associative entity. • Binary or unary M:N relationship or associative entity with its own key: Create a relation with the primary key associated with the relationship or associative entity, plus any nonkey attributes of the relationship or associative entity and the primary keys of the related entities (as foreign key attributes). • Supertype/subtype: Create a relation for the superclass, which contains the primary relationship key and all nonkey attributes in common with all subclasses, plus create a separate relation for each subclass with the same primary key (with the same or local name) but with only the nonkey attributes related to that subclass. Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Synthesis 67) Describe the problems that may occur when integrating relations. Answer: Four problems may arise: synonyms, homonyms, dependencies between nonkeys, and class/subclass relationships. Synonyms are when two or more attributes may have different names but the same meaning, as when they describe the same characteristic of an entity. In other situations, a single attribute name, called a homonym, may have more than one meaning or describe more than one characteristic. For dependencies between nonkeys when two 3NF relations are merged to form a single relation, dependencies between nonkeys may result. Class/subclass relationships may be hidden in user views or relations. Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Synthesis

19 Copyright © 2020 Pearson Education, Inc.


68) A(n) ________ is the smallest unit of application data recognized by system software, such as a programming language or database management system. A) Table B) Field C) Row D) Index Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 69) Normalized relations are, of course, the result of ________ database design. A) Physical B) Logical C) Conceptual D) Conventional Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 70) We begin the physical design phase by addressing the design of physical fields for each attribute in a ________ data model. A) Conventional B) Conceptual C) Physical D) Logical Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 20 Copyright © 2020 Pearson Education, Inc.


71) A(n) ________ is a coding scheme recognized by system software for representing organizational data. A) Data model B) Attribute C) Data type D) Field Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 72) A default value is the value that a ________ will assume unless an explicit value is entered for it. A) Field B) Row C) Table D) Data type Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 73) A ________ value is a special field value, distinct from zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown. A) Key B) True C) Null D) Default Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 21 Copyright © 2020 Pearson Education, Inc.


74) A ________ table is a named set of rows and columns that specifies the fields in each row of the table. A) Conceptual B) Physical C) Relational D) Logical Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 75) ________ is the process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields. A) Partitioning B) Modeling C) Normalization D) Denormalization Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


76) The capability to split a table into separate sections, often called ________, is possible with most relational database products. A) Partitioning B) Splitting C) Combining D) Normalizing Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 77) ________ is NOT a valid type of partitioning method in relational database products. A) Range B) Hash C) Boundary D) Composite Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 78) Each partition is stored in a separate contiguous section of disk space, which Oracle calls a(n) ________. A) Database B) Tablespace C) Table D) Index Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 23 Copyright © 2020 Pearson Education, Inc.


79) A computer operating system stores data in a ________, which is a named set of table rows stored in a contiguous section of secondary memory. A) Disk B) Tablespace C) Table D) Physical file Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 80) A(n) ________ is a field of data that can be used to locate a related field or row of data. A) Index B) Pointer C) Secondary key D) Attribute Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 81) A(n) ________ is a file organization in which rows are stored either sequentially or nonsequentially, and an index is created that allows software to locate individual rows. A) Indexed file organization B) Sequential file organization C) Hashed file organization D) Physical file Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 24 Copyright © 2020 Pearson Education, Inc.


82) A(n) ________ is one field or a combination of fields for which more than one row may have the same combination of values. A) Index B) Primary key C) Secondary key D) Pointer Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 83) In a hashed file organization, the location of each ________ is determined using an algorithm. A) Constraint B) Key C) Column D) Row Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 84) The ________ families of file organizations cover most of the file organizations we will have at our disposal as we design physical files and databases. A) Two B) Three C) Four D) Five Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 25 Copyright © 2020 Pearson Education, Inc.


85) A calculated field is a field that can be derived from other database fields and is also known as a computed field or a derived field. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 86) In a range control, only alphabetic data may have a limited set of permissible values. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 87) A null value is a special field value, similar to a zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 88) A null value is the value a field will assume unless an explicit value is entered for the field. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 26 Copyright © 2020 Pearson Education, Inc.


89) A physical table is a named set of rows and columns that specifies the fields in each column of the table. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 90) The capability to split a table into separate sections is possible with most relational database products. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 91) In range partitioning, a table row is assigned to a partition by an algorithm and then maps the specified attribute value to a partition. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


92) Range partitioning combines range and hash partitioning by first segregating data by ranges on the designated attribute, and then within each of these partitions, it further partitions by hashing on the designated attribute. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 93) Denormalization can increase the chance of errors and inconsistencies that normalization avoided. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis 94) What information is required to design the physical files and databases related to the project? Answer: This information includes the following: • Normalized relations, including volume estimates • Definitions of each attribute • Descriptions of where and when data are used: entered, retrieved, deleted, and updated (including frequencies) • Expectations or requirements for response time and data integrity • Descriptions of the technologies used for implementing the files and database so that the range of required decisions and choices for each is known. Normalized relations are the result of logical database design. We take a bottom-up approach to reviewing physical file and database design. Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis

28 Copyright © 2020 Pearson Education, Inc.


95) What is data type? Why is it important to a designer? Answer: A data type is a coding scheme recognized by system software for representing organizational data. The space to store data and the speed required to access data are of consequence in the physical file and database design. The specific file or database management software you use with your system will dictate which choices are available to you. You want to choose a data type for a field that minimizes space, represents every possible legitimate value for the associated attribute, and allows the data to be manipulated as needed. The data type must be suitable for the life of the application; otherwise, maintenance will be required. Choose data types for future needs by anticipating growth. Also, be careful that date arithmetic can be done so that dates can be subtracted or time periods can be added to or subtracted from a date. Difficulty: Difficult AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis 96) List and describe the popular data integrity control methods. You may use examples to explain the control method. Answer: There are four popular data integrity control methods: default value, range control, referential integrity, and null value control. A default value is the value a field will assume unless an explicit value is entered for the field. Range control is when both numeric and alphabetic data may have a limited set of permissible values. The most common example of referential integrity is cross-referencing between relations. (The definition of referential integrity is given in a different chapter so the student may use an example). A null value is a special field value, distinct from a zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown. Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis

29 Copyright © 2020 Pearson Education, Inc.


97) What is null value? Why is it useful in the database? Answer: A null value is a special field value, distinct from a zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown. Using a special null value when a field is missing its value, you can also estimate the value, produce a report indicating rows of tables with critical missing values, or determine whether the missing value matters when computing needed information. Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis 98) What is the difference between logical database design and the physical table design? Answer: In logical database design, you group into a relation those attributes that concern some unifying, normalized business concept, such as a customer, product, or employee. In contrast, a physical table is a named set of rows and columns that specifies the fields in each row of the table. A physical table may or may not correspond to one relation. Whereas normalized relations possess properties of well-structured relations, the design of a physical table has two goals different from those of normalization: efficient use of secondary storage and data processing speed. Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis

30 Copyright © 2020 Pearson Education, Inc.


99) What is file organization? How does a database designer choose a type of file organization for a specific file? Answer: File organization is a technique for physically arranging the records of a file. If the database designer has a choice, he or she chooses a file organization for a specific file that will provide the following: 1. Fast data retrieval 2. High throughput for processing transactions 3. Efficient use of storage space 4. Protection from failures or data loss 5. Minimal need for reorganization 6. Accommodation of growth 7. Security from unauthorized use Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis 100) Describe the three families of file organization. Answer: In a sequential file organization, the rows in the file are stored in sequence according to a primary key value. To locate a particular row, a program must normally scan the file from the beginning until the desired row is located. A common example of a sequential file is the alphabetic list of persons in the white pages of a phone directory. Sequential files are very fast if you want to process rows sequentially, but they are impractical for random row retrievals. Deleting in an indexed file organization, the rows are stored either sequentially or nonsequentially, and an index is created that allows the application software to locate individual rows. An index is a structure that is used to determine the rows in a file that satisfy some condition. Each entry matches a key value with one or more rows. An index can point to unique rows or to potentially more than one row. An index that allows each entry to point to more than one record is called a secondary key index. One of the most powerful capabilities of indexed file organizations is the ability to create multiple indexes. The main disadvantages to indexed file organizations are the extra space required to store the indexes and the extra time necessary to access and maintain indexes. In a hashed file organization, the location of each row is determined using an algorithm that converts a primary key value into a row address. Although there are several variations of hashed files, in most cases the rows are located nonsequentially as dictated by the hashing algorithm. Difficulty: Difficult AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Synthesis 31 Copyright © 2020 Pearson Education, Inc.


101) The most common style for a logical database is the ________ model. A) Data B) E-R C) Relational database D) Layout Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 102) Typically, logical and physical database design is completed in parallel with other design steps. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 103) Which of the following is a key step in logical database modeling and design? A) Develop a physical data model for each known user interface. B) Compare the consolidated logical database design with the translated E-R model to produce one final logical database model for the application. C) Translate the mental database. D) Combine all tables into one big table. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 104) Which of the following is an example of a primary key? A) Number of children B) Physical address C) Last name D) Driver's license number Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


105) All of these are types of database models except ________. A) Hierarchical model B) Network model C) Matrix model D) Relational model Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 9.1 Describe the database design process, its outcomes, and the relational database model Classification: Concept 106) There are only four normalization rules. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 107) What is the result of normalization? A) Every nonprimary key attribute depends on the whole primary key and nothing but the primary key. B) All tables have a primary key. C) Hierarchal databases are converted to relational databases. D) Each table can only be used by one user. Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Concept 108) Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the customer. More than likely ________ was enforced. A) De-normalization B) Normalization C) Referential integrity D) Relational management Answer: C Difficulty: Difficult AACSB: Information Technology L.O.: 9.2 Describe normalization and the rules for second and third normal form Classification: Synthesis

33 Copyright © 2020 Pearson Education, Inc.


109) All of these are steps to transforming an E-R diagram into normalized relations except ________. A) Represent relationships B) Represent entities C) Merge the relations D) Denormalize the relations Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 110) The procedure for representing relationships depends solely on the degree of the relationship whether unary, binary, or ternary. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 111) What is the relational representation for a binary relationship in the E-R structure? A) Create a relation for the superclass. B) Place the primary key of either entity in the relation for the other entity. C) Create a relation for the primary key. D) Create a relation with non-key attributes. Answer: B Difficulty: Difficult AACSB: Information Technology L.O.: 9.3 Transform an entity-relationship (E-R) diagram into an equivalent set of wellstructured (normalized) relations Classification: Concept 112) If a relationship is redundant and refers to the same entity those relations should be merged to remove the redundancy. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


113) Thinking about attributes, which of the following is an example of a synonym? A) EMP_ID and Employee_ID B) Student_ID and Matriculation_Name C) Billing_Address and Shipping_Address D) Pet_Name and Type_Of_Pet Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 114) Merging relations is the first step in logical database design. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 9.4 Merge normalized relations from separate user views into a consolidated set of wellstructured relations Classification: Concept 115) Physical table design and normalization have the same goals. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 116) A database designer chooses a file organization for a specific file that will provide which of the following? A) Slow data retrieval B) Efficient use of storage space C) Maximum need for reorganization D) Security from authorized users Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 35 Copyright © 2020 Pearson Education, Inc.


117) All of the following are guidelines for choosing indexes for relational databases except ________. A) Specify a unique index for the primary key of each file B) Specify an index for foreign keys C) Specify an index for nonkey fields D) Specify multiple keys for each table Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept 118) An information systems designer can code the data in the file so that they cannot be read unless the reader knows how to decrypt the stored values. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 9.5 Describe physical database design concepts including choosing storage formats for fields in database tables, translating well-structured relations into efficient database tables, explaining when to use different types of file organizations to store computer files, and describing the purpose of indexes and the important considerations in selecting attributes to be indexed Classification: Concept

36 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 10 Designing Forms and Reports 1) A ________ is a business document that contains some predefined data and may include some areas where additional data are to be filled in. A) Report B) Form C) Flow-chart D) Word document Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 2) A ________ is a business document that contains only predefined data; it is a passive document used solely for reading or viewing. A) Report B) Form C) Flowchart D) Word document Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 3) A report typically contains data from many unrelated ________ or transactions. A) Documents B) Form C) Attributes D) Records Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) The ________ report provides details behind the summary values on a key-indicator or exception report. A) Exception B) Scheduled C) Drill-down D) Key-indicator Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 5) The ________ report highlights data that are out of the normal operating range. A) Exception B) Scheduled C) Drill-down D) Key-indicator Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 6) The ________ report provides a summary of critical information on a recurring basis. A) Exception B) Scheduled C) Drill-down D) Key-indicator Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) The ________ report is produced at predefined intervals—daily, weekly, or monthly—to support the routine informational needs of an organization. A) Exception B) Scheduled C) Drill-down D) Key-indicator Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 8) The ________ report has unplanned information requests in which information is gathered to support a non-routine decision. A) Key-indicator B) Exception C) Scheduled D) Ad-hoc Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 9) A paper prototype is a series of mock ________ that can be used to test content, look, and feel, as well as the task flow and other usability factors. A) Papers B) Screens C) Reports D) Forms Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) Increasingly, developers are using tools that can quickly create screen mockups, referred to as ________, to show the placement of information elements on a screen and the space needed for each element. A) Prototypes B) Wireframes C) Forms D) Reports Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 11) A report is a business document that contains some predefined data and may include some areas where additional data are to be filled in. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 12) A form is a business document that contains only predefined data; it is a passive document used solely for reading or viewing. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 13) A report typically contains data from many unrelated records or transactions. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 14) Most forms have a stylized format and are usually simple row and column format. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 4 Copyright © 2020 Pearson Education, Inc.


15) Ad-hoc reports provide details behind the summary values on a key-indicator or exception report. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 16) A key-indicator report provides a summary of critical information on a recurring basis. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 17) Drill-down reports highlight data that are out of the normal operating range. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 18) User-centered design refers to a design approach that involves an understanding of the target audience, their tasks and goals, information needs, experience levels, and so on. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 19) A paper prototype is a simple design to show the placement of information elements on a screen and the space needed for each element. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


20) In addition to providing a look and feel that can be assessed, the paper prototype is also used to test content, task flow, and other usability factors. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 21) Increasingly, developers are using tools that can quickly create screen mockups, referred to as wireframes. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 22) To clearly show how to move forward and backward is related to the balance the layout guideline for the design of forms and reports. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 23) Define form and report. What is the difference between the two? Answer: A form is a business document that contains some predefined data and often includes some areas where additional data are to be filled in. Most forms have a stylized format and are usually not in a simple row and column format. A report is a business document that contains only predefined data; it is a passive document used solely for reading or viewing. Forms allow for input of data, whereas reports are used for reading. There are also different type of reports. Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Synthesis

6 Copyright © 2020 Pearson Education, Inc.


24) Define at least three types of business reports. Answer: Scheduled Reports: Reports produced at predefined intervals—daily, weekly, or monthly—to support the routine informational needs of an organization. Key-Indicator Reports: Reports that provide a summary of critical information on a recurring basis. Exception Reports: Reports that highlight data that are out of the normal operating range. Drill-Down Reports: Reports that provide details behind the summary values on a key-indicator or exception report. Ad-hoc Reports: Unplanned information requests in which information is gathered to support a nonroutine decision. Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Synthesis 25) "Valid date, which identifies on what date (or time) the data in the form or report was accurate," is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 26) "Notify users when on the last page of a multipaged sequence" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


27) "All data and entry fields should be clearly labeled" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 28) "Information should be provided in a manner that is usable without modification" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 29) "Clear and specific titles describing content and use of form or report" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 30) "Adequate spacing and margins should be used" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 8 Copyright © 2020 Pearson Education, Inc.


