Chapter 1
4. The term ____ refers to the combination of hardware and software products and services that
companies use to manage, access, communicate, and share information.
A: practical technology
B: electronic technology
C: information technology
D: systems technology
5. ____ tests system concepts and examine input, output, and user interfaces before final
decisions are made.
A: CASE tools
B: Prototyping
C: Investigative design
D: Group typing
7. The programs that control the hardware and produce the desired information or results are
referred to as ____.
A: data
B: people
C: processes
D: software
8. ____ verifies that an individual demonstrated a certain level of knowledge and skill on a
standardized test.
A: Certification
B: Validation
C: Documentation
D: Authentication
9. The ____ are logical rules that identify data patterns and relationships.
A: linear rules
B: system rules
C: inference rules
D: productivity rules
10. A graphical representation of one or more tasks that a company performs is considered ____.
A: a business model
B: a business process
C: a business profile
D: an analytic profile
11. Data that has been transformed into output that is valuable to users is ____.
A: mission
B: information
C: operations
D: processes
12. The IT group provides technical support that includes all of the following EXCEPT ____.
A: Web support
B: application development
C: user systems requests
D: database administration
13. The newest development in data acquisition is called ____ technology, which uses high-
frequency radio waves to track physical objects.
A: RID
B: RAD
C: RFID
D: FID
14. A ____ is an overview that describes a company's overall functions, processes, organization,
products, services, customers, suppliers, competitors, constraints, and future direction.
A: business model
B: business process
C: business system
D: business profile
17. When first introduced, management information systems (MIS) was a category of systems
which served ____.
A: managers
B: administrative staff
C: operational personnel
D: maintenance staff
18. The ____ is NOT an example of an internal user of a company's information system.
A: customers who track their orders on a company's Web site
B: company's technicians
C: company's sales staff
D: company's corporate officers
20. Structured analysis uses a set of process models to describe a system ____.
A: in words
B: in numbers
C: dynamically
D: graphically
22. The combination of information technology, people, and data to support business
requirements is called a(n) ________.
A: active data system
B: information system
C: electronic system
D: communal system
27. The process used by systems analysts to represent company operations and information
needs is called ________.
A: user targeted modeling
B: business action modeling
C: business process modeling
D: product modeling
31. ________ refers to information systems that support company-wide operations and data
management requirements.
A: EDI
B: WebSphere strategy
C: E-commerce
D: Enterprise computing
32. The most popular options for developing information systems are structured analysis, object-
oriented analysis, and ________.
A: data flow analysis
B: network methods
C: modeling
D: agile methods
33. The systems planning phase usually begins with a formal request to the IT department,
called a ________.
A: systems order
B: client complaint
C: planning request
D: systems request
34. A development method that Microsoft calls ________ documents the experience of its own
software development teams.
A: Rational Unified Process
B: Microsoft Application Development
C: Microsoft Solutions Framework
D: Microsoft Xtreme Programming
Chapter 2 Review
1. An evaluation of the resources needed for users to be trained on a new system is part of ____
feasibility.
A: economic
B: technical
C: operational
D: schedule
5. Many companies use ____ request forms that can be filled out and submitted electronically.
A: printed
B: faxed
C: online
D: offline
6. A company's ____ are broken down into one-year, three-year, and five-year categories.
A: objectives
B: goals
C: requirements
D: inventory
7. The coding of data to keep it safe from unauthorized users is called ____.
A: prototyping
B: encryption
C: password access
D: key access
10. Chapter 2 explained four types of project feasibility tests that a systems request must pass
and did NOT include ____ feasibility.
A: technical
B: marketing
C: economic
D: schedule
11. An examination of the reliability of the hardware and software environment for a new system is
part of ____ feasibility.
A: economic
B: technical
C: operational
D: schedule
12. A project where management has a yes/no choice to implement is called a ____ project.
A: nondiscretionary
B: discretionary
C: resource
D: non-resource
13. A popular technique for investigating causes and effects is called a(n) ____.
A: Ishikawa diagram
B: arrowhead diagram
C: Moore diagram
D: Problem/Solution diagram
14. A fact-finding method during the preliminary investigation includes all of the following
EXCEPT ____.
A: observing the current system in operation
B: conducting a survey of users
C: reviewing current system documentation
D: figuring out the costs of the solution
15. ____ feasibility means that a project can be implemented in an acceptable time frame.
A: Technical
B: Time
C: Schedule
D: Operational
17. Vital objectives that must be achieved for the enterprise to fulfill its mission are considered
____.
A: the SDLC
B: critical success factors
C: critical business issues
D: CASE tools
18. Hardware-based security controls that can identify a person by a retina scan or by mapping a
facial pattern are referred to as ____.
A: biological devices
B: encrypted devices
C: strategic scanning devices
D: biometric devices
19. The purpose of a(n) ____ system is to provide the right product in the right place at the right
time.