31) "Only needed information should be displayed" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 32) "Revision date or code to distinguish a form or report from prior versions" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 33) Which of the following is a general guideline about highlighting in a report? A) Highlight should be used conservatively. B) Highlighting should use bright colors. C) There should be some type of highlighting on every page. D) Highlighting should not be used in a report. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 34) "Information should be balanced on the screen or page" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 9 Copyright © 2020 Pearson Education, Inc.


35) "Current date, which identifies when the form or report was generated," is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 36) "Clearly show where we are (e.g., page 1 of 3)" is related to ________ for the design of forms and reports. A) Meaningful titles B) Meaningful information C) A balanced layout D) An easy navigation system Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 37) Offsetting the position of nonstandard information is one of the methods of highlighting information. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 38) Size differences and reverse video are common methods of highlighting information. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 39) Highlighting can be a valuable technique for providing warnings to users regarding possible problems such as unusual data values or an unavailable device. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 10 Copyright © 2020 Pearson Education, Inc.


40) Highlighting is not a valuable technique for notifying users of errors in data entry or processing. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 41) Highlighting can be a valuable technique for drawing attention to keywords, commands, high-priority messages, and data that have changed or gone outside normal operating ranges. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 42) Explain several general guidelines for forms and reports design. Answer: The guidelines can be grouped into four categories: meaningful titles, meaningful information, balanced layout, and easy navigation. Clear and specific titles describe the content and use of the document. By providing a revision date or code, the document is distinguished from earlier versions. A valid date identifies on what date (or time) the data in the form or report was accurate. Only needed information should be displayed; information should be provided in a usable manner without requiring modification. Information should be balanced on the screen or page. Adequate spacing and margins should be used. Data and entry fields should be clearly labeled. Easy navigation is provided by clearly showing how to move forward and backward, clearly showing the user where he or she is, and by notifying the user when he or she is on the last page of a multipaged sequence. Difficulty: Easy AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Synthesis

11 Copyright © 2020 Pearson Education, Inc.


43) What are some ways to highlight information? What are the general guidelines when considering highlighting? Answer: Methods of highlighting include: Blinking and audible tones, Color differences, Intensity differences, Size differences, Font differences, Reverse video, Boxing, Underlining, All capital letters, Offsetting the position of nonstandard information. Highlighting should be used to enhance user experience not be a distraction. In general, highlighting should be used sparingly to draw the user to or away from certain information and to group together certain information. There are several situations when highlighting can be a valuable technique for conveying special information: • Notifying users of errors in data entry or processing; • Providing warnings to users regarding possible problems such as unusual data values or an unavailable device • Drawing attention to keywords, commands, high-priority messages, and data that have changed or gone outside normal operating ranges. A general guideline resulting from this research is that highlighting should be used conservatively. Once a response is made, these highlights should be turned off. Additionally, highlighting methods should be consistently used and selected based upon the level of importance of the emphasized information. Difficulty: Difficult AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Synthesis 44) Which of the following is a problem from using a color in forms and reports? A) Soothes or strikes the eye. B) Printing or conversion to other media may not easily translate. C) Evokes more emotional reactions. D) Draws attention to warnings. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept 45) Which of the following is a problem caused by using a color in forms and reports? A) Emphasizes the logical organization of information. B) Facilitates subtle discriminations in complex displays. C) Color fidelity may degrade on different displays. D) Accents an uninteresting display. Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


46) The benefits of color only seem to apply if the information is first provided to the user in the most appropriate presentation format. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept 47) Emphasis on the logical organization of information is not a benefit of using color. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept 48) Facilitating subtle discriminations in complex displays is a benefit of using color. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept 49) "Color pairings may wash out or cause problems for some users" is a problem of using color. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept 50) Describe four issues from using color. Answer: Four problems were identified in the textbook, including color pairings may wash out or cause problems for some users, resolution may degrade with different displays, color fidelity may degrade on different displays, and printing or conversion to other media may not easily translate. Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Synthesis

13 Copyright © 2020 Pearson Education, Inc.


51) Displaying text in mixed uppercase and lowercase and using conventional punctuation is related to which of the guidelines for displaying text? A) Spacing B) Justification C) Hyphenation D) Case Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 52) Using acronyms only when they are widely understood by users and are significantly shorter than the full text is related to which of the guidelines for displaying text? A) Case B) Abbreviations C) Justification D) Spacing Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 53) Left-justifying text and leaving a ragged-right margin is related to which of the guidelines for displaying text? A) Hyphenation B) Spacing C) Justification D) Abbreviations Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


54) In business-related systems, ________ is becoming increasingly important as text-based applications such as electronic mail, bulletin boards, and information services are more widely used. A) Textual output B) A form C) A report D) A chart Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 55) "Break long sequences of alphanumeric data into small groups of three to four characters each" is related to which guideline for displaying tables and lists? A) Meaningful titles B) Formatting columns, rows, and text C) Use meaningful labels D) Formatting numeric, textual, and alphanumeric data Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 56) "Use same family of typefaces within and across displays and reports" is related to which guideline for displaying tables and lists? A) Meaningful titles B) Formatting columns, rows, and text C) Use meaningful labels D) Formatting numeric, textual, and alphanumeric data Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


57) "Redisplay labels when the data extend beyond a single screen or page" is related to which guideline for displaying tables and lists? A) Meaningful titles B) Formatting columns, rows, and text C) Use meaningful labels D) Formatting numeric, textual, and alphanumeric data Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 58) "Left-justify textual data, use short line length, usually 30-40 characters per line" is related to which guideline for displaying tables and lists? A) Formatting numeric, textual, and alphanumeric data B) Use meaningful labels C) Formatting columns, rows, and text D) Meaningful titles Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 59) "Use a single typeface, except for emphasis" is related to which guideline for displaying tables and lists? A) Use meaningful labels B) Formatting numeric, textual, and alphanumeric data C) Formatting columns, rows, and text D) Meaningful titles Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 60) "Right-justify numeric data and align columns by decimal points or other delimiter" is related to which guideline for displaying tables and lists? A) Use meaningful labels B) Formatting numeric, textual, and alphanumeric data C) Formatting columns, rows, and text D) Meaningful titles Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 16 Copyright © 2020 Pearson Education, Inc.


61) "Similar information displayed in multiple columns should be sorted vertically" is related to which guideline for displaying tables and lists? A) Formatting columns, rows, and text B) Formatting numeric, textual, and alphanumeric data C) Use meaningful labels D) Meaningful titles Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 62) "All columns and rows should have meaningful labels" is related to which guideline for displaying tables and lists? A) Formatting columns, rows, and text B) Formatting numeric, textual, and alphanumeric data C) Meaningful titles D) Use meaningful labels Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 63) "Place a blank line between every five rows in long columns" is related to which guideline for displaying tables and lists? A) Formatting numeric, textual, and alphanumeric data B) Formatting columns, rows, and text C) Use meaningful labels D) Meaningful titles Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


64) "Avoid overly fancy fonts and sort in a meaningful order" is related to which guideline for displaying tables and lists? A) Use meaningful labels B) Formatting numeric, textual, and alphanumeric data C) Formatting columns, rows, and text D) Meaningful titles Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 65) According to guidelines for selecting tables versus graphs, we should use tables for ________. A) Reading individual data values B) Providing a quick summary of data C) Detecting trends over time D) Forecasting activities Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 66) "Use abbreviations and acronyms only when they are widely understood by users and are significantly shorter than the full text" is not a guideline for displaying text. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 67) When displaying textual information, we should also be careful not to hyphenate words between lines or use obscure abbreviations and acronyms. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


68) List five guidelines for displaying text. Answer: The guidelines presented in the textbook include: (1) text should be displayed in mixed upper and lower case and use conventional punctuation; (2) when possible, double spacing should be used; (3) text should be left-justified; (4) words should not be hyphenated between lines; and (5) abbreviations and acronyms should be used only when they are widely understood by users and are significantly shorter than the full text. Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Synthesis 69) What are the general guidelines for displaying tables and lists? Provide an example for each guideline. Answer: Three categories of guidelines were provided in the textbook, including using meaningful labels; formatting columns, rows, and text; and formatting numeric, textual, and alphanumeric data. Table 10-7 provides specific guidelines for each category. Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Synthesis 70) What are the guidelines for selecting tables versus graphs? Answer: Use tables for: Reading individual data values. Use graphs for: Providing a quick summary of data; detecting trends over time; comparing points and patterns of different variables; forecasting activities; reporting vast amounts of information when relatively simple impressions are to be drawn. Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Synthesis 71) What are some considerations when printing a paper report? Answer: When a report is produced on paper there are some additional things to consider. One consideration is type of printer. Laser printer and ink jet printers produce a report that is identical to what is on the screen. The general design guidelines to create a report with high usability guidelines can be used. Another type of printer is an impact printer. Impact printers are fast, inexpensive, and reliable but they have a limited ability to produce graphics. Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Synthesis

19 Copyright © 2020 Pearson Education, Inc.


72) ________ is an overall evaluation of how a system performs in supporting a particular user for a particular task. A) Speed B) Accuracy C) Usability D) Satisfaction Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.5 Explain how to assess usability and describe how variations in users, tasks, technology, and environmental characteristics influence the usability of forms and reports Classification: Concept 73) The usability of information displayed in tables and alphanumeric lists is likely to be much more heavily influenced by effective layout than most other types of information display. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.5 Explain how to assess usability and describe how variations in users, tasks, technology, and environmental characteristics influence the usability of forms and reports Classification: Concept 74) What is usability? Identify three characteristics for assessing usability. Answer: Usability is an overall evaluation of how a system performs in supporting a particular user for a particular task. Speed, accuracy, and satisfaction are the three characteristics. Difficulty: Moderate AACSB: Information Technology L.O.: 10.5 Explain how to assess usability and describe how variations in users, tasks, technology, and environmental characteristics influence the usability of forms and reports Classification: Synthesis 75) Which usability factor specifies that outputs should be self-explanatory and not require users to remember information from prior outputs in order to complete a task? A) Consistency B) Clarity C) Format D) Flexibility Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


76) Which usability factor specifies that information should be viewed and retrieved in a manner most convenient to the user? A) Clarity B) Organization C) Format D) Flexibility Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 77) Which usability factor specifies that formatting should be designed with an understanding of the task being performed and the intended user? A) Clarity B) Organization C) Format D) Flexibility Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 78) Which usability factor specifies that information format should be consistent between entry and display, and format should distinguish each piece of data and highlight, not bury, important data? A) Format B) Clarity C) Consistency D) Flexibility Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


79) Which usability factor specifies that there should be consistent use of terminology, abbreviations, formatting, titles, and navigation within and across outputs? A) Format B) Clarity C) Consistency D) Flexibility Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 80) ________ is a usability dimension concerned with how quickly users can perform tasks once they know how to perform them. A) Learnability B) Efficiency C) Error-rate D) Memorability Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 81) ________ is a usability dimension concerned with how many errors a user might encounter and how easy it is to recover from those errors. A) Memorability B) Satisfaction and aesthetics C) Efficiency D) Error rate Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


82) ________ is a usability dimension concerned with how difficult it is for the user to perform a task for the first time. A) Learnability B) Memorability C) Satisfaction and aesthetics D) Efficiency Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 83) ________ is a usability dimension concerned with how easy it is to remember how to accomplish a task when revisiting the system after a period of time. A) Satisfaction and aesthetics B) Efficiency C) Memorability D) Error-rate Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 84) ________ is a usability dimension concerned with how enjoyable a system's visual appeal is and how enjoyable the system is to use. A) Efficiency B) Satisfaction and aesthetics C) Error-rate D) Memorability Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


85) When designing forms and reports, which characteristic focuses on issues related to experience, skills, motivation, education, and personality that should be considered? A) Environment B) System C) Task D) User Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 86) When designing forms and reports, which characteristic focuses on the platform on which the system is constructed that will influence interaction styles and devices? A) System B) Task C) User D) Environment Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 87) When designing forms and reports, which characteristic focuses on social issues such as the users' status and role that should be considered in addition to environmental concerns such as lighting, sound, task interruptions, temperature, and humidity? A) System B) Task C) Environment D) User Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


88) Which error is addressed by the recommendation to make sure that when using standard design items, they behave in accordance with major interface design standard? A) Fixed-formatted text B) Nonstandard use of GUI widgets C) Outdated information D) Bleeding-edge technology Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 89) Which error is addressed by the recommendation to avoid fixed-formatted text that requires users to scroll horizontally to view content or links? A) Outdated information B) Nonstandard use of GUI widgets C) Slow download times D) Fixed-formatted text Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 90) Which error is addressed by the recommendation to make sure the site is continuously updated so that users "feel" that the site is regularly maintained and updated? A) Fixed-formatted text B) Scrolling test and looping animations C) Outdated information D) Slow download times Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


91) Which error is addressed by the recommendation to make sure that users don't need the latest browsers or plug-ins to view the site? A) Outdated information B) Bleeding-edge technology C) Scrolling test and looping animations D) Nonstandard use of GUI widgets Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 92) Which error is addressed by the recommendation to avoid using large images, lots of images, unnecessary animations, or other time-consuming content that will slow the downloading time of a page? A) Slow download times B) Bleeding-edge technology C) Nonstandard use of GUI widgets D) Scrolling test and looping animations Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 93) Which error is addressed by the recommendation to avoid requiring users to scroll down a page to view information, especially navigational controls? A) Bleeding-edge technology B) Anything that looks like advertising C) Scrolling test and looping animations D) Displaying long lists as long pages Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


94) Which error is addressed by the recommendation to make sure that one avoids designing any legitimate information in a manner that resembles advertising? A) Bleeding-edge technology B) Anything that looks like advertising C) Scrolling test and looping animations D) Displaying long lists as long pages Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 95) A style-sheet based HTML is a Web design approach that separates content from the way in which it is formatted and presented, making ongoing maintenance easier and site-wide consistency much higher. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 96) In terms of user friendliness and usability, what are several methods for assessing usability? Answer: • Learnability–How difficult is it for a user to perform a task for the first time? • Efficiency–How quickly can users perform tasks once they know how to perform them? • Error rate–How many errors might a user encounter, and how easy it is to recover from those errors? • Memorability–How easy is it to remember how to accomplish a task when revisiting the system after some period of time? • Satisfaction and aesthetics–How enjoyable is the system's visual appeal and how enjoyable is it to use? Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Synthesis