A: EDI
B: CRM
C: CASE
D: JIT
22. A(n: ____ is a requirement or condition that a system must satisfy or an outcome that a
system must achieve.
A: condition
B: constraint
C: impediment
D: obstacle
24. ____ considers questions such as “Does management support the project?” and “Will the new
system require training for users?”
A: schedule feasibility
B: technical feasibility
C: economic feasibility
D: operational feasibility
25. ____ components can provide automated response to sales inquiries, Web-based order
processing, and online inventory tracking.
A: Mission statement
B: Customer relationship management (CRM)
C: Feasibility study
D: Total cost of ownership (TCO:
26. A feasibility study includes tests for ____ feasibility, which means that the projected benefits
of the proposed system outweigh the estimated costs.
A: economic
B: schedule
C: operational
D: technical
28. When setting priorities for systems requests, the highest priority goes to projects that provide
the ____.
A: least benefit, at the highest cost, in the longest period of time
B: least benefit, at the lowest cost, in the longest period of time
C: greatest benefit, at the highest cost, in the shortest period of time
D: greatest benefit, at the lowest cost, in the shortest period of time
29. Projects where management has a choice in implementing them are called ____ projects.
A: discretionary
B: nondiscretionary
C: appended
D: concatenated
30. A systems analyst conducts a(n: ____ investigation to study the systems request and
recommend specific action.
A: preliminary
B: appendix
C: systems
D: transitional
Chapter 3 Review
1. The project ____ handles administrative responsibilities for the development team and
negotiates with users you might have conflicting requirements.
A: expediter
B: supporter
C: coordinator
D: leader
4. Project ____ includes identifying project tasks and estimating completion time and costs.
A: planning
B: scheduling
C: monitoring and controlling
D: reporting
5. With PERT/CPM, the ____ is the amount of time it will take to complete a task.
A: time assignment
B: time duration
C: time length
D: time pattern
6. A ____ walk-through is a review of a project team member's work by other members of the
team.
A: status
B: structured
C: open
D: private
7. Project ____ involves the creation of a specific timetable, usually in the form of charts that
show tasks, task dependencies, and critical tasks that may delay a project.
A: planning
B: scheduling
C: monitoring and controlling
D: reporting
8. With PERT/CPM, tasks that must be completed one after the other, like a relay race, are called
____ tasks.
A: dependent
B: independent
C: fast
D: tiered
9. Walk-throughs that take place throughout the SDLC are also called all of the following EXCEPT
____.
A: code reviews
B: design reviews
C: testing reviews
D: timing review
10. Project ____ requires guiding, supervising, and coordinating the project team's workload.
A: planning
B: scheduling
C: monitoring and controlling
D: reporting
12. Project managers can use ____ software to help plan, estimate, schedule, monitor, and report
on a project.
A: change control
B: project management
C: project resource
D: path management
13. Project ____ tasks include regular progress reports to management, users, and the project
team itself.
A: planning
B: scheduling
C: monitoring and controlling
D: reporting
14. When several tasks can start at the same time, each is called a ____ task.
A: concurrent
B: successor
C: predecessor
D: dependent
15. When software is ____ it is free, and supported by a large group of users and developers.
A: free-source
B: open-source
C: private-source
D: share-source
16. A(n) ____, or activity, is any work that has a beginning and an end and requires the use of
company resources such as people, time, or money.
A: event
B: task
C: habit
D: plan
17. Often, two or more concurrent tasks, depend on a single prior task, which is called a ____.
A: concurrent
B: successor
C: predecessor
D: dependent
19. A(n) ____, or milestone, is a recognizable reference point that can be used to monitor progress
and manage the project.
A: plan
B: habit
C: event
D: task
20. In the situation where concurrent tasks depend on a predecessor task, each concurrent task is
called a ____ task.
A: dependent
B: successor
C: predecessor
D: dependent
21. A ____ path includes all tasks that are vital to the project schedule.
A: vital
B: baseline
C: critical
D: foundational
22. A(n: ____ chart displays complex task patterns and relationships.
A: Gantt
B: index
C: PERT/CPM
D: task
23. In developing time and cost estimates, project managers must consider _____.
A: project size and scope
B: IT resources
C: prior experience with similar projects or systems
D: all of the above
25. A task is any work that requires the use of company resources including all of the following
EXCEPT ____.
A: controlling capital
B: people
C: time
D: money
26. A risk management plan includes a review of all of the following EXCEPT ____.
A: employees
B: project scope
C: stakeholders
D: budget
28. Microsoft’s risk management model includes all of the following EXCEPT ____.
A: category, which specifies the risk type
B: probability, which indicates the degree of adverse effect should the risk occur, on a scale of 1
to 10
C: mitigation plan, which identifies plans to control or limit the risk
D: trigger, which identifies a condition that would initiate the contingency plan
30. All of the following are versions of Microsoft Office Project 2007 EXCEPT ____.
A: Standard
B: Enterprise
C: Professional
D: Server
Chapter 4 Review
1. The sales tracking system must produce a daily fast-moving-item report, listing all products
that exceed the forecasted sales volume grouped by style, color, size, and reorder status is an
example of a(n) ____ requirement.