27 Copyright © 2020 Pearson Education, Inc.


97) What are some guidelines to take into consideration when designing forms and reports? Answer: User–Issues related to experience, skills, motivation, education, and personality should be considered. Task–Tasks differ in amount of information that must be obtained from or provided to the user. Task demands such as time pressure, cost of errors, and work duration (fatigue) will influence usability. System–The platform on which the system is constructed will influence interaction styles and devices. Environment–Social issues such as the users' status and role should be considered in addition to environmental concerns such as lighting, sound, task interruptions, temperature, and humidity. The creation of usable forms and reports may necessitate changes in the users' physical work facilities. Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Synthesis 98) What is meant by lightweight graphics and why is it a good idea to them? Answer: A technique that can assist in making pages load quickly is the use of lightweight graphics. Lightweight graphics are small, simple images that allow a page to load as quickly as possible. Experienced web designers have found that customers are not willing to wait at each hop of navigation for a page to load, just so they have to click and wait again. The quick feedback that a website with lightweight graphics can provide will help to keep customers at the WebStore longer. Difficulty: Difficult AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Synthesis 99) List the nine common errors that occur when designing the layout of Web pages. Answer: The nine common errors are nonstandard use of GUI widgets, anything that looks like advertising, bleeding-edge technology, scrolling test and looping animations, nonstandard link colors, outdated information, slow download times, fixed-formatted text, and displaying long lists as long pages. Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Synthesis

28 Copyright © 2020 Pearson Education, Inc.


100) What is stylesheet-based HTML and why is it useful? Answer: Stylesheet-based HTML is a Web design approach that separates content from the way in which it is formatted and presented, making ongoing maintenance easier and site-wide consistency much higher. Stylesheet-based HTML design allows the content of a Web page to remain separate from the way it is formatted. By separating the content from its formatting information, it is much easier to update the look and feel of the Web site and make sure that all pages have a similar appearance. By using stylesheets, we not only get all the pages looking the same, we can also update the look of the Web site by making changes in a few stylesheets, rather than in hundreds of Web pages. Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Synthesis 101) If you are using a computer-based information system and the business document only contains predefine data, you are viewing a ________. A) Report B) Form C) Flow-chart D) Word document Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 102) Daniel was surprised his store ran out of marshmallows so quickly. This typically does not happen during the spring, so he runs a(n) ________ to gather unplanned information to support if he should stock up on marshmallows. A) Process B) Ad-hoc report C) Key-indicator report D) User centered report Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


103) Joshua wants to make sure the new order entry system is useful to the customer service personnel. He decides to interview the target audience because he believes in ________. A) Master reporting B) Full disclosure C) User-centered design D) Democracy Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 104) The evolution of automated design tools has diminished the need for coding sheets. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 105) All of the following are sections in the design specification except ________. A) Narrative overview B) Sample design C) Testing and usability assessment D) Physical database design Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.1 Explain the process of designing forms and reports and the deliverables for their creation Classification: Concept 106) A definitive set of rules for delivering every type of information to users has been defined. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


107) All of the following are general guidelines for the design of reports and forms except ________. A) Meaningful titles B) Display all available information C) A balanced layout D) An easy navigation system Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.2 Apply the general guidelines for formatting forms and reports Classification: Concept 108) Which of the following is a benefit of using color? A) Strikes the eye B) Color blindness C) Printing may not easily translate. D) Deemphasizes logical organization of information Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 10.3 Use color and know when color improves the usability of information Classification: Concept 109) Billy wanted to use YW for “your welcome” when answering users automatically. Gail was concerned that YW was not common and opposed this because ________ are discouraged when they are not commonly known. A) Mixed cases B) Abbreviations C) Justifications D) Spacings Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 110) Placing a blank line between every five rows in long columns is a general guideline for ________. A) Using meaningful labels B) Formatting text C) Formatting numeric data D) Formatting columns, rows, and text Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 31 Copyright © 2020 Pearson Education, Inc.


111) Because all printers accurately reproduce the output on the screen a designer should not be concerned about the design of paper versus electronic reports. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 10.4 Format text, tables, and lists effectively Classification: Concept 112) Usability means that you design should assist, not hinder, user performance. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 10.5 Explain how to assess usability and describe how variations in users, tasks, technology, and environmental characteristics influence the usability of forms and reports Classification: Concept 113) All of the following are characteristics for consideration when designing forms and reports except ________. A) The user B) The task C) Inefficiency D) The environment Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 10.5 Explain how to assess usability and describe how variations in users, tasks, technology, and environmental characteristics influence the usability of forms and reports Classification: Concept 114) Because customers interact with a company in multiple ways, designers should not worry about the design of forms and reports. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 115) Stylesheets are helpful if a designer wants to have different formatting on each page. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 10.6 Discuss guidelines for the design of forms and reports for Internet-based electronic commerce systems Classification: Concept 32 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 11 Designing Interfaces and Dialogues 1) Which of the following is a method by which users interact with an information system? A) Report B) Interface C) Form D) Database Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Concept 2) All human-computer interfaces must have an interaction style and use some ________ device(s) for supporting this interaction. A) Database B) Network C) Hardware D) Software Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Application 3) Command language interaction does not require users to remember command syntax and semantics. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Concept 4) A single menu has obvious advantages over a command language but may provide little guidance beyond invoking the command. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


5) An icon may also look like a button that, when selected or depressed, causes the system to take an action relevant to that form, such as cancel, save, edit a record, or ask for help. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Concept 6) Define and identify the five most widely used interaction methods. Answer: The five interaction methods identified in the text are command language, menu, form, object, and natural language. Command language interaction refers to a human-computer interaction method where explicit statements are entered into a system to invoke operations. While this type of interaction places a substantial burden on the user (remembering names, syntax, and operations), command languages are good for experienced users, for systems with a limited command set, and for rapid interaction with the system. Menu interaction refers to a human-computer interaction method where a list of system options is provided and a specific command is invoked by user selection of a menu option. Menus have become the most widely used interface. The design and complexity of menus differs due to the capabilities of the development environment, developer skills, and size and complexity of the system. Form interaction refers to a highly intuitive human-computer interaction method where data fields are formatted in a manner similar to paper-based forms. This method is the most commonly used method for data entry and retrieval in business-based systems. Object-based interaction is a human-computer interaction method where symbols are used to represent commands or functions. The implementation of object-based interaction is usually through the use of icons. Natural language interaction is a human-computer interaction method where inputs to and outputs from a computer-based application are in a conventional speaking language such as English. Currently, this is not as viable an interaction method as the other methods. Difficulty: Difficult AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Synthesis 7) Under which design specification category for interfaces and dialogues do environmental characteristics appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


8) Under which design specification category for interfaces and dialogues do form/report designs appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Application 9) Under which design specification category for interfaces and dialogues do testing procedures appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Application 10) Under which design specification category for interfaces and dialogues does interface/dialogue name appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 11) Under which design specification category for interfaces and dialogues does time to learn appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 3 Copyright © 2020 Pearson Education, Inc.


12) Under which design specification category for interfaces and dialogues do user characteristics appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 13) Under which design specification category for interfaces and dialogues do dialogue sequence diagram(s) and narrative description appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Application 14) Under which design specification category for interfaces and dialogues do task characteristics appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) Under which design specification category for interfaces and dialogues do user satisfaction and other perceptions appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 16) Under which design specification category for interfaces and dialogues does speed of performance appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 17) Under which design specification category for interfaces and dialogues do system characteristics appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 18) Under which design specification category for interfaces and dialogues do rate of errors and testing objectives appear? A) Narrative Overview B) Interface/Dialogue Designs C) Testing and Usability Assessment D) Database Design Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 5 Copyright © 2020 Pearson Education, Inc.


19) ________ is a human-computer interaction method whereby users enter explicit statements into a system to invoke operations. A) Menu interaction B) Form interaction C) Object-based interaction D) Command language interaction Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 20) ________ is a human-computer interaction method in which a list of system options is provided and a specific command is invoked by user selection of a menu option. A) Menu interaction B) Form interaction C) Object-based interaction D) Command language interaction Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 21) Which interaction places a substantial burden on the user to remember names, syntax, and operations? A) Menu interaction B) Form interaction C) Object-based interaction D) Command language interaction Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


22) A ________ is simply a list of options; when an option is selected by the user, a specific command is invoked. A) Form B) Button C) Menu D) List Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 23) A ________ is a menu-positioning method that places a menu near the current cursor position. A) Pop-down menu B) Pop-up menu C) Drop-up menu D) Drop-down menu Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 24) Which menu method is also known as a dialogue box? A) Pop-down menu B) Pop-up menu C) Drop-up menu D) Drop-down menu Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 25) Which menu-positioning method places the access point of the menu near the top line of the display; when accessed, menus open by dropping down onto the display? A) Pop-down menu B) Pop-up menu C) Drop-up menu D) Drop-down menu Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 7 Copyright © 2020 Pearson Education, Inc.


26) A mouse is the most accurate device for a data entry task. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 27) A touch screen is the most accurate device for a text selection task. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 28) When designing the navigation procedures within our system, flexibility and consistency are primary concerns. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 29) To minimize data entry errors and user frustration, never require the user to enter information that is already available within the system or information that can be easily computed by the system. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


30) What are the three design specifications used in the design of interfaces and dialogues? Include at least one sub-specification. Answer: The design specifications include (sub-specifications are lettered): 1. Narrative Overview a. Interface/Dialogue Name; b. User Characteristics; c. Task Characteristics; d. System Characteristics; e. Environmental Characteristics 2. Interface/Dialogue Designs a. Form/Report Designs b. Dialogue Sequence Diagram(s) and Narrative Description) 3. Testing and Usability Assessment a. Testing Objectives, b. Testing Procedures c. Testing Results Difficulty: Moderate AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Synthesis 31) What are the guidelines for menu design? Answer: The guidelines are wording, organization, length, selection, and highlighting. Following is each specification in more detail. Wording • Each menu should have a meaningful title. • Command verbs should clearly and specifically describe operations. • Menu items should be displayed in mixed uppercase and lowercase letters and have a clear, unambiguous interpretation. Organization • A consistent organizing principle should be used that relates to the tasks the intended users perform. Length • The number of menu choices should not exceed the length of the screen. • Submenus should be used to break up exceedingly long menus. Selection • Selection and entry methods should be consistent and reflect the size of the application and sophistication of the users. • How the user is to select each option and the consequences of each option should be clear. Highlighting • Highlighting should be minimized and used only to convey selected options or unavailable options. Difficulty: Difficult AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Synthesis 9 Copyright © 2020 Pearson Education, Inc.


32) List and identify eight common devices for interacting with an information system. Answer: The common devices for interacting with an information system are keyboard, mouse, joystick, trackball, touch screen, light pen, graphics tablet, and voice. Keyboards require users to push an array of small buttons that represent symbols that are then translated into words and commands. The mouse is a small plastic box that users push across a flat surface and whose movements are translated into cursor movement on a computer display. The joystick is a small vertical lever mounted on a base that steers the cursor on a computer display. A trackball is a sphere mounted on a fixed base that steers the cursor on a computer display. On a touch sensitive screen, selections are made by touching a computer display. With a light pen, selections are made by pressing a pen-like device against the screen. Using a graphics tablet involves moving a pen-like device across a flat tablet to steer the cursor on a computer display. The voice device captures spoken words. Difficulty: Difficult AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Synthesis 33) "Command verbs should clearly and specifically describe operations" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Highlighting Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 34) "A consistent organizing principle should be used that relates to the tasks the intended users perform" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


35) "Submenus should be used to break up exceedingly long menus" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 36) "How the user is to select each option and the consequences of each option should be clear" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 37) "Menu items should be displayed in mixed uppercase and lowercase letters and have a clear, unambiguous interpretation" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) "Entry methods should be consistent and reflect the size of the application and sophistication of the users" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 39) "The number of menu choices should not exceed the length of the screen" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 40) "Related options should be grouped together, and the same option should have the same wording and codes each time it appears" falls under which category for menu design guidelines? A) Organization B) Selection C) Wording D) Length Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


41) Which menus have become very popular in recent years because they provide consistency in menu location and operation among applications and efficiently use display space? A) Pop-down menu B) Pop-up menu C) Drop-up menu D) Drop-down menu Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 42) Which interaction is a highly intuitive human-computer interaction method whereby data fields are formatted in a manner similar to paper-based forms? A) Menu interaction B) Form interaction C) Object-based interaction D) Command language interaction Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 43) Which interaction is a human-computer interaction method in which symbols are used to represent commands or functions? A) Menu interaction B) Form interaction C) Object-based interaction D) Command language interaction Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


44) The premise of ________ is to allow users to fill in the blanks when working with a system. A) Menu interaction B) Form interaction C) Object-based interaction D) Command language interaction Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 45) The most common method for implementing ________ is through the use of icons. A) Menu interaction B) Form interaction C) Object-based interaction D) Natural language interaction Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 46) A(n) ________ is a graphical picture that represents specific functions within a system. A) Icon B) Button C) Menu D) Form Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 47) Transmitting the screen to the application program comes under editing capabilities for data entry screen. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


48) "Never require data that are already online or that can be computed," relates to captioning guidelines for structuring data entry fields. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 49) One objective of interface design is to reduce data entry errors. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 50) List the data entry screen functional capabilities. List at least two functions per capability. Answer: Cursor Control Capabilities: Move the cursor forward to the next data field. Move the cursor backward to the previous data field. Move the cursor to the first, last, or some other designated data field. Move the cursor forward one character in a field. Move the cursor backward one character in a field. Editing Capabilities: Delete the character to the left of the cursor. Delete the character under the cursor. Delete the whole field. Delete data from the whole form (empty the form). Exit Capabilities: Transmit the screen to the application program. Move to another screen/form. Confirm the saving of edits or go to another screen/form. Help Capabilities: Get help on a data field. Get help on a full screen/form. Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Synthesis

15 Copyright © 2020 Pearson Education, Inc.


51) Describe the guidelines for structuring data entry fields. Answer: Entry–Never require data that are already online or that can be computed. Defaults–Always provide default values when appropriate. Units–Make clear the type of data units requested for entry. Replacement–Use character replacement when appropriate. Captioning–Always place a caption adjacent to fields. Format–Provide formatting examples when appropriate. Justify–Automatically justify data entries; numbers should be right justified and aligned on decimal points, and text should be left justified. Help–Provide context-sensitive help when appropriate. Difficulty: Moderate AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Synthesis 52) ________ is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a conventional spoken language such as English. A) Menu interaction B) Form interaction C) Object-based interaction D) Natural language interaction Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 53) A small vertical lever mounted on a base that steers the cursor on a computer display and provides similar functionality to a mouse is known as a ________. A) Mouse B) Joystick C) Light pen D) Trackball Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


54) A sphere mounted on a fixed base that steers the cursor on a computer display is known as a ________. A) Mouse B) Joystick C) Light pen D) Trackball Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 55) A small plastic box that users push across a flat surface and whose movements are translated into cursor movement on a computer display is known as a ________. A) Mouse B) Joystick C) Light pen D) Trackball Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 56) When using a ________, users push an array of small buttons that represent symbols that are then translated into words and commands. A) Graphics tablet B) Mouse C) Keyboard D) Touch screen Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


57) "Reversing the sequence of one or more characters in a field," is related to the transcripting data error type. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 58) "Test to make sure values come from set of standard values," is part of the expected values validation test. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 59) "Test where an extra digit is added to a numeric field in which its value is derived using a standard formula," is part of the self-checking digits validation test. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 60) "Test for too few or too many characters," is part of the values validation test. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 61) Range validation test is done to ensure data are within proper range of values. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


62) A common method used to enhance the validity of entering batches of data records is to create an audit trail of the entire sequence of data entry, processing, and storage. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 63) Providing status information during processing operations is especially important if the operation takes longer than a second or two. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 64) List and define four sources of data errors. Answer: Sources of data errors include appending, truncating, transcripting, and transposing. Appending is the addition of extra characters to a field. Losing characters from a field is called truncating. Transcripting is defined as entering invalid data into a field. Transposing involves reversing the sequence of one or more characters in a field. Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Synthesis 65) Briefly define ten validation tests and techniques used to enhance the validity of data input. Answer: The ten validation tests and techniques are: Class or composition, combinations, expected values, missing data, pictures/templates, range, reasonableness, self-checking digits, size, and values. The class or composition test checks to assure that data are of proper type. The combinations test checks to see if the value combinations of two or more data fields are appropriate or make sense. The expected values test checks to see if data are what is expected. The missing data test checks for existence of data items in all fields of a record. The picture/templates test assures that data conform to a standard format. The range test assures that data are within a proper range of values. The reasonableness test assures that data are reasonable for a situation. The self-checking digits test is a test where an extra digit is added to a numeric field in which its value is derived using a standard formula. Testing for too few or too many characters is referred to as a size test. A values test checks to make sure values come from a set of standard values. Difficulty: Difficult AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Synthesis 19 Copyright © 2020 Pearson Education, Inc.