A: output
B: input
C: processes
D: performance
2. Response time must not exceed four seconds is an example of a(n) ____ requirement.
A: control
B: input
C: process
D: performance
4. A ____ is a document containing a number of standard questions that can be sent to many
individuals.
A: questionnaire
B: survey
C: both a. and b.
D: neither a. nor b.
5. If you want to ensure that the sample is balanced geographically, you could use a ____ sample
to select five customers from each of four zip codes.
A: random
B: systematic
C: stratified
D: structured
6. In ____ brainstorming, each participant speaks when it is his or her turn, or passes.
A: unstructured
B: structured
C: random
D: systematic
7. A ____, such as Microsoft Outlook or Lotus Organizer, can help manage those tasks and
provide a personal calendar and a to-do list, with priorities and the capability to check off
completed items.
A: PDA
B: DPA
C: PIM
D: PMI
8. Chapter 4 describes ____, which involves fact-finding to describe the current system and
identification of the requirements for the new system, such as outputs, inputs, processes,
performance, and security.
A: output design
B: requirements modeling
C: requirements design
D: output modeling
9. ____ refer to the logical rules that are applied to transform the data into meaningful information.
A: Outputs
B: Inputs
C: Processes
D: Performance
10. ____ analysis identifies the data flowing into a process, the business rules that transform the
data, and the resulting output data flow.
A: Structured
B: Data
C: Enterprise
D: Process
11. ____ skills are especially valuable to a systems analyst who must work with people at all
organizational levels, balance conflicting needs of users, and communicate effectively.
A: Data processing
B: Personal
C: Analytical
D: Interpersonal
12. ____ methods represent a recent trend that stresses intense interaction between system
developers and users.
A: Co-op
B: Object
C: Flow
D: Agile
14. During the ____ phase, users interact with systems analysts and develop models and
prototypes that represent all system processes, outputs, and inputs.
A: software design
B: software rollout
C: user design
D: user rollout
16. A ____ diagram visually represents the interaction between users and the information system.
A: data case
B: requirements case
C: use case
D: design case
17. A ____ requirement is a characteristic or feature that must be included in an information
system to satisfy business requirements and be acceptable to users.
A: management
B: system
C: program
D: data
18. The department head must enter overtime hours on a separate screen is an example of a(n)
____ requirement.
A: output
B: input
C: processes
D: performance
19. All transactions must have audit trails is an example of a(n) ____ requirement.
A: control
B: input
C: process
D: performance
20. Your primary responsibility during an interview is to listen carefully to the answers,
concentrate on what is said and notice any nonverbal communication that takes place. This
process is called ____ listening.
A: closed
B: tracked
C: open
D: engaged
21. A common tool for showing the distribution of a questionnaire or sampling results is a vertical
bar chart called a(n) ____.
A: flowchart
B: histogram
C: agile method
D: Venn diagram
23. All of the following are categories of system requirements EXCEPT ____.
A: outputs
B: dynamics
C: performance
D: controls
24. The term ____ refers to a system’s ability to handle increased business volume and
transactions in the future.
A: scalability
B: reliability
C: compatibility
D: applicability
25. Microsoft has developed a method for measuring a system’s total costs and benefits, called
____, which is a framework to help IT professionals analyze and optimize IT investments.
A: TCO
B: REJ
C: FDD
D: UML
26. ____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a
useful solution.
A: Analytical skills
B: Artistic skills
C: Interpersonal skills
D: Confrontational skills
27. ____ is a typical example of a system requirement for the output category.
A: Manufacturing employees must swipe their ID cards into data collection terminals that record
labor costs
B: The contact management system must generate a daily reminder list for all sales reps
C: The student records system must allow record access by either the student name or the
student number
D: The system must support 25 users simultaneously
28. One of the main activities in the systems analysis phase is ____ modeling, which involves fact-
finding to describe the current system and identification requirements for the new system.
A: objective
B: requirements
C: goal-based
D: user-based
29. Using a(n) ____, an analyst can show business functions and break them down into lower-
level functions and processes.
A: UML
B: TCO
C: FDD
D: REJ
30. A(n) ____ diagram shows the timing of interactions between objects as they occur.
A: timing
B: ordering
C: orientation
D: sequence
Chapter 5 Review
1. Whether to use a decision table or a decision tree often is a matter of ____.
A: personal preference
B: data requirements
C: cycle times
D: number of domains
2. A set of DFDs provides a ____ model that shows what the system does, not how it does it.
A: control
B: data
C: logical
D: physical
3. The symbol for an entity is a ____, which may be shaded to make it look three dimensional.
A: circle
B: triangle
C: rectangle
D: square
4. ____ maintains consistency among a set of DFDs by ensuring that input and output data flows
align properly.