66) What are the guidelines for designing usable help? Answer: The guidelines are simplicity, organize, and show. Simplicity: Use short, simple wording, common spelling, and complete sentences. Give users only what they need to know, with the option to find additional information. Organize: Use lists to break information into manageable pieces. Show: Provide examples of proper use and the outcomes of such use. Difficulty: Easy AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Synthesis 67) Why would a user need help? List the types of help available. Answer: A user would need help because the user does not know what to do next, does not understand what is being requested, or does not know how to ask the requested information. The types of help are help on help, help on concepts, help on procedures, help on messages, help on menus, help on function keys, help on commands, and help on words. Difficulty: Moderate AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Synthesis 68) When using a ________, selections are made by touching a computer display. A) Graphics tablet B) Mouse C) Light pen D) Touch screen Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 69) When using a ________, selections are made by pressing a pen-like device against the screen. A) Trackball B) Mouse C) Light pen D) Touch screen Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


70) Which device is a suitable replacement for a mouse when work space for a mouse is not available? A) Trackball B) Mouse C) Light pen D) Touch screen Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 71) When using a ________, selections are made by pressing a button or by pressing the pen against it. A) Graphics tablet B) Mouse C) Light pen D) Touch screen Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 72) Issues with speed are typically experienced when using which of the following devices? A) Graphics tablet B) Mouse C) Keyboard D) Touch screen Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 73) User fatigue is a potentially high usability problem associated with which device? A) Graphics tablet B) Mouse C) Keyboard D) Touch screen Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


74) Error messages should appear in roughly the same format and placement each time so that they are recognized as error messages and not as some other information. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 75) "What is a customer record?" is an example of "help on words" type of help. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 76) The process of designing the overall sequences that users follow to interact with an information system is called dialogue design. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 77) List the eight guideline categories for the design of human-computer dialogues. Answer: The eight categories are consistency, shortcuts and sequence, feedback, closure, error handling, reversal, control, and ease. Difficulty: Easy AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Synthesis 78) What is dialogue diagramming? Define the components of this technique. Answer: A formal method for designing and representing dialogues is dialogue diagramming. Dialogue diagrams have only one symbol, a box with three sections; each box represents one display within a dialogue. The three sections of the box are used as follows: 1. Top: Contains a unique display reference number used by other displays for referencing it. 2. Middle: Contains the name or description of the display. 3. Bottom: Contains display reference numbers that can be accessed from the current display. All lines connecting the boxes within dialogue diagrams are assumed to be bidirectional and thus do not need arrowheads to indicate direction. This means that users are allowed to move forward and backward between adjacent displays. Difficulty: Easy AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Synthesis

22 Copyright © 2020 Pearson Education, Inc.


79) List the nine common errors that might occur when designing the interface and dialogues of Websites. Answer: The nine common errors mentioned in the textbook are: Opening a new browser window, breaking or slowing down the back button, complex URLs, orphan pages, scrolling navigation pages, lack of navigation support, hidden links, links that do not provide enough information, and buttons that provide no click feedback. Difficulty: Easy AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Synthesis 80) Which of the following errors can occur when adding additional characters to a field? A) Transposing B) Appending C) Transcripting D) Truncating Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 81) Which test is done to ensure that data are of proper type, e.g., all numeric, all alphabetic, all alphanumeric? A) Class B) Reasonableness C) Range D) Expected Values Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 82) Which test is done to ensure that data conform to a standard format? A) Self-Checking Digits B) Missing Data C) Templates D) Expected Values Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 23 Copyright © 2020 Pearson Education, Inc.


83) Which test is done to check for existence of data items in all fields of a record? A) Self-Checking Digits B) Missing Data C) Templates D) Expected Values Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 84) "Provide examples of proper use and the outcomes of such use," is related to which guideline for designing usable help? A) Simplicity B) Manage C) Organize D) Show Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 85) "Use lists to break information into manageable pieces," is related to which guideline for designing usable help? A) Simplicity B) Manage C) Organize D) Show Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


86) "Use short, simple wording, common spelling, and complete sentences and give users only what they need to know, with the option to find additional information," is related to which guideline for designing usable help? A) Simplicity B) Manage C) Organize D) Show Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 87) "What does 'Graphics' mean?" is an example of a question asked during which type of help? A) Help on help B) Help on concepts C) Help on words D) Help on menu Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 88) "Dialogues should be logically grouped and have a beginning, middle, and end," is related to which guideline for the design of human-computer dialogues? A) Control B) Consistency C) Closure D) Reversal Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


89) "It should be a simple process for users to enter information and navigate between screens," is related to which guideline for the design of human-computer dialogues? A) Control B) Ease C) Feedback D) Reversal Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 90) Which common property of windows and forms in a GUI environment requires users to resolve the request for information before proceeding? A) Maximize B) Minimize C) Movable D) Modality Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 91) Which common property of windows and forms in a GUI environment allows users to shrink a window or form to an icon? A) Maximize B) Minimize C) Movable D) Modality Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


92) "Avoid using image buttons that don't clearly change when being clicked," is a tip to avoid which error? A) Complex URLs B) Orphan Pages C) Buttons That Provide No Click Feedback D) Lack of Navigation Support Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 93) "Avoid placing navigational links below where a page opens because many users may miss these important options that are below the opening window," is a tip to avoid which error? A) Opening New Browser Window B) Scrolling Navigation Pages C) Buttons That Provide No Click Feedback D) Lack of Navigation Support Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 94) Building dialogue prototypes and assessing usability are mandatory activities. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 95) System Menu is a property of windows and forms in a GUI environment that requires users to resolve the request for information before proceeding. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


96) Maximize is a property of windows and forms in a GUI environment that allows users to expand a window or form to a full-size screen. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 97) “Avoid having pages with no "parent" that can be reached by using a back button” is a tip to avoid orphan pages. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 98) What are the four contributing factors that are believed to have led to the decline of interface design? Answer: One reason is there are countless nonprofessional developers designing commercial Web applications. In addition to this, there are four other important contributing factors 1. The Web's single "click-to-act" method of loading static hypertext documents. 2. Limited capabilities of most Web browsers to support finely grained user interactivity. 3. Limited agreed-upon standards for encoding Web content and control mechanisms. 4. Lack of maturity of Web scripting and programming languages as well as limitations in commonly used Web GUI component libraries. Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Synthesis 99) What are cookie crumbs and why are they used? Answer: Cookie crumbs are "tabs" or sequenced links on a Web page that show a user where he or she is within a site and where he or she has been. These tabs or sequenced links are hypertext links that can be used to quickly move backward in the site. Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Synthesis

28 Copyright © 2020 Pearson Education, Inc.


100) Interface design focuses on how information is provided to and captured from users. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Concept 101) For interface and dialogue designs, one additional subsection is included: a section outlining the dialogue sequence which is ________. A) The ways a user moves from one display to another B) A narrative overview C) A sample design D) Testing and usability assessment Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.1 Explain the process of designing interfaces and dialogues and the deliverables for their creation Classification: Concept 102) There are only one or two approaches for designing user interface. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept 103) Daniel wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations within the system and cannot always remember the commands. A) Narrative overview B) Command language interaction C) Database design D) Time to learn Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.2 Contrast and apply several methods for interacting with a system Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


104) All of the following are guidelines for menu design except ________. A) Wording B) Organization C) Selection D) Meaningful to the user Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 105) Drop-downs have become unpopular in recent years because there is no consistency in menu placement. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 106) Natural language interaction can be applied to ________. A) Hardware selection B) Voice entry systems C) Menu placement D) Highlighting techniques Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept 107) Natural language interaction can only be implemented in English. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 11.3 Describe and apply the general guidelines for designing interfaces and specific guidelines for layout design, structuring data entry fields, providing feedback, and system help Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


108) All of the following are guidelines for the design of human-computer dialogues except ________. A) Closure B) Error handling C) Native language D) Ease Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 109) In the dialogue diagramming box, the bottom section contains ________. A) Display reference numbers that can be accessed from the current display B) The name of the display C) The description of the display D) How many dialogues to create Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 11.4 Design human-computer dialogues and understand how dialogue diagramming can be used to design dialogues Classification: Concept 110) Becoming an expert user of the GUI environment is one of the rules to becoming an effective GUI designer. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 111) Cam is working on the GUI environment for a new project. He told his team to make sure the GUI has the ability to allow a form to have a ________ to directly access the save function. A) System menu B) Resizable menu C) Modality D) Touch screen Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


112) Graphical user interface (GUI) environments are the de facto standard for human-computer interaction. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 11.5 Design graphical user interfaces Classification: Concept 113) The growth of the Web has resulted in a big step forward for interface design. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 114) ________ is a common error when design the interface and dialogues of websites. A) Simple URLs B) Hidden links C) Navigation support D) Opening pages within website Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept 115) ________ is the technique of placing “tabs” that show a user where he or she is within a site and where he or she has been. A) Control B) Ease C) Cookie Crumbs D) Reversal Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 11.6 Discuss guidelines for the design of interfaces and dialogues for Internet-based electronic commerce systems Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 12 Designing Distributed and Internet Systems 1) Designing distributed and Internet systems is much like designing ________ location systems. A) Client B) Multi C) Single D) Double Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 2) ________ is the cabling, hardware, and software used to connect workstations, computers and file servers located in a confined geographical area. A) WAN B) LAN C) File server D) RAM Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 3) A ________ is a device that manages file operations and is shared by each client PC attached to a LAN. A) File server B) WAN C) LAN D) Database engine Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) In a file server configuration, each file server acts as an additional hard disk for each client ________. A) LAN B) WAN C) Database engine D) PC Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 5) Which of the following is NOT a feature of an application program in a file server model? A) User interface B) Record locking C) Database processing D) Generate queries Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 6) Which of the following is NOT a feature of a file server in a file server model? A) File storage B) Significant LAN traffic C) Acts like extra hard disk to client D) Process or scans tables Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


7) Which of the below is NOT a limitations of file servers? A) Excessive data movement B) The need for a powerful client workstation C) Handle integrity and security D) Decentralized data control Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 8) File servers transfer files when data are requested from a ________. A) Client B) PC C) LAN D) Database engine Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 9) Client/server architecture is a ________-based computing environment in which a central database server or engine performs all database commands sent to it from client workstations, and application programs on each client concentrate on user interface functions. A) WAN B) LAN C) Client D) PC Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


10) A ________ is the (back-end) portion of the client/server database system running on the server that provides database processing and shared access functions. A) User B) Client C) File server D) Database engine Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 11) The ________ is the portion of the client/server database system that provides the user interface and data manipulation functions. A) Client B) File server C) Database engine D) LAN Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 12) A(n) ________ refers to the software building blocks that are used to ensure that common system capabilities, such as user interfaces and printing, as well as modules are standardized to facilitate data exchange between clients and servers. A) Application server B) File server C) API D) Virtual machine Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


13) A(n) ________ is a computing server where data analysis functions primarily reside. A) API B) Application server C) File server D) Virtual machine Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 14) A(n) ________ is a software emulation of a physical computer system, both hardware and operating system, that allows more efficient sharing of physical hardware resources. A) API B) Application server C) File server D) Virtual machine Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 15) A(n) ________ is the act of creating virtual (rather than physical) versions of a variety of computing capabilities including hardware platforms, operating systems, storage devices, and networks. A) Virtualization B) Virtual machine C) Middleware D) API Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


16) Three-tiered client/server is an advanced client/server architecture in which there are three logical and distinct applications—________, presentation, and analysis—that are combined to create a single information system. A) File server B) Database engine C) Data management D) Middleware Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 17) ________ is a combination of hardware, software and communication technology that brings data management, presentation, and analysis together into a three-tiered (or n-tiered) client/server environment. A) API B) Middleware C) Data management D) Virtual machine Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 18) The ________ functions of an IS manage all interaction between software and files and databases, including data retrieval/querying, updating, security, concurrency control, and recovery. A) Data presentation B) Data analysis C) Middleware D) Data management Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


19) The ________ functions of an IS manage just the interface between system users and the software, including the display and printing of forms and reports and possibly validating system inputs. A) Data presentation B) Data analysis C) Middleware D) Data management Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 20) The ________ functions of an IS transform inputs into outputs, including simple summarization to complex mathematical modeling such as regression analysis. A) Data presentation B) Data analysis C) Middleware D) Data management Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 21) When designing distributed and Internet systems, the deliverable is a document that will consolidate the information that must be considered when implementing a system design. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 22) Each PC and workstation on a LAN is typically within a few hundred feet of another, with a total network cable length of less than one mile. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

7 Copyright © 2020 Pearson Education, Inc.


23) Decentralized data control is a benefit when using file servers on LANs. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 24) Excessive data movement is a limitation when using file servers on LANs. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 25) Because each client workstation must devote memory to a full version of the DBMS, there is less room on the client PC to rapidly manipulate data in high-speed random access memory (RAM). Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 26) An improvement in LAN-based systems is the client/server architecture in which application processing is divided (not necessarily evenly) between client and server. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 27) In the typical client/server architecture, all database recovery, security, and concurrent access management are centralized at the server; this is the responsibility of each user workstation in a simple LAN. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


28) Application program interface is the (front-end) portion of the client/server database system that provides the user interface and data manipulation functions. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 29) In advanced architectures, data analysis can reside on a powerful application server, resulting in substantially faster response times for users. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 30) Define file server. What are the limitations of a file server? Answer: A file server is a device that manages file operations and is shared by each client PC attached to a LAN. There are three primary limitations when using file servers on LANs: 1. Excessive data movement 2. The need for a powerful client workstation 3. Decentralized data control Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis 31) Define a client/server architecture. Answer: A client/server architecture is a LAN-based computing environment in which a central database server or engine performs all database commands sent to it from client workstations, and application programs on each client concentrate on user interface functions. The application processing is divided between client and server. The client workstation is most often responsible for managing the user interface, including presenting data, and the database server is responsible for database storage and access, such as query processing. Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis

9 Copyright © 2020 Pearson Education, Inc.


32) What are the advantages of a client/server architecture? Answer: • Several significant benefits can be realized by adopting a client/server architecture: • It allows companies to leverage the benefits of microcomputer technology. Today's workstations deliver impressive computing power at a fraction of the cost of a mainframe. • It allows most processing to be performed close to the source of processed data, thereby improving response times and reducing network traffic. • It facilitates the use of graphical user interfaces and visual presentation techniques commonly available for workstations. • It allows for and encourages the acceptance of open systems. Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis 33) Compare and contrast a file server vs the client/server architectures. Answer: These architectures differ in terms of processing, concurrent data access, network usage, database security and integrity, software maintenance, and hardware and system software flexibility. The file server architecture supports only the distribution of data, while the client/server architecture supports both the distribution of data and processing. In a file server architecture, concurrent data access is managed by the client; in a client/server architecture, concurrent data access is managed by the server. While the client/server architecture supports efficient data transfers, the file server architecture requires large file and data transfers. Database security and integrity are low for the file server architecture; the client/server has high database security and integrity. Software maintenance for a file server architecture is low, although it is mixed for the client/server architecture. In terms of hardware and system software flexibility, the client and server can be decoupled and mixed in a file server architecture. In a client/server architecture, there is a need for greater coordination between client and server. Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis 34) Define middleware. Provide an example to illustrate the usefulness of middleware. Answer: Middleware is a combination of hardware, software, and communication technologies that bring together data management, presentation, and analysis into a three-tiered client/server environment. The textbook uses a plumbing example and shows how the middleware brings devices and server applications together. Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis

10 Copyright © 2020 Pearson Education, Inc.


35) What are the benefits of creating three-tiered client/server architecture? Answer: First, applications can be partitioned in a way that best fits organizational computing needs. A second advantage is that because most or all of the data analysis is contained in the application server, making global changes or customizing processes for individual users is relatively easy. Thirdly, this architecture provides data presentation device independence, allowing for the use of thin clients, like tablet computers and smartphones, to access information from powerful enterprise-wide information systems. Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis 36) What are the characteristics of a cloud computing model? Answer: On-Demand Self-Service allows for most flexibility, users can access cloud resources in a buffet-style fashion on an as-needed basis without the need for lengthy negotiations with the service provider; in many cases, resources in the cloud are accessible by the customer with no need for human interaction with the provider. Rapid Elasticity: In a cloud environment, computing resources can be scaled up or down almost instantaneously and often automatically, based on user needs. Broad Network Access: As cloud services are accessed via the Internet, they are accessible from almost anywhere and from almost any Web-enabled device. Resource Pooling: Rather than renting out space or time to each customer on one specific, physical machine, cloud providers manage multiple distributed resources that are dynamically assigned to multiple customers based on their needs. Measured Service: Service is typically provided using a utility computing model, where customers pay only for what they use, and the metering depends on type of resource. Difficulty: Difficult AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Synthesis 37) A thin client is a client device designed so that most processing and data storage occur on the ________. A) Middleware B) Database engine C) Client D) Server Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


38) Which cloud computing characteristic allows for most flexibility, meaning users can access cloud resources in a buffet-style fashion on an as-needed basis without the need for lengthy negotiations with the service provider? A) Rapid Elasticity B) Broad Network Access C) On-Demand Self-Service D) Resource Pooling Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 39) Which cloud computing characteristic provides computing resources that can be scaled up or down almost instantaneously and often automatically, based on user needs? A) Rapid Elasticity B) Broad Network Access C) On-Demand Self-Service D) Measured Service Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 40) Which cloud computing characteristic specifies that the cloud services are accessible from almost anywhere and from almost any Web-enabled device? A) Rapid Elasticity B) Broad Network Access C) Resource Pooling D) On-Demand Self-Service Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


41) ________ specifies that rather than renting out space or time to each customer on one specific, physical machine, cloud providers manage multiple distributed resources that are dynamically assigned to multiple customers based on their needs. A) Rapid Elasticity B) Broad Network Access C) On-Demand Self-Service D) Resource Pooling Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 42) ________ specifies that service is typically provided using a utility computing model where customers pay only for what they use. A) Resource Pooling B) Measured Service C) On-Demand Self-Service D) Broad Network Access Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 43) In the ________ model, only the basic capabilities of processing, storage, and networking are provided. Hence, the customer has the most control over the resources. A) IaaS B) PaaS C) SaaS D) DBMS Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


44) In the ________ model, customers can run their own applications, which are typically designed using tools provided by the service provider. A) IaaS B) SaaS C) PaaS D) DBMS Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 45) In the ________ model, the customer uses only applications provided via a cloud infrastructure. Typically, such applications include Web-based e-mail services and Web-based productivity suites. A) PaaS B) SaaS C) IaaS D) DBMS Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 46) Applications under the ________ model are typically easiest to deploy, because the customer does not have to worry about maintaining or updating the software, the underlying platform, or the hardware infrastructure. A) SaaS B) IaaS C) PaaS D) data Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


47) In the ________ model, the user has control over the applications but has limited or no control over the underlying infrastructure. A) SaaS B) IaaS C) PaaS D) data Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 48) Services in a(n) ________ cloud can be used by any interested party on a pay-per-use basis; hence, they are often used for applications that need rapid scalability. A) Internal B) Network C) Private D) Public Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 49) A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. A) Private B) Public C) External D) Network Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


50) A(n) ________ cloud is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization. A) Public B) Private C) External D) Network Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 51) Which of the following is a feature of a private cloud? A) Control B) Inflexible C) Standardized D) Fast and easy setup Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 52) Which of the following is a feature of a public cloud? A) Privacy B) Centralized C) Owned by client D) Pay per use Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


53) Which factor specifies that organizations must ensure that acceptable support capabilities and personnel are available, especially for mission-critical applications, to rapidly solve technical issues when they arise? A) Scalability B) Availability/reliability C) Openness D) Costs Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 54) Which characteristic specifies that organizations have to carefully evaluate to what extent the provider will be able to meet current and future business needs in terms of data storage, transaction volumes, and so on? A) Scalability B) Reliability C) Viability D) Diversity of Offerings Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 55) Which characteristic is concerned with the stability of the service provider in the long run? A) Costs B) Scalability C) Viability D) Diversity of Offerings Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


56) Which characteristic specifies that when sensitive data are concerned, organizations have to question how secure the data will be from outside intruders, how the privacy of customer data will be protected, and whether the data storage complies with regulations such as the SarbanesOxley Act, HIPAA, etc.? A) Viability B) Security, Privacy, and Compliance C) Diversity of Offerings D) Costs Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 57) Which characteristic specifies that an important question to ask from the organization side is which provider can offer the services needed both presently and in the future? A) Viability B) Openness C) Security, Privacy, and Compliance D) Diversity of Offerings Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 58) Which characteristic focuses on the issue of interoperability which the organizations face? A) Viability B) Openness C) Reliability D) Diversity of Offerings Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


59) Which characteristic focuses on balancing the benefits and costs of the flexibility and scalability the cloud offers? A) Viability B) Openness C) Costs D) Reliability Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 60) ________-oriented architecture is a software architecture in which business processes are broken down into individual components that are designed to achieve the desired results for the service consumer. A) Service B) Object C) Client D) Server Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 61) According to the ________ service principle, a service should be usable in many different applications. A) Reliability B) Reusability C) Interoperability D) Componentization Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


62) According to the ________ service principle, a service should work with any other service. A) Reliability B) Reusability C) Interoperability D) Componentization Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 63) According to the ________ service principle, a service should be simple and modular. A) Reliability B) Reusability C) Interoperability D) Componentization Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 64) A Web service is a method of communication between two electronic devices over a ________. A) Network B) Server C) Client D) Device Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


65) ________ is an Internet authoring language that allows designers to create customized tags, enabling the definition, transmission, validation, and interpretation of data between applications. A) JAVA B) HTML5 C) HTML D) XML Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 66) Thin clients are most appropriate for doing a minimal amount of client-side processing, essentially displaying information sent to the client from the server. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 67) To allow for most flexibility, users can access cloud resources in a buffet-style fashion on an as-needed basis without the need for lengthy negotiations with the service provider; in many cases, resources in the cloud are accessible by the customer with no need for human interaction with the provider. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 68) In the platform as a service (PaaS) model, customers cannot run their own applications, which are typically designed using tools provided by the service provider. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


69) A private cloud frees an organization from the issues associated with managing the cloud infrastructure. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 70) A public cloud infrastructure is shared among different companies, with different applications running on the same hardware; as a result, it is impossible for organizations to know where exactly (physically) the data are located, and thus auditing who has access to the data is extremely difficult, if not impossible. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 71) In order to achieve greater flexibility and agility, organizations have tried to move away from deploying large, monolithic applications in favor of object-oriented architecture. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 72) The software system that makes a request is called a service requester, whereas the software system that would process the request and provide the response is called a service provider. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 73) An increasingly popular approach for formatting data within a Web service environment is JavaScript Object Notation. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 22 Copyright © 2020 Pearson Education, Inc.


74) Describe the three types of service models. Answer: In the infrastructure as a service (IaaS) model, only the basic capabilities of processing, storage, and networking are provided. Hence, the customer has the most control over the resources. In the platform as a service (PaaS) model, customers can run their own applications, which are typically designed using tools provided by the service provider. In this model, the user has control over the applications but has limited or no control over the underlying infrastructure. In the software as a service (SaaS) model, the customer uses only applications provided via a cloud infrastructure. Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Synthesis 75) What are the types of clouds? Answer: Public cloud and private cloud. Services in a public cloud can be used by any interested party on a pay-per-use basis; hence, they are often used for applications that need rapid scalability (i.e., the ability to adapt to increases or decreases in demand for processing or data storage), or in cases where there is insufficient capital or other resources to build or expand an IT infrastructure. In contrast, a private cloud (or internal cloud) is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization. Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Synthesis 76) What issues should management consider when implementing cloud computing in the organization? Answer: The first consideration is which applications, services, or data to move to the cloud. Some of the long-term, strategic issues that management should consider when evaluating different public cloud service providers include availability, reliability, scalability, viability, security, privacy, compliance, diversity of offerings, openness, and cost. Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Synthesis

23 Copyright © 2020 Pearson Education, Inc.


77) Define service-oriented architecture. Why would a company want to implement this architecture? Answer: Service-oriented architecture is a software architecture in which business processes are broken down into individual components (or services) that are designed to achieve the desired results for the service consumer (which can be either an application, another service, or person). Using SOA, business processes are broken down into individual components (or services) that are designed to achieve the desired results for the service consumer (which can either be an application, another service, or a person). By breaking down business processes into individual services, organizations can more swiftly react to changing business needs. Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Synthesis 78) What are the three main principles used in SOA to achieve the benefits of use and reuse? Answer: To facilitate online collaboration with suppliers, business partners, and customers, SOA uses and reuses individual services as "building blocks," so that systems can be easily built and reconfigured as requirements change. To achieve these benefits, services have to follow three main principles: 1. Reusability. A service should be usable in many different applications. 2. Interoperability. A service should work with any other service. 3. Componentization. A service should be simple and modular. Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Synthesis 79) Define Web service. List some of the more common languages and technologies associated with Web service. Answer: Web service is a method of communication between two electronic devices over a network. Some of the languages associated with Web service include: XML and JSON. Key technologies are SOAP and REST. Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Synthesis

24 Copyright © 2020 Pearson Education, Inc.


80) ________ is a lightweight data interchange approach that is relatively easy for humans to understand and for computers to generate or interpret. A) SOAP B) JSON C) XML D) REST Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 81) ________ is a protocol for communicating XML data between Web service applications and the operating system. A) SOAP B) JSON C) HTTP D) REST Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 82) ________ is a relatively simple and fast protocol for communicating JSON data between Web service applications and the operating system. A) SOAP B) HTTP C) REST D) BIND Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


83) ________ is a method for translating Internet domain names into Internet Protocol (IP) addresses. A) HTML B) REST C) HTTP D) BIND Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 84) ________ is a communication protocol for exchanging information on the Internet. A) HTML B) HTTP C) JSON D) BIND Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 85) ________ is a set of style rules that tells a Web browser how to present a document. A) XSL B) HTML C) XML D) CSS Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


86) ________ is a specification for separating style from content when generating XML pages. A) XML B) XSL C) CSS D) REST Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 87) ________ means providing Internet content to a user based upon knowledge of that customer. A) Personalization B) Customization C) Visualization D) Reliability Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 88) ________ refers to sites that allow a user to customize the content and look of a site based on their personal preferences. A) Personalization B) Customization C) Visualization D) Reliability Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept

27 Copyright © 2020 Pearson Education, Inc.


89) A(n) ________ is a special type of software application for collecting, organizing, and publishing Web site content. A) XML B) XSL C) CSS D) CMS Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 90) To make sure Websites contain the most accurate and up-to-date information, often from multiple sources, many organizations have turned to using a ________ management system. A) Client B) Web C) Content D) Database Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 91) SOAP is a relatively simple and fast protocol for communicating JSON data between Web service applications and the operating system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 92) REST is a protocol for communicating XML data between Web service applications and the operating system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 28 Copyright © 2020 Pearson Education, Inc.


93) The vast majority of new systems development in organizations focuses on Internet-based applications and the Internet can be used for delivering internal organizational systems, businessto-business systems, or business-to-consumer systems. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 94) REST is a complex and slower alternative to SOAP, typically communicating over HTTP utilizing JSON for formatting information. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 95) JSON is not an alternative to XML and is considered much more complex to transfer and process and much difficult for humans to understand. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 96) Relative to SOAP and XML, REST and JSON are much simpler to understand, easier for machines to process and generate, and easier for humans to design and implement. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


97) BIND provides the ability to locate information using common domain names that are translated into corresponding Internet Protocol (IP) addresses. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 98) A site with low consistency is also much easier for users to navigate, and it is much easier for users to anticipate the meaning of links. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 99) What is the difference between personalization and customization. Provide an example of each. Answer: Personalization provides Internet content to users based upon knowledge of that customer. When visiting an on-line department store, information about your visit and purchases are stored. Each time you visit that site, the stored information is used to provide personalized information to you. If you have purchased clothing and toys for your two-year-old child, the site may alert you to new sale items for toddlers. Customization refers to Internet sites that allow a user to customize information to their personal preferences. Customization requires more active involvement on the part of the customer. For instance, you can ask a portal to deliver specific stock, sports, and weather information to you each time you visit that site. Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Synthesis

30 Copyright © 2020 Pearson Education, Inc.


100) What are the four reasons why professional developers believe that links must live forever? Answer: 1. Customer bookmarks. Because customers may bookmark any page on your site, you cannot ever remove a page without running the risk of losing customers who would not find a working link if they encountered a dead link. 2. Links from other sites. Like your customers who bookmark pages, other sites may link directly to pages within your site; removing a page may result in losing customer referrals. 3. Search engine referrals. Because search engines are often slow to update their databases, this is another source for old and dead pages. 4. Old content adds value. In addition to these practical issues, many users may actually find value from old content. Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Synthesis 101) Given the direction of technological evolution, it is likely most future systems development will need to consider issues surrounding the design of distributed systems. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 102) All of these are outcomes and deliverables from designing distributed systems except ________. A) Profile of the user B) List of processes C) Pros and cons of no technological support D) Infrastructure information Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


103) Jamie is a consultant for XYX Firm. They have asked her to design the cabling, hardware, and software used to connect workstations and computers for the campus. She was excited to be designing XYX's ________. A) Client-server architecture B) Multi-user environment C) LAN D) File server Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 104) ________ is an advantage of using the client/server architecture. A) The ability to decouple the client environment from the server environment B) The similarity to using mainframes C) Using the client as a “dumb” terminal D) Encouraging closed systems Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 105) An n-tiered architecture is being utilized by organizations because it enables the development of reusable applications. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 12.1 Distinguish between file server and client/server environments, contrasting how each is used in a LAN Classification: Concept 106) One prime example of a cloud computing provider is ________. A) Target B) Amazon Web Services C) Pinterest D) Airbnb Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 32 Copyright © 2020 Pearson Education, Inc.