A: Diverging
B: Balancing
C: Looping
D: Decomposing
5. The data ____ serves as a central storehouse of documentation for an information system.
A: dictionary
B: store
C: diagram
D: partition
6. ____ English is a subset of standard English that describes logical processes clearly and
accurately.
A: Logical
B: Structured
C: Simple
D: Dictionary
9. When you explode a DFD, the higher-level diagram is called the parent diagram, and the lower-
level diagram is referred to as the ____ diagram.
A: subset
B: child
C: pet
D: subordinate
10. ____ refers to whether the data element contains numeric, alphabetic, or character values.
A: Domain
B: Type
C: Category
D: Rules
12. In DFDs, a process symbol can be referred to as a ____, because the inputs, outputs, and
general functions of the process are known, but the underlying details and logic of the process
are hidden.
A: blue box
B: black box
C: gray hole
D: black hole
13. To draw a context diagram, you start by placing a single process symbol ____.
A: in the center of the page
B: at the top of the page
C: at the bottom of the page
D: anywhere on the page
14. Data elements are combined into ____, also called data structures.
A: domains
B: records
C: skeletons
D: iterations
15. Modular design is based on combinations of three logical structures that does NOT include
____.
A: sequence
B: source
C: selection
D: iteration
16. The only disadvantage of the four-model approach is the added ____ needed to develop a
logical and physical model of the current system.
A: time
B: cost
C: both a. and b.
D: neither a. nor b.
17. DFDs use four basic symbols that represent all EXCEPT the following ____.
A: data flows
B: data stores
C: entities
D: attributes
18. DFD entities also are called ____, because they are data origins or final destinations.
A: pseudocode
B: terminators
C: originators
D: sink holes
20. A ____ documents the details of a functional primitive, and represents a specific set of
processing steps and business logic.
A: diagram description
B: physical model
C: data structure
D: process description
Chapter 6 Review
3. Objects within a class can be grouped into ____, which are more specific categories within a
class.
A: sub-states
B: mini-states
C: subclasses
D: mini-classes
4. The line from the actor to the use case is called a(n) ____, because it links a particular actor to a
use case.
A: association
B: partition
C: instance
D: relationship
5. Just as structured analysis uses DFDs to model data and processes, systems analysts use the
____ to describe object-oriented systems.
A: UML
B: Java
C: FTP
D: OOD
6. The ____ shows what is included in the system (inside the rectangle) and what is not included
in the system (outside the rectangle).
A: system diagram
B: system boundary
C: system border
D: system template
7. When you identify use cases, try to group all the related transactions into ____.
A: a single use case
B: several use cases
C: either a. or b.
D: neither a. nor b.
9. Like a DFD, a class diagram is a(n) ____ model, which evolves into a physical model and finally
becomes a functioning information system.
A: static
B: logical
C: random
D: object
11. A ____ is identified by a dashed line and represents the time during which the object above it
is able to interact with the other objects in the use case.
A: lifeline
B: timeline
C: interaction line
D: safe line
14. The concept that a message gives different meanings to different objects is called ____.
A: multi-use
B: state versatility
C: action flexibility
D: polymorphism
17. When the outcome of one use case is incorporated by another use case, we say that the
second case ____ the first case.
A: uses
B: incorporates
C: needs
D: pairs with
19. In a class diagram, each class appears as a(n) ____, with the class name at the top, followed
by the class's attributes and methods.
A: rounded rectangle
B: rectangle
C: oval
D: circle
20. A use case diagram is a visual summary of several related use cases within a ____.
A: system
B: subsystem
C: either a. or b.
D: neither a. nor b.
21. ____ is a widely used method of visualizing and documenting an information system.
A: UML
B: Java
C: UNIX
D: DFD
22. Objects can have a specific attribute called a(n) ____, which describes the object’s current
status.
A: state
B: cycle
C: instance
D: status
24. Sequence diagrams include symbols that represent all of the following EXCEPT ____.
A: classes
B: indices
C: lifelines
D: messages
25. The number of ____ needed to describe an object depends on the business requirements of
the information system and its users.
A: attributes
B: packets
C: indices
D: keys
26. When you create a use case diagram, the first step is to identify the system boundary, which is
represented by a ____.
A: triangle
B: circle
C: rectangle
D: square
27. Inheritance enables an object to derive one or more of its attributes from a(n) ____.
A: user
B: precedent
C: antecedent
D: parent
28. ____ enables an object to derive one or more of its attributes from another object.
A: Concatenation
B: Encapsulation
C: Inheritance
D: Polymorphism
29. An object has certain ____, which are characteristics that describe the object.
A: keys
B: attributes
C: indices
D: packets
Chapter 7 Review
1. Another term for IBS is ____, because system operations are managed by the outside firm, or
host.
A: managed hosting
B: direct hosting
C: outside hosting
D: enterprise hosting
2. The choice between developing versus purchasing software often is called a ____ decision.
A: make or buy
B: build or buy
C: either a. or b.
D: neither a. nor b.
3. A software package that can be used by many different types of organizations is called a(n)
____ application.
A: vertical
B: horizontal
C: limited
D: unlimited
4. ____ was NOT listed as a reason that companies would develop software in-house versus
buying it from an outside source.
A: Meet constraints of existing systems
B: Develop internal resources and capabilities
C: Lower costs
D: Satisfy unique business requirements
5. Some user applications have powerful screen and report ____ that allow users to design their
own data entry forms and reports.
A: generators
B: creators
C: templates
D: files
6. The ____ of a project is the total value of the benefits minus the total value of the costs, with
both costs and benefits adjusted to reflect the point in time at which they occur.
A: ROI
B: NPV
C: EPS
D: IRR
7. When you use an ____, you already know the specific product or service you want and you
need to obtain price quotations or bids.
A: RFP
B: RFQ
C: NPV
D: TCO
8. The goal of systems design is to build a system that is ____.
A: effective
B: reliable
C: maintainable
D: all of the above
10. Web-based software usually requires additional layers, called ____, to communicate with
existing software and legacy systems.
A: hubs
B: portals
C: channels
D: middleware
12. A ____ model has a variable fee based on the number of users or workstations that have
access to the application.
A: managed
B: subscription
C: service
D: cloud computing
14. An accounting package is a good example of a(n) ____ application because it can be utilized
by many different businesses, or separate divisions that exist in large, diversified companies.
A: vertical
B: horizontal
C: limited
D: unlimited
15. The following is NOT one of the three ways the chapter listed as a way to customize a software
package: ____.
A: You can merge two existing packages into one solution
B: You can purchase a basic package that vendors will customize to suit your needs.
C: You can purchase the package and make your own modifications, if this is permissible under
the terms of the software license.
D: You can negotiate directly with the software vendor to make enhancements to meet your needs
by paying for the changes.
17. The Systems Analyst's Toolkit explains how to use three main cost analysis tools that do NOT
include ____.
A: payback analysis
B: ROI
C: NPV
D: EPS
18. Another valuable resource is the Internet bulletin board system that contains thousands of
forums, called ____, that cover every imaginable topic.
A: gatherings
B: newsgroups
C: social groups
D: feeds
19. The two major Web-based development environments are IBM's WebSphere and Microsoft's
____.
A: .NET
B: JavaScript
C: Office
D: Access
20. ____ development treats the Web as the platform, rather than just a communication channel.
A: Internet-based
B: Traditional
C: both a. and b.
D: neither a. nor b.
21. Although the traditional model of software acquisition still accounts for more software
acquisition, a new model called ____ is changing the picture dramatically.
A: Hardware as a Help
B: Software as a Service
C: Processing as a Product
D: Storage as a Solution
22. A ____ measures the time a package takes to process a certain number of transactions.
A: newsgroup
B: parameter
C: benchmark
D: default
23. A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel,
which has been configured in a specific manner to enhance user productivity.
A: application
B: configuration
C: interface
D: interpolation
24. ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed
working version of a proposed system.
A: Prototyping
B: Outsourcing
C: Coding
D: Benchmarking
26. A(n: ____ model is an outsourcing fee model that charges a variable fee based on the volume
of transactions or operations performed by the application.
A: method
B: administrative
C: transaction
D: interpolated
27. In combination, the powerful tools that systems analysts use to provide a framework for rapid,
efficient software development, is called a ____ environment.
A: 2GL
B: 3GL
C: 4GL
D: 5GL
28. In addition to configuring software, an IT staff can create a user ____, which includes screens,
commands, controls, and features that enable users to interact more effectively with the
application.
A: montage
B: index
C: interface
D: package
29. Guidelines to follow when determining data entry and storage considerations include all of the
following except ____.
A: data should be entered into the system where and when it occurs
B: data should be verified when it is entered
C: data duplication should be encouraged
D: data should be entered into a system only once
30. Reports that trace the entry of and changes to critical data values are called ____ and are
essential in every system.
A: audit trails
B: protective pathways
C: backtracks
D: value tracks
Chapter 8 Review
1. A ____ check tests data items to verify that they fall between a specified minimum and
maximum value.
A: process-control
B: toggle button
C: data validation
D: range
2. Web-based logs, called ____, are journals written from a particular point of view.
A: wogs
B: jogs
C: blogs
D: logs
3. ____ interaction describes the relationship between computers and people who use them to
perform business-related tasks.
A: Human-computer
B: Person-computer
C: Human-PC
D: Person-PC
4. Companies use various ____ methods to maintain output integrity and security. For example,
every report should include an appropriate title, report number or code, printing date, and time
period covered.
A: output reporting
B: output listing
C: output control
D: output checking
5. ____ includes the necessary measures to ensure that input data is correct, complete, and
secure.
A: Output control
B: Input control
C: either a. or b.
D: neither a. nor b.
6. When designing a report, you should prepare a sample report, which is called a ____, for users
to review.