107) Sharon is starting a new social media site. She wants to implement the site using ________ because she can run her own application but does not need any control over the underlying infrastructure. A) Platform as a service (PaaS) B) Infrastructure as a service (IaaS) C) Software as a service (SaaS) D) On-Demand Self-Service Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 108) Services in a public cloud can be used by any interested party on a pay-per-use basis. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 109) A primary concern for most organizations when dealing with the cloud is ________. A) Availability B) Scalability C) Resource pooling D) Costs Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 110) Billy is concerned about the ________ of using the cloud because cloud providers use different infrastructures and different ways to store data. A) Diversity of offerings B) Security C) Openness D) HIPAA laws Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 12.2 Describe cloud computing and other current trends that help organizations address IS infrastructure-related challenges Classification: Concept 33 Copyright © 2020 Pearson Education, Inc.


111) The most common approach for deploying a SOA is through the use of web services. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 112) What is the motivation for organizations to design internet systems? A) To take advantage of the global computing infrastructure of the Internet. B) All the companies are doing it. C) It is cheaper to develop for the Internet. D) It is harder but necessary to develop for the Internet. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 113) ________ make(s) it much simpler to design an Internet-based system versus a client/server system. A) XML B) Standards C) CSS D) Readily available talent Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept

34 Copyright © 2020 Pearson Education, Inc.


114) Which of the following is the greatest driver of change and evolution of Internet standards? A) Universal user access B) BIND C) Analysts wanting to experiment with new technologies D) Wireless mobile computing Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept 115) Quentin was using CSS in his website development but wanted something more sophisticated to use for implementing standard page styles throughout the site so he switched to ________. A) XML B) XSL C) BIND D) CMS Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 12.3 Describe standards shaping the design of Internet-based systems, options for ensuring Internet design consistency, site management issues influencing customer loyalty, trustworthiness, and security Classification: Concept

35 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 13 System Implementation 1) There are ________ major activities involved in system implementation. A) Three B) Four C) Five D) Six Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 2) ________ is the process whereby the physical design specifications created by the analysis team are turned into working computer code by the programming team. A) Testing B) Coding C) Training D) Installation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 3) ________ involves determining what needs to be tested and collecting test data. A) Planning B) Analysis C) Design D) Testing Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 4) ________ is the process during which the current system is replaced by the new system. A) Testing B) Analysis C) Planning D) Installation Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 1 Copyright © 2020 Pearson Education, Inc.


5) Program documentation is the deliverable that is produced after the ________ phase. A) Testing B) Coding C) Installation D) Support Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 6) Test scenarios (test plan) and test data are the deliverables that are produced after the ________ phase. A) Testing B) Training C) Support D) Documentation Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 7) The user guide is the deliverable that is produced after the ________ phase. A) Training B) Support C) Installation D) Documentation Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 8) Code is the deliverable that is produced after the ________ phase. A) Testing B) Coding C) Support D) Installation Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept

2 Copyright © 2020 Pearson Education, Inc.


9) Results of program and system testing is the deliverable that is produced after the ________ phase. A) Testing B) Coding C) Support D) Documentation Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 10) The user training plan is the deliverable that is produced after the ________ phase. A) Training B) Support C) Documentation D) Installation Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 11) The data conversion plan is the deliverable that is produced after the ________ phase. A) Coding B) Training C) Documentation D) Installation Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 12) The site and facility remodeling plan is the deliverable that is produced after the________ phase. A) Documentation B) Training C) Installation D) Support Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept

3 Copyright © 2020 Pearson Education, Inc.


13) During the early stages of ________, the training plans are finalized and training on the use of the system begins. A) Implementation B) Analysis C) Design D) Planning Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 14) Regardless of the development methodology followed, once coding has begun, the testing process can begin and proceed in parallel. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 15) Support includes conversion of existing data, software, documentation, and work procedures to those consistent with the new system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 16) Some programming languages include utilities to generate documentation automatically, while others require more effort on the part of the coder to establish good documentation. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 17) List at least five deliverables from the coding, testing, and installation stages of system implementation. Answer: Coding deliverables include code and program documentation. Testing deliverables include test plans, test data, and the results of program and system testing. Installation deliverables include user guides, user training plan, and installation and conversion plan. Difficulty: Moderate AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Synthesis

4 Copyright © 2020 Pearson Education, Inc.


18) List the six major activities in system implementation. Answer: Coding, testing, installation, documentation, training, and support. Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Synthesis 19) System documentation is related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 20) Classes are related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 21) Training materials are related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


22) Help desk is related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 23) User documentation is related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 24) Tutorials are related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 25) Computer-based training aids are related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 6 Copyright © 2020 Pearson Education, Inc.


26) Online help is related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) User Training Plan B) User Training Modules C) Documentation D) User Support Plan Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 27) Bulletin boards and other support mechanisms are related to which category of deliverable for Documenting the System, Training, and Supporting Users? A) Documentation B) User Training Modules C) User Training Plan D) User Support Plan Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 28) In a Master Test Plan, test initiation falls under which category? A) Introduction B) Testing Requirements C) Procedure Control D) Component-Specific Test Plans Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 29) In a Master Test Plan, hardware falls under which category? A) Overall Plan B) Testing Requirements C) Procedure Control D) Component-Specific Test Plans Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 7 Copyright © 2020 Pearson Education, Inc.


30) In a Master Test Plan, milestones, schedules, and locations fall under which category? A) Overall Plan B) Testing Requirements C) Procedure Control D) Introduction Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 31) In a Master Test Plan, document control falls under which category? A) Overall Plan B) Testing Requirements C) Procedure Control D) Component-Specific Test Plans Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 32) In a Master Test Plan, test materials fall under which category? A) Overall Plan B) Testing Requirements C) Procedure Control D) Component-Specific Test Plans Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 33) In a Master Test Plan, method and attachments fall under which category? A) Procedure Control B) Overall Plan C) Testing Requirements D) Component-Specific Test Plans Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

8 Copyright © 2020 Pearson Education, Inc.


34) In a Master Test Plan, test execution and test failure fall under which category? A) Overall Plan B) Testing Requirements C) Procedure Control D) Component-Specific Test Plans Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 35) In a Master Test Plan, resulting test materials fall under which category? A) Testing Requirements B) Overall Plan C) Procedure Control D) Component-Specific Test Plans Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 36) In a Master Test Plan, criteria for passing tests and software description fall under which category? A) Procedure Control B) Overall Plan C) Testing Requirements D) Component-Specific Test Plans Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 37) In a Master Test Plan, software and personnel fall under which category? A) Introduction B) Testing Requirements C) Overall Plan D) Component-Specific Test Plans Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


38) In a Master Test Plan, description of system to be tested falls under which category? A) Introduction B) Overall Plan C) Testing Requirements D) Component-Specific Test Plans Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 39) Inspection is a(n) ________ technique in which participants examine program code for predictable language-specific errors. A) Training B) Testing C) Support D) Installation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 40) ________ is a testing technique in which the program code is sequentially executed manually by the reviewer. A) Unit testing B) Integration testing C) Desk checking D) Stub testing Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 41) In ________ testing, each module is tested alone in an attempt to discover any errors in its code. A) Unit B) Stub C) Integration D) System Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 10 Copyright © 2020 Pearson Education, Inc.


42) ________ testing is defined as the process of bringing together all of the modules that a program comprises for testing purposes. A) Unit B) Stub C) Integration D) System Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 43) ________ testing is defined as the process of bringing together all of the programs that a system comprises for testing purposes. A) Unit B) Integration C) Stub D) System Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 44) ________ testing is a technique used in testing modules, especially where modules are written and tested in a top-down fashion, where a few lines of code are used to substitute for subordinate modules. A) Unit B) Stub C) System D) Integration Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


45) ________ is more than simply expanded integration testing, where you are testing the interfaces between programs in a system rather than testing the interfaces between modules in a program. A) Unit testing B) Stud testing C) System testing D) Desk checking Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 46) ________ testing sometimes is also called module testing. A) Unit B) System C) Integration D) Stub Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 47) To verify that a system meets its objectives, ________ testing involves using nonlive test data in a nonlive testing environment. A) Unit B) System C) Integration D) Stub Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 48) ________ is an automated testing environment used to review code for errors, standards violations, and other design flaws. A) Refactoring B) Acceptance testing C) Beta testing D) A testing harness Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 12 Copyright © 2020 Pearson Education, Inc.


49) ________ is defined as the process of making a program simpler after adding a new feature. A) Refactoring B) Testing harness C) Desk checking D) Beta testing Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 50) ________ is the process whereby actual users test a completed information system. A) Refactoring B) Beta testing C) Alpha testing D) Acceptance testing Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 51) ________ is the user testing of a completed information system using simulated data. A) Testing harness B) Beta testing C) Alpha testing D) Acceptance testing Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 52) ________ is the user testing of a completed information system using real data in the real user environment. A) Testing harness B) Beta testing C) Alpha testing D) Acceptance testing Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

13 Copyright © 2020 Pearson Education, Inc.


53) Which installation runs the old information system and the new one at the same time until management decides the old system can be turned off? A) Direct installation B) Phased installation C) Parallel installation D) Single-location installation Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 54) Which installation tries out a new information system at one site and uses the experience to decide if and how the new system should be deployed throughout the organization? A) Direct installation B) Phased installation C) Parallel installation D) Single-location installation Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 55) Which installation changes from the old information system to the new one incrementally, starting with one or a few functional components and then gradually extends the installation to cover the whole new system? A) Direct installation B) Phased installation C) Parallel installation D) Single-location installation Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 56) Which installation is also known as pilot installation? A) Direct installation B) Phased installation C) Parallel installation D) Single-location installation Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 14 Copyright © 2020 Pearson Education, Inc.


57) Which installation is also known as staged installation? A) Direct installation B) Phased installation C) Parallel installation D) Single-location installation Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 58) During design, we develop a unit test plan, an integration test plan, and a system test plan and during support; these various plans are put into effect and the actual testing is performed in this phase. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 59) Testing managers are responsible for developing test plans, establishing testing standards, integrating testing and development activities in the life cycle, and ensuring that test plans are completed. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 60) Inspections are formal group activities where participants manually examine code for occurrences of well-known errors. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 61) Desk checking is the process of bringing together all of the modules that a program comprises for testing purposes. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


62) Under both integration and stub testing, not only do individual modules and programs get tested many times, so do the interfaces between modules and programs. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 63) System testing is more than simply expanded integration testing where you are testing the interfaces between programs in a system rather than testing the interfaces between modules in a program. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 64) Nonlive means that the data and situation are artificial, developed specifically for testing purposes, although both the data and the environment are similar to what users would encounter in everyday system use. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 65) The people who create the test cases can be the same people as those who coded and tested the system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 66) In many situations, a testing harness will greatly enhance the testing process because it can automatically expand the scope of the tests beyond the current development platform as well as be run every time there is a new version of the software. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


67) Different forms of refactoring include simplifying complex statements, abstracting solutions from reusable code, and removing duplicate code. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 68) The purpose of regression testing is for users to determine whether the system meets their requirements. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 69) Define the way tests are organized according to Mosley. Provide the definition of each category. Answer: Mosley organizes the types of tests according to whether they employ static or dynamic techniques and whether the test is automated or manual. Static testing means that the code being tested is not executed. The results of running the code are not an issue for that particular test. Dynamic testing, on the other hand, involves execution of the code. Automated testing means the computer conducts the test, whereas manual testing means that people complete the test. Static Dynamic

Manual Inspections Walk-throughs Desk checking

Automated Syntax checking Unit test Integration test System test

From Table 13-4 Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis

17 Copyright © 2020 Pearson Education, Inc.


70) What are the guidelines for conducting a code walk-through? Answer: 1. Have the review meeting chaired by the project manager or chief programmer, who is also responsible for scheduling the meeting, reserving a room, setting the agenda, inviting participants, and so on. 2. The programmer presents his or her work to the reviewers. Discussion should be general during the presentation. 3. Following the general discussion, the programmer walks through the code in detail, focusing on the logic of the code rather than on specific test cases. 4. Reviewers ask to walk through specific test cases. 5. The chair resolves disagreements if the review team members cannot reach agreement among themselves and assigns duties, usually to the programmer, for making specific changes. 6. A second walk-through is then scheduled if needed. Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis 71) List and define the three types of automated testing techniques. Answer: 1. Unit testing, sometimes called module testing, is an automated technique whereby each module is tested alone in an attempt to discover any errors that may exist in the module's code. 2. Integration testing is the process of bringing together all of the modules that a program comprises for testing purposes. Modules are typically integrated in a top-down, incremental fashion. 3. System testing is a similar process, but instead of integrating modules into programs for testing, you integrate programs into systems. System testing follows the same incremental logic that integration testing does. Difficulty: Difficult AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis 72) What are the points to remember about the testing process itself? What are some things to keep in mind about this process? Answer: There are two important things to remember about testing information systems: 1. The purpose of testing is to confirm that the system satisfies requirements. 2. Testing must be planned. First, testing is not haphazard. You must pay attention to many different aspects of a system, such as response time, response to boundary data, response to no input, response to heavy volumes of input, and so on. You must test anything (within resource constraints) that could go wrong or be wrong with a system. At a minimum, you should test the most frequently used parts of the system and as many other paths throughout the system as time permits. Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis

18 Copyright © 2020 Pearson Education, Inc.


73) Define acceptance testing. Identify and define at least two possible outcomes of acceptance testing. Answer: Acceptance testing is testing the system in the environment where it will eventually be used. Acceptance refers to the fact that users typically sign off on the system and "accept" it once they are satisfied with it. The most complete acceptance testing will include alpha testing, in which simulated but typical data are used for system testing; beta testing, in which live data are used in the users' real working environment; and a system audit conducted by the organization's internal auditors or by members of the quality assurance group. Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis 74) What types of tests are performed during alpha testing? Answer: The types of tests performed during alpha testing include the following: • Recovery testing–forces the software (or environment) to fail in order to verify that recovery is properly performed. • Security testing–verifies that protection mechanisms built into the system will protect it from improper penetration. • Stress testing–tries to break the system (e.g., what happens when a record is written to the database with incomplete information or what happens under extreme online transaction loads or with a large number of concurrent users). • Performance testing–determines how the system performs in the range of possible environments in which it may be used (e.g., different hardware configurations, networks, operating systems, and so on); often the goal is to have the system perform with similar response time and other performance measures in each environment. Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis 75) Explain the four types of installation. Answer: The four types of installation are: direct, parallel, single location, and phased. Changing over from the old information system to a new one by turning off the old system as the new one is turned on is called direct installation. Parallel installation involves running the old information system and the new one at the same time until management decides the old system can be turned off. Single location installation involves trying out a new information system at one site and using the experience to decide if and how the new system should be deployed throughout the organization. Changing over from the old information system to a new one incrementally, starting with one or a few functional components and then gradually extending the installation to cover the whole new system is commonly called phased installation. Difficulty: Moderate AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Synthesis