A: mock-up
B: prototype
C: either a. or b.
D: neither a. nor b.
8. A ____ report produces one or more lines of output for each record processed.
A: summary
B: highlights
C: control
D: detail
9. A ____ check identifies values that are questionable, but not necessarily wrong.
A: reasonableness
B: process-control
C: data validation
D: range
10. A ____ is a specially formatted digital audio file that can be downloaded by Internet users from
a variety of content providers.
A: songcast
B: podcast
C: listencast
D: voicecast
11. A ____ interface uses icons, graphical objects, and pointing devices.
A: green screen
B: Web 1.0
C: human-computer
D: graphical user
12. Output ____ protects privacy rights and shields the organization's proprietary data from theft
or unauthorized access.
A: reporting
B: prototyping
C: security
D: safety
13. Once data is entered, the company should store source documents in a safe location for some
specified length of time according to their ____ policy.
A: records retention
B: records safety
C: records filing
D: records scanning
14. After a report design is approved, you should document the design by creating a report ____
form, which contains information about the fields, data types and lengths, and report frequency.
A: system
B: analysis
C: design
D: prototype
15. The main part of the form, called the ____ zone, usually takes up at least half of the space on
the form and contains captions and areas for entering variable data.
A: body
B: heading
C: footer
D: authorization
16. Each line of output printed is called a ____ line.
A: detail
B: information
C: data
D: control
17. A ____ check is used for data items that must have certain values.
A: process-control
B: reasonableness
C: validity
D: range
18. An automated facsimile or ____ system allows a customer to request a fax using e-mail, via
the company Web site, or by telephone.
A: fax fast
B: fax mail
C: fax now
D: faxback
19. A ____ check improves input quality by testing the data and rejecting any entry that fails to
meet specified conditions.
A: data resources
B: data dependency
C: data validation
D: data quality
20. A ____ workstation is a network terminal that supports a full-featured user interface, but limits
the printing or copying of data, except to certain network resources that can be monitored and
controlled.
A: disk
B: diskless
C: either a. or b.
D: neither a. nor b.
21. Sensitive data can be coded, in a process called ____, so only users with decoding software
can read it.
A: filtering
B: context safety
C: spam
D: encryption
22. A popular security solution is the use of a network based application, often called a ____, that
controls access to and from workstation interfaces.
A: port cop
B: port protector
C: workstation cop
D: workstation protector
23. A ____ report displays only those records that meet a specific condition or conditions.
A: exception
B: error
C: end
D: estimation
24. Good form ____ makes the form easy to complete and provides enough space, both vertically
and horizontally, for users to enter the data.
A: layout
B: processing
C: data entry
D: output
25. ____ is often used by large firms to scan and store images of original documents to provide
high-quality records management and archiving.
A: COF
B: COL
C: COS
D: COM
26. Using ____ input, data entry usually is performed on a specified time schedule, such as daily,
weekly, monthly, or longer.
A: batch
B: intermittent
C: sequence
D: combination
27. Every page should include a page ____, which appears at the top of the page and includes the
column headings that identify the data.
A: footer
B: header
C: control
D: signature
28. The ____ zone usually contains the company name or logo and the title and number of the
form.
A: control
B: heading
C: footer
D: body
29. Although the vast majority of reports are designed graphically, some systems still produce
one or more character-based reports that use a character set with ____ spacing.
A: fixed
B: variable
C: either a. or b.
D: neither a. nor b.
30. When the value of a control field changes, a control ____ occurs.
A: break
B: miss
C: mistake
D: error
31. A ____ check is performed on two or more fields to ensure that they are consistent or
reasonable when considered together.
A: dual
B: two-time
C: combination
D: readiness
32. ____ design focuses on user needs for screen and printed forms of output.
A: Output
B: User interface
C: both a. and b.
D: neither a. nor b.
33. A ____ describes how users interact with a computer system, and consists of all the hardware,
software, screens, menus, functions, output, and features that affect two-way communications
between the user and the computer.
A: user scope map
B: user interface
C: user path
D: user process
34. A ____ document is a form used to request and collect input data, trigger or authorize an input
action, and provide a record of the original transaction.
A: report
B: sequence
C: source
D: output
35. In addition to built-in design tools, popular software packages such as ____ Reports offer
powerful features that help designers deal with professional-level design issues across the
enterprise.
A: Crystal
B: Diamond
C: Gold
D: Platinum
36. The ____ zone contains codes, identification information, numbers, and dates that are used for
storing completed forms.
A: footer
B: control
C: body
D: heading
37. Database programs such as Microsoft Access include a variety of report design tools,
including a ____, which is a menu-driven feature that designers can use to create reports quickly
and easily.
A: Data Wizard
B: Data Generator
C: Report Wizard
D: Report Generator
38. A ____ box can display messages or provide a place for a user to enter data.
A: option
B: text
C: graphics
D: storyboard
39. In a user-centered system, the distinction blurs between ____ and the interface itself.
A: input
B: output
C: both a. and b.