19 Copyright © 2020 Pearson Education, Inc.


76) In alpha testing, the entire system is implemented in a test environment to discover whether the system is overtly destructive to itself or to the rest of the environment. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.3 Apply four installation strategies: direct, parallel, single-location, and phased installation Classification: Concept 77) The intent of the alpha test is to determine whether the software, documentation, technical support, and training activities work as intended. In essence, alpha testing can be viewed as a rehearsal of the installation phase. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.3 Apply four installation strategies: direct, parallel, single-location, and phased installation Classification: Concept 78) In direct installation, any errors resulting from the new system will have a direct impact on the users and how they do their jobs and, in some cases–depending on the centrality of the system to the organization–on how the organization performs its business. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.3 Apply four installation strategies: direct, parallel, single-location, and phased installation Classification: Concept 79) ________ has detailed information about a system's design specifications, its internal workings, and its functionality. A) An installation document B) A design document C) User documentation D) System documentation Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


80) ________ has written or other visual information about an application system, how it works, and how to use it. A) An installation document B) A design document C) User documentation D) System documentation Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 81) Which implementation factor describes characteristics of the user, such as age and degree of computer experience in an information system? A) Satisfaction B) User demographics C) Performance D) Users personal stake Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 82) The two types of documentation are system documentation and user documentation. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 83) Support means providing ongoing educational and problem-solving assistance to information system users. For in-house developed systems, support materials and jobs will have to be prepared or designed as part of the implementation process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


84) A help desk is a single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 85) It is not crucial that help desk personnel know when new systems and releases are being implemented and when users are being trained for new systems. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 86) Define system documentation and user documentation. Answer: System documentation is detailed information about a system's design specifications, its internal workings, and its functionality. User documentation refers to written or other visual information about an application system, how it works, and how to use it. Difficulty: Easy AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Synthesis 87) List at least three types of user training and an example for each. Answer: The type of training needed will vary by system type and user expertise. The list of potential topics from which you will determine if training will be useful includes the following: • Use of the system (e.g., how to enter a class registration request) • General computer concepts (e.g., computer files and how to copy them) • Information system concepts (e.g., batch processing) • Organizational concepts (e.g., FIFO inventory accounting) • System management (e.g., how to request changes to a system) • System installation (e.g., how to reconcile current and new systems during phased installation) Difficulty: Difficult AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Synthesis

22 Copyright © 2020 Pearson Education, Inc.


88) List the types of training methods. Answer: The types of training methods include: Resident expert; Traditional instructor-led classroom training; E-learning/distance learning; Blended learning (combination of instructor-led and e-learning); Software help components; External sources, such as vendors. Difficulty: Difficult AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Synthesis 89) What is a help desk? What are the top two valued skills help desk personnel should have? Answer: A help desk is a single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department. Difficulty: Moderate AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Synthesis 90) Which implementation factor includes aspects of the system's design such as ease of use, reliability, and relevance to the task the system supports? A) User demographics B) User's personal stake C) Organizational support D) System characteristics Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.5 Explain why system implementation sometimes fails Classification: Concept 91) "Add to cart, list section, calculate tax, change personal data" are examples of scenarios that fall into which testing category? A) Simple functionality B) Multiple functionality C) Function chains D) Elective functions Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.5 Explain why system implementation sometimes fails Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


92) "Add item to cart and change quantity, create user account, change address" are examples of scenarios that fall into which testing category? A) Simple functionality B) Multiple functionality C) Function chains D) Emergency/crisis Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.5 Explain why system implementation sometimes fails Classification: Concept 93) User's personal stake factor specifies how important the domain of the system is for the user; in other words, how relevant the system is to the work the user performs. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.5 Explain why system implementation sometimes fails Classification: Concept 94) What are the six factors, identified by Lucas, that influence the extent to which a system is used? Answer: Lucas identified user's personal stake, system characteristics, user demographics, organization support, performance, and satisfaction. Difficulty: Difficult AACSB: Information Technology L.O.: 13.5 Explain why system implementation sometimes fails Classification: Synthesis 95) "Add item to cart, check out, create user account, purchase" are examples of scenarios that fall into which testing category? A) Multiple functionality B) Emergency/crisis C) Elective functions D) Function chains Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


96) "Returned items, lost shipments, item out of stock" fall into the function chains testing category. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept 97) List the top five security breaches in 2017. Answer: Malware, Phishing, Web or software applications exploited, denial of service, and theft of computers or storage devices. Difficulty: Difficult AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Synthesis 98) "Examine response time when backing up server data" refers to which kind of test type? A) Recovery B) Security C) Performance D) Stress Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 13.7 Show how traditional implementation issues apply to electronic commerce applications Classification: Concept 99) System bugs can be identified during the testing process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 13.7 Show how traditional implementation issues apply to electronic commerce applications Classification: Concept 100) What is the purpose of system implementation? A) To replace an entire system. B) To test the methodology for completeness. C) To convert the physical system specifications into work and reliable software and hardware. D) To make the client happy. Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 25 Copyright © 2020 Pearson Education, Inc.


101) in which step of system implementation are physical design specifications turned into working computer code? A) Testing B) Coding C) Installation D) Deliverables Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 102) During the installation process, the analyst can control all of the dynamics of a user-system interaction. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 103) How can a small organization that cannot afford a well-staffed, centralized training team train and support their users? A) Just read the manual. B) Small organizations do not train their users. C) Fellow users can provide training. D) Everyone has to use Google. Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept 104) Who should deliver a user support plan that addresses issues such as how users will be able to find help once the information system is integrated? A) The development team should develop a user support plan. B) The systems analyst should develop a user support plan. C) Upper management should develop a user support plan. D) The users of the system should develop a user support plan. Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.1 Provide an overview of the system implementation process Classification: Concept

26 Copyright © 2020 Pearson Education, Inc.


105) All of the following are manual test types except ________. A) Inspections B) Walk-throughs C) Desk checking D) Unit test Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 106) All of the following are automated test types except ________. A) Syntax checking B) System test C) Desk checking D) Unit test Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 107) ________ is a specific scenario of transactions, queries, or navigation path that represents a typical, crucial, or abnormal use of the system. A) A unit test B) A walk-through C) Desk checking D) A test case Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 108) Peter wants to make sure his code is going to work. He has Sally act as the computer mentally checking each step and its results for the entire set of computer instructor. Sally is performing a ________. A) Inspections B) Walk-throughs C) Desk check D) Unit test Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 27 Copyright © 2020 Pearson Education, Inc.


109) Two important things to remember are that testing must be planned and that the purpose of testing is to confirm that the system satisfies requirements. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 13.2 Describe how software applications are tested Classification: Concept 110) Joel wants to install the system by turning off the old system and turning up new system. Joel is implementing the ________ installation method. A) Direct B) Parallel C) Pilot D) Phased Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 13.3 Apply four installation strategies: direct, parallel, single-location, and phased installation Classification: Concept 111) Kathy is creating ________ detailing visual information about an application system, how it works, and how to use it. A) An installation document B) A design document C) User documentation D) System documentation Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 112) Training and support are critical for the success of an information system. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept

28 Copyright © 2020 Pearson Education, Inc.


113) Tommy decided to use a combination of instructor-led and e-learning, called ________, to teach the users about the new system. A) Distance learning B) Blended learning C) Software help components D) Vendors Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 114) A(n) ________is an information systems department function and is staffed by IS personnel. A) Help desk B) Online documentation C) Vendor support system D) IT organization Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.4 List the deliverables for documenting the system and for training and supporting users Classification: Concept 115) With the best efforts of the systems development team to design and build a quality system and to manage the change process in the organization, systems never fail. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 13.5 Explain why system implementation sometimes fails Classification: Concept 116) All of the following are examples of security issues except ________ A) Fishing B) Hacking C) Denial of service D) Employee abuse Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


117) Which of the following is an example of employee abuse of the company system? A) Watching a video on worker safety. B) Sending personal email. C) Downloading the operations manual for the new equipment. D) Reading a book. Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept 118) Most companies spend more on systems security than the average loss due to cybersecurity for their company type. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept 119) A ________ is a set of related programs that protects the resources of a network from users from other networks. A) Computer system B) Firewall C) Security policy D) Strong password Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept 120) All of the following are ways employees can protect their organization's information systems except ________. A) Keeping their operating system updated B) Using updated virus protection software C) Posting their password on sticky notes under their monitors D) Not being lazy Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 13.6 Describe the threats to system security and remedies that can be applied Classification: Concept

30 Copyright © 2020 Pearson Education, Inc.


Modern Systems Analysis and Design, 9e (Valacich/George) Chapter 14 Maintaining Information Systems 1) Which process can begin soon after the system is installed? A) Design B) Planning C) Analysis D) Maintenance Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 2) Once an information system is installed, the system is essentially in which phase of the systems development life cycle (SDLC)? A) Design B) Planning C) Analysis D) Maintenance Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 3) The maintenance phase is the ________ phase of the systems development life cycle. A) First B) Last C) Third D) Fourth Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept

1 Copyright © 2020 Pearson Education, Inc.


4) Which activity in the maintenance phase requires that a formal process be established whereby users can submit system change requests? A) Obtaining maintenance requests B) Transforming requests into changes C) Implementing changes D) Designing changes Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 5) Most companies have some sort of document like a(n) ________ to request new development, to report problems, or to request new features within an existing system. A) User document B) System Service Request C) Installation guide D) System document Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 6) Once a maintenance request is received, ________ must be conducted to gain an understanding of the scope of the request. A) Design B) Planning C) Analysis D) Maintenance Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 7) Which SDLC phase is analogous to the maintenance process of obtaining a maintenance request? A) Design B) Planning C) Analysis D) Maintenance Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 2 Copyright © 2020 Pearson Education, Inc.


8) In which SDLC phase are changes made to a system to fix or enhance its functionality? A) Design B) Planning C) Analysis D) Maintenance Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 9) In which maintenance type are changes made to a system to repair flaws in its design, coding, or implementation? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 10) In which maintenance type are changes made to a system to evolve its functionality to changing business needs or technologies? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 11) In which maintenance type are changes made to a system to add new features or to improve performance? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 3 Copyright © 2020 Pearson Education, Inc.


12) When ________ maintenance problems surface, they are typically urgent and need to be resolved to curtail possible interruptions in normal business activities. A) Adaptive B) Corrective C) Perfective D) Preventive Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 13) ________ maintenance is usually less urgent than corrective maintenance because business and technical changes typically occur over some period of time. A) Adaptive B) Corrective C) Perfective D) Preventive Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 14) Of all types of maintenance, which maintenance accounts for as much as 75 percent of all maintenance activity according to Andrews and Leventhal? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept

4 Copyright © 2020 Pearson Education, Inc.


15) Contrary to corrective maintenance, ________ maintenance is generally a small part of an organization's maintenance effort, but it adds value to the organization. A) Adaptive B) Corrective C) Perfective D) Preventive Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 16) Which maintenance adds little or no value to the organization and simply focuses on removing defects from an existing system without adding new functionality? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 17) Which maintenance involves making enhancements to improve processing performance or interface usability or to add desired, but not necessarily required, system features? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 18) In the maintenance phase, the systems development group is responsible for collecting maintenance requests from the network management staff. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept

5 Copyright © 2020 Pearson Education, Inc.


19) As with the initial development of the system, implemented changes are formally reviewed and not tested before installation into operational systems. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 20) Implementing changes and designing changes are not major maintenance activities. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 21) Once a maintenance request is received, design must be conducted to gain an understanding of the scope of the request. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 22) Because the maintenance phase of the SDLC is basically a subset of the activities of the entire development process, the deliverables and outcomes from the process are the development of a new version of the software and new versions of all design documents developed or modified during the maintenance process. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 23) A new system is developed when there is a change in the hardware or software platform or when fundamental assumptions and properties of the data, logic, or process models change. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept

6 Copyright © 2020 Pearson Education, Inc.


24) In corrective maintenance, changes are made to a system to evolve its functionality to changing business needs or technologies. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 25) In perfective maintenance, changes are made to a system to add new features or to improve performance. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 26) When corrective maintenance problems surface, they are typically urgent and need to be resolved to curtail possible interruptions in normal business activities. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 27) Preventive maintenance adds little or no value to the organization and it simply focuses on removing defects from an existing system without adding new functionality. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 28) Adaptive maintenance is usually less urgent than corrective maintenance because business and technical changes typically occur over some period of time. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 29) Contrary to corrective maintenance, adaptive maintenance is generally the largest part of an organization's maintenance effort, but it does not add value to the organization. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 7 Copyright © 2020 Pearson Education, Inc.


30) Perfective maintenance involves making enhancements to improve processing performance or interface usability or to add desired, but not necessarily required, system features. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 31) What are the four major activities that occur within maintenance? Answer: 1. Obtaining maintenance requests 2. Transforming requests into changes 3. Designing changes 4. Implementing changes Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Synthesis 32) How can one distinguish between development and maintenance? Answer: One difference is that maintenance reuses most existing system modules in producing the new system version. Other distinctions are that a new system is developed when there is a change in the hardware or software platform or when fundamental assumptions and properties of the data, logic, or process models change. Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Synthesis 33) List the four types of maintenance. Answer: Four types of maintenance were identified in the text. The types are corrective maintenance, adaptive maintenance, perfective maintenance, and preventive maintenance. Corrective maintenance refers to changes made to a system to repair flaws in its design, coding, or implementation. Adaptive maintenance refers to changes made to a system to evolve its functionality to changing business needs or technologies. Changes made to a system to add new features or to improve performance are perfective maintenance changes. Changes made to a system to avoid possible future problems are preventive maintenance changes. Difficulty: Moderate AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Synthesis

8 Copyright © 2020 Pearson Education, Inc.


34) Many systems professionals feel that ________ maintenance is not really maintenance but rather new development. A) Adaptive B) Corrective C) Perfective D) Preventive Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 35) Which maintenance involves changes made to a system to reduce the chance of future system failure? A) Adaptive B) Corrective C) Perfective D) Preventive Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 36) Adaptive, perfective, and preventive maintenance activities can lead to ________ maintenance activities if not carefully designed and implemented. A) Adaptive B) Corrective C) Perfective D) Preventive Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept

9 Copyright © 2020 Pearson Education, Inc.


37) In situations where a company has not developed its systems in-house but instead has licensed software, as in the case of ERP systems, maintenance costs remain ________. A) High B) Low C) Same D) Negligible Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 38) According to Nash, the standard cost of maintenance for most ERP vendors is ________ percent annually. A) 15 B) 48 C) 22 D) 63 Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 39) Maintainability is the ease with which ________ can be understood, corrected, adapted, and enhanced. A) Error B) Network C) Hardware D) Software Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept

10 Copyright © 2020 Pearson Education, Inc.


40) Systems with ________ maintainability result in uncontrollable maintenance expenses. A) High B) Low C) Medium D) Negligible Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 41) Which maintainability factor specifies the number of unknown errors existing in the system after it is installed? A) Latent defects B) Number of customers C) Quality of system documentation D) Maintenance personnel Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 42) High-quality documentation leads to a(n) ________ percent reduction in the system maintenance effort when compared with average-quality documentation. A) 50 B) 60 C) 70 D) 80 Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept

11 Copyright © 2020 Pearson Education, Inc.


43) Tools that can automatically generate new code based on system specification changes can dramatically ________ maintenance time and costs. A) Increase B) Reduce C) Stop D) Start Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 44) Over the life of a system, corrective maintenance is most likely to occur after initial system installation or after major system changes. This means that adaptive, perfective, and preventive maintenance activities can lead to corrective maintenance activities if not carefully designed and implemented. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 45) Quality documentation makes it easier to find code that needs to be changed and to understand how the code needs to be changed, and good documentation also explains why a system does what it does and why alternatives were not feasible, which saves wasted maintenance efforts. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 46) "Personnel may have limited job mobility and lack access to adequate human and technical resources" is a disadvantage of combined maintenance organizational structures. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept

12 Copyright © 2020 Pearson Education, Inc.


47) Number of failures is one of the factors for measuring maintenance effectiveness. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 48) Time between each failure and type of failure are never helpful for measuring maintenance effectiveness. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 49) There are various types of maintenance requests–some correct minor or severe defects in the systems, whereas others improve or extend system functionality. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 50) What is maintainability? Identify several factors that influence the maintainability of a system. Answer: Maintainability is the ease with which software can be understood, corrected, adapted, and enhanced. The cost elements of maintenance include defects, customers, documentation, personnel, tools, and software structure. The defect element refers to the number of unknown defects in a system when it is installed. Typically, the more latent defects, the higher the maintenance costs. The customer element refers to the number of different customers that a maintenance group must support. Generally, the more customers, the greater the maintenance costs. The documentation element refers to the quality of technical system documentation including test cases. Without quality documentation, maintenance efforts increase exponentially. The personnel element refers to the number and quality of personnel dedicated to the support and maintenance of a system. Maintenance programmers should be able to understand and change the software that they did not originally create. The tool element refers to software development tools, debuggers, hardware, and other resources. Such tools help reduce maintenance costs. Software structure refers to the structure and maintainability of the software. If programs are well-structured, they are easier to understand, modify, and fix. Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Synthesis 13 Copyright © 2020 Pearson Education, Inc.


51) What are the factors that influence maintainability of a system? Which ones are the most significant? Answer: These factors are latent defects, number of customers of a given system, quality of system documentation, maintenance personnel, tools, and well-structured programs. Of these factors, three are most significant: the number of latent defects, the number of customers, and documentation quality. Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Synthesis 52) "Formal transfer of systems between groups improves the system and documentation quality" is an advantage of which maintenance organizational structure? A) Separate B) Non-functional C) Combined D) Functional Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 53) "Maintenance group knows or has access to all assumptions and decisions behind the system's original design" is an advantage of which maintenance organizational structure? A) Separate B) Non-functional C) Combined D) Functional Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

14 Copyright © 2020 Pearson Education, Inc.


54) "Personnel has a vested interest in effectively maintaining the system and has a better understanding of functional requirements" is an advantage of which maintenance organizational structure? A) Separate B) Non-functional C) Combined D) Functional Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 55) "Documentation and testing thoroughness may suffer due to a lack of a formal transfer of responsibility" is a disadvantage of which maintenance organizational structure? A) Separate B) Non-functional C) Combined D) Functional Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 56) "All things cannot be documented, so the maintenance group may not know critical information about the system" is a disadvantage of which maintenance organizational structure? A) Separate B) Non-functional C) Combined D) Functional Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

15 Copyright © 2020 Pearson Education, Inc.


57) "Personnel may have limited job mobility and lack access to adequate human and technical resources" is a disadvantage of which maintenance organizational structure? A) Separate B) Non-functional C) Combined D) Functional Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 58) MTBF stands for ________. A) Maintenance time between failures B) Mean time between failures C) Medium time between failures D) Maintainability time between failures Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 59) Measuring the number of and time between failures will provide you with the basis to calculate a widely used measure of system quality. This metric is referred to as ________. A) Mean time between failures B) Maintenance time between failures C) Medium time between failures D) Maintainability time between failures Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

16 Copyright © 2020 Pearson Education, Inc.


60) MTBF is a measurement of ________ occurrences that can be tracked over time to indicate the quality of a system. A) Maintenance B) Quality C) Effort D) Error Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 61) If the MTBF does not rapidly ________ over time, it will be a signal to management that major problems exist within the system that are not being adequately resolved through the maintenance process. A) Increase B) Decrease C) Slow D) Stop Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 62) Who receives the maintenance request when an organizational group that uses the system will make a request to change the system? A) System Priority Board B) Maintenance Staff C) Project Manager D) Other Groups Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

17 Copyright © 2020 Pearson Education, Inc.


63) Who categorizes and prioritizes the maintenance request in relation to both the strategic and information systems plans of the organization? A) System Priority Board B) Maintenance Staff C) Project Manager D) Other Groups Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 64) On a periodic basis, who prepares a report of all pending tasks in the change request queue? A) System Priority Board B) Maintenance Staff C) Project Manager D) Other Groups Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 65) The process of ensuring that only authorized changes are made to a system is known as ________. A) Change request B) Build routines C) Baseline modules D) Configuration management Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

18 Copyright © 2020 Pearson Education, Inc.


66) Who is responsible for controlling the checking out and checking in of baseline modules for a system when a system is being developed or maintained? A) System Librarian B) System Priority Board C) Maintenance Staff D) Project Manager Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 67) ________ is/are the guidelines that list the instructions to construct an executable system from the baseline source code. A) Change request B) Build routines C) Baseline modules D) Configuration management Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 68) If ________ is/are assigned to make changes to a system, they must first check out a copy of the baseline system modules since no one is allowed to directly modify the baseline modules. A) System Priority Board B) Maintenance personnel C) A project manager D) Other groups Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

19 Copyright © 2020 Pearson Education, Inc.


69) Before any code can be checked back in to the librarian, the code must pass the quality control procedures, testing, and documentation standards established by the ________. A) Librarian B) Maintenance personnel C) Project manager D) Organization Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 70) Who is responsible for keeping copies of all prior versions of all system modules, including the build routines? A) System Priority Board B) Librarian C) Project manager D) Organization Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 71) ________ is/are needed to construct any version of the system that has ever existed. A) Change requests B) Build routines C) Baseline modules D) Configuration management Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

20 Copyright © 2020 Pearson Education, Inc.


72) ________ tools allow one to trace an executable code module back to its original source code version, greatly speeding the identification of programming errors. A) Change request B) Build routines C) Baseline modules D) Configuration management Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 73) Automated tools that read program source code as input and create graphical and textual representations of design-level information such as program control structures, data structures, logical flow, and data flow are known as ________. A) Reverse engineering B) Re-engineering C) Performance engineering D) Designing Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 74) Automated tools that read program source code as input; perform an analysis of the program's data and logic; and then automatically, or interactively with a systems analyst, alter an existing system in an effort to improve its quality or performance are known as ________. A) Reverse engineering B) Re-engineering C) Performance engineering D) Designing Answer: B Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

21 Copyright © 2020 Pearson Education, Inc.


75) When using an integrated development environment, ________ maintain(s) design documents such as data flow diagrams and screen designs, not source code. A) The testing team B) The developer C) Analysts D) The project manager Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 76) Which tools have a primary benefit to create high-level design documents of a program by reading and analyzing its source code? A) Design recovery B) Build routines C) Baseline modules D) Configuration management Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 77) ________ tools are those that can create a representation of a system or program module at a design level of abstraction. A) Configuration management B) Reengineering C) Reverse engineering D) Build routines Answer: C Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

22 Copyright © 2020 Pearson Education, Inc.


78) A primary objective of using automated tools for systems development and maintenance is to radically change the way in which ________ and documentation are modified and updated. A) Test plan B) Code C) Software D) Functionality Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 79) Before modified or new pages are published, pages should be processed by a code validation routine to ensure that all the code, including applets, works. This is known as ________. A) HTML validation B) Reregistration C) Broken link check D) Future edition Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 80) It may be necessary to ________ a Web site with search engines when the content of the site changes significantly. A) Update B) Configure C) Reregister D) HTML validate Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

23 Copyright © 2020 Pearson Education, Inc.


81) The most common maintenance issue for any Web site (besides changing the content of the site) is validating that ________ from site pages are still accurate. A) Content B) Menus C) HTML D) Links Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 82) ________ may be necessary in order for visitors to find your site based on the new or changed content. A) Update B) Reregistration C) Configuration D) HTML validation Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 83) To avoid confusion with Web site changes, one can post indications of future enhancements to the site and can batch changes to reduce the frequency of site changes. This is known as ________, for Web site maintenance. A) HTML validation B) Reregistration C) Broken link check D) Future edition Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

24 Copyright © 2020 Pearson Education, Inc.


84) Enhancement-type requests must first be evaluated to see whether they are aligned with future business and information systems' plans. If not, the request will be rejected and the requester will be informed. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 85) A final aspect of managing maintenance is reverse engineering, which is the process of ensuring that only authorized changes are made to a system. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 86) When various maintenance personnel working on different maintenance tasks complete each task, the librarian notifies those still working that updates have been made to the baseline modules. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 87) With source control tools, each system module file is "frozen" (unchangeable) to a specific version level or is designated as "floating" (changeable), meaning a programmer may check out, lock, and modify a specific system module. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

25 Copyright © 2020 Pearson Education, Inc.


88) Revision code control tools extend revision control to not only a single module, but to any interrelated files to the module being changed. Answer: FALSE Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 89) A primary objective of using automated tools for systems development and maintenance is to radically change the way in which code and documentation are modified and updated. Answer: TRUE Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 90) What are the advantages of the different maintenance organizational structures? Answer: The text presented three different maintenance organizational structures: separate, combined, and functional. The separate approach's advantage is that the formal transfer of systems between groups improves the system and documentation quality. The combined structure's advantage is that the maintenance group knows or has access to all assumptions and decisions behind the system's original design. The functional approach's advantage is that the personnel have a vested interest in effectively maintaining the system and a better understanding of the functional requirements. Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 91) What are some reasons why organizations should be concerned with how they manage and assign maintenance personnel? Answer: One key issue is that many systems professionals don't want to perform maintenance because they feel that it is more exciting to build something new than change an existing system. Also, organizations have historically provided greater rewards and job opportunities to those performing new development, thus making people shy away from maintenance-type careers. Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 26 Copyright © 2020 Pearson Education, Inc.


92) Define MTBF. Answer: Mean time between failures is a measurement of error occurrences that can be tracked over time to indicate the quality of a system. Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 93) How does an organization control maintenance requests? Answer: There are various types of maintenance requests—some correct minor or severe defects in the systems, whereas others improve or extend system functionality. From a management perspective, a key issue is deciding which requests to perform and which to ignore. Because some requests will be more critical than others, some method of prioritizing requests must be determined. First, you must determine the type of request. If, for example, the request is an error—that is, a corrective maintenance request—then the flowchart shows that the request is placed in the queue of tasks waiting to be performed on the system. For an error of high severity, repairs to remove it must be made as soon as possible. If, however, the error is considered "nonsevere," then the change request can be categorized and prioritized based upon its type and relative importance. Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 94) Discuss the concept of configuration management. Who is the system librarian? Answer: Configuration management is the process of assuring that only authorized changes are made to a system. When system maintenance is required, maintenance personnel check out the baseline modules from a system librarian. The system librarian controls the checking out and checking in of baseline modules for a system when a system is being developed or maintained. Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis

27 Copyright © 2020 Pearson Education, Inc.


95) Describe the two tools that help with maintenance of older systems. Answer: The automated tools are reverse engineering and re-engineering. Reverse engineering tools are those that can create a representation of a system or program module at a design level of abstraction. Re-engineering tools extend reverse engineering tools by automatically (or interactively with a systems analyst) altering an existing system in an effort to improve its quality or performance. Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 96) What is the most common maintenance issue for Web sites? Answer: Arguably the most common maintenance issue for any Web site (besides changing the content of the site) is validating that links from site pages (especially for links that go outside the source site) are still accurate. Periodic checks need to be performed to make sure active pages are found from all links. In addition, periodic human checks need to be performed to make sure that the content found at a still-existing referenced page is still the intended content. Difficulty: Difficult AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 97) Describe the two methods for maintaining a Website 24/7/365? Answer: The two approaches mentioned in the textbook are locking out use of the pages while the changes are made and including a time and date stamp of the most recent change. Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 98) List the special issues and procedures encountered when maintaining Web sites. Answer: 24/7/365, broken links, HTML validation, reregistration, and future editions. Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis

28 Copyright © 2020 Pearson Education, Inc.


99) What type of maintenance was being performed on PVF's WebStore to improve system reliability? Answer: "It is clearly adaptive in that we plan to migrate the system to a more reliable environment. It is also perfective and preventive. …It is perfective in that we want to make some operational changes that will improve system performance, and it is also preventive given that one of our objectives is to reduce the likelihood of system failures." Difficulty: Difficult AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Synthesis 100) During the maintenance phase system change requests are implemented via an informal review process. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 101) All of the following are reasons why some type of system service request documents are needed during the maintenance phase except ________. A) to keep users happy B) request new features C) report problems D) request new development Answer: A Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 102) The maintenance phase of the SDLC is a subset of the activities of the entire development process. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept

29 Copyright © 2020 Pearson Education, Inc.


103) The business needs of XYZ, Inc is changing so the company will have to go through ________ to evolve its functionality. A) preventive maintenance B) perfective maintenance C) corrective maintenance D) adaptive maintenance Answer: D Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 104) Which type of maintenance offers the least value to the organization? A) Preventive B) Adaptive C) Corrective D) Perfective Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.1 Explain and contrast four types of maintenance Classification: Concept 105) Which percentage defines an organization's information systems maintenance costs? A) 60 to 80 percent B) 10 to 30 percent C) 52 percent D) 5 percent Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 106) Which of the following is NOT a significant maintenance cost? A) Number of latent defects B) Number of tools used C) Number of customers D) Documentation quality Answer: B Difficulty: Easy AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 30 Copyright © 2020 Pearson Education, Inc.


107) Lack of ________ can cause maintenance efforts to increase exponentially. A) Maintenance personnel B) Customer use C) Quality documentation D) Measurement for unknown errors Answer: C Difficulty: Easy AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 108) Packaged software does not require any maintenance. Answer: FALSE Difficulty: Easy AACSB: Information Technology L.O.: 14.2 Describe several factors that influence the cost of maintaining an information system and apply these factors to the design of maintainable systems Classification: Concept 109) A company has to have all of the following factors to measure effectiveness except ________. A) Number of failures B) Time between failures C) Type of failure D) Which department caused the failure Answer: D Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept 110) Managing the queue of pending tasks during the maintenance phase is important. Answer: TRUE Difficulty: Easy AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

31 Copyright © 2020 Pearson Education, Inc.


111) Which configuration management tool freezes a specific version level so a programmer check out, lock, and modify a specific system module? A) Revision control B) Lockout maintenance C) SRR D) Integrated testing Answer: A Difficulty: Moderate AACSB: Information Technology L.O.: 14.3 Describe maintenance management issues, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management Classification: Concept

32 Copyright © 2020 Pearson Education, Inc.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.