D: neither a. nor b.
40. A sales manager might want to know total sales for each sales representative, but not want a
detail report listing every sale made by them. In that case, a ____ report is appropriate.
A: summary
B: highlights
C: error
D: regression analysis
41. A control break usually causes specific actions, such as printing subtotals for a group of
records. That type of detail report is called a ____ report.
A: control output
B: control series
C: control break
D: control error
42. Companies use various ____ methods to maintain output integrity and security. For example,
every report should include an appropriate title, report number or code, printing date, and time
period covered.
A: output reporting
B: output listing
C: output control
D: output checking
43. Data ____ is the process of manually entering data into the information system, usually in the
form of keystrokes or mouse clicks.
A: entry
B: checking
C: layout
D: switching
45. Data ____ policies and procedures protect data from loss or damage, which is a vital goal in
every organization.
A: control
B: process
C: security
D: integrity
46. Good interface design is based partly on ____, which provides the operational structure
required to carry out the design objectives.
A: aesthetics
B: interface technology
C: ergonomics
D: output security
47. When designing data entry screens, provide an on-screen instruction to let users know the
date format, and provide an example if the user must enter ____.
A: verifiers
B: clones
C: separators
D: masks
48. A key physical design element is the ____, which describes how users interact with a
computer system.
A: HCI
B: PCI
C: UI
D: PI
49. In a well-designed detail report, a field called a(n) ____ field controls the output.
A: break
B: indexed
C: dominant
D: control
51. In older systems, often the user interface mainly consisted of ____-control screens that
allowed a user to send commands to the system.
A: physical
B: process
C: input
D: command
52. In a source document, if totals are included on a form, they appear in the ____ zone.
A: calculated
B: control
C: totals
D: heading
53. Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that
shows the general screen layout and design.
A: storyboard
B: turnaround document
C: faxback
D: output control
55. In a data entry screen, a(n) ____ is a control feature that is used to represent on or off status
and switches to the other status when clicked.
A: command button
B: option button
C: toggle button
D: radio button
Chapter 9 Review
1. A ____ is a set of one or more fields that can occur any number of times in a single record, with
each occurrence having different values.
A: loop
B: repeating group
C: variety group
D: combination field
2. ____, which record details of all accesses and changes to the file or database, can be used to
recover changes made since the last backup.
A: Primary table files
B: Audit log files
C: Backup encryption files
D: Data warehouse records
4. During the system design phase, you use ____ to organize, access, and maintain data
structures.
A: key files
B: key records
C: key fields
D: key tables
5. ____ describes the numeric relationship between two entities and shows how instances of one
entity relate to instances of another entity.
A: Cardinality
B: ERD
C: The primary key
D: Normalization
7. A(n) ____ date is the total number of days from some specific base date.
A: arithmetic
B: control
C: absolute
D: variable
8. Data ____ problems can occur if updates are not applied in every file.
A: structure
B: security
C: integrity
D: redundancy
9. Because intranets and extranets use the same protocols as the Internet, they are called ____.
A: protocol-centric
B: client/server focused
C: middleware focused
D: Web-centric
10. A(n) ____ relationship exists when exactly one of the second entity occurs for each instance of
the first entity.
A: one-to-one
B: one-to-many
C: many-to-many
D: none of the above
11. Some abbreviation codes are called ____ codes because they use a specific combination of
letters that are easy to remember.
A: mnemonic
B: harmonic
C: rhyming
D: alphabetic
12. EBCDIC and ASCII require eight bits, or ____ byte(s), for each character.
A: one
B: two
C: three
D: four
13. A ____ language controls database operations, including storing, retrieving, updating, and
deleting data.
A: data manipulation
B: data query
C: data information
D: data communication
14. A ____ key is a field in one table that must match a primary key value in another table in order
to establish the relationship between the two tables.
A: primary
B: secondary
C: foreign
D: referential
16. Data ____ software looks for meaningful patterns and relationships among data.
A: process
B: validation
C: mart
D: mining
17. ____ fields are special fields within data records to provide additional control or security
information.
A: Primary
B: Audit
C: Check
D: Limit
18. The inherent efficiency of high-volume processing on larger computers is called ____.
A: flexible data sharing
B: data independence
C: controlled redundancy
D: economy of scale
19. A record, also called a ____, is a set of related fields that describes one instance of an entity.
A: tuple
B: couple
C: table
D: label
21. Any field that could serve as a primary key is called a ____ key.
A: candidate
B: summary
C: potential
D: primary
22. A ____ specifies the fields and identifies the primary key in a particular table or file.
A: output design
B: market basket design
C: table design
D: diagram design
23. A ____ is an integrated collection of data that can include seemingly unrelated information, no
matter where it is stored in the company.
A: data warehouse
B: data storehouse
C: database
D: database set
24. In the event of a file catastrophe, ____ procedures can be used to restore the file or database
to its current state at the time of the last backup.
A: recovery
B: reinstatement
C: back-up
D: security
25. A ____ file stores records that contain day-to-day business and operational data.
A: master
B: table
C: transaction
D: work
26. A(n) ____ is a person, place, thing, or event for which data is collected and maintained.
A: table
B: entity
C: field
D: record
27. A ____ relationship exists when one instance of the first entity can relate to many instances of
the second entity, and one instance of the second entity can relate to many instances of the first
entity.
A: one-to-one
B: one-to-many
C: many-to-many
D: none of the above
28. ____ codes combine data from different item attributes, or characteristics, to build the code.
A: Significant digit
B: Action
C: Derivation
D: Cipher
29. A ____ format uses only 16 bits to represent the number 12,345 in binary form.
A: integer
B: binary storage
C: long integer
D: character-based
30. A ____ consists of linked tables that form one overall data structure.
A: database structure
B: database system
C: open structure
D: open system
32. Without referential integrity, you might have a sales order called a(n) ____, because it has no
related customer.
A: orphan
B: loop
C: gap
D: error
34. ____ storage refers to data that a user can view, understand, and access, regardless of how or
where that information actually is organized or stored.
A: Logical
B: Physical
C: either a. or b.
D: neither a. nor b.
35. A ____ is a view of the database used by one or more systems or users.
A: schema
B: subschema
C: class
D: subclass
37. Field X is ____ on field Y if the value of field X depends on the value of field Y.
A: functionally independent
B: functionally dependent
C: either a. or b.
D: neither a. nor b.
38. Different privileges, also called ____, can be associated with different users of a computer
system.
A: passwords
B: user IDs
C: filters
D: permissions
39. A(n) ____ is a graphical model of an information system that depicts the relationships among
system entities.
A: SQL
B: OCE
C: ODBC
D: ERD
40. With a(n) ____ language, the user provides an example of the data requested.
A: SQL
B: IDE
C: QBE
D: interpolated
41. One common method of indicating ____ is called crow's foot notation because of the shapes,
which include circles, bars, and symbols that indicate various possibilities.
A: scalability
B: compatibility
C: cardinality
D: functionality
42. When a system reads a physical record, it loads the data from storage into a ____, which is a
segment of computer memory.
A: client
B: table
C: password
D: buffer
Chapter 10
1. A form of wireless transmission called ____ is very popular for short-distance wireless
communication that does not require high powe
A: Bluetooth
B: USB
C: RFID
D: Mbps
2. In the ____ section in a typical system design specification, startup processing, initial data
entry or acquisition, user training requirements, and software test plans are specified.
A: System Environment
B: Executive Summary
C: System Components
D: Implementation Requirement
3. The ____ technology is compatible with earlier 802.11 versions
A: BSS
B: ESS
C: ISS
D: MIMO
4. A ____, such as that illustrated in the accompanying figure, has a central networking device
that manages the network
A: hierarchical network
B: star network
C: bus network
D: ring network
5. In the OSI (open system interconnection: model, the application layer ____.
A: defines specific methods of transmitting data over the physical layer
B: provides network services requested by a local workstation
C: defines control structures that manage the communications link between computers
D: contains physical components that carry data
7. To increase bandwidth, the IEEE created two ____ to its initial standard to offer considerable
improvement in transmission speed.
A: amendments
B: options
C: LANs
D: versions
8. The ____ section in a typical system design specification describes the constraints, or
conditions, affecting a system, including any requirements that involve operations, hardware,
systems software, or security.
A: Time and Cost Estimates
B: System Environment
C: Executive Summary
D: System Components
9. During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an
information system that handles daily sales transactions and maintains the online inventory file.
A: POS
B: batch
C: topological
D: portal
11. When using the ____ configuration, a central wireless device called an access point is used to
serve all wireless clients
A: Basic Service Set
B: Extended Service Set
C: Independent Service Set
D: Dependent Service Set
12. An ____ Service Set is made up of two or more Basic Service Set networks.
A: Distributed
B: Extended
C: Dependent
D: Independent
13. In addition to Wi-Fi, another form of wireless transmission called ____ is very popular for
short-distance wireless communication that does not require high power.
A: Bluetooth
B: Redtooth
C: Blueconnect
D: Redconnect
14. ____ translates the logical design of an information system into a physical structure that
includes hardware, software, network support, processing methods, and security.
A: Network architecture
B: System architecture
C: Open architecture
D: Data architecture
17. IBM uses the term ____ to describe Internet-based solutions that allow sellers and buyers to
automate procurement processes and achieve substantial benefits.
A: e-marketplaces
B: e-resources
C: e-salesforce
D: e-networking
18. A ____ is a computer that supplies data, processing services, or other support to one or more
computers.
A: server
B: client
C: either a. or b.
D: neither a. nor b.
19. In addition to centralized data processing, early systems performed all data input and output
at a central location, often called a data processing ____.
A: marketplace
B: portal
C: center
D: hub
20. As technology became available, companies resolved the problems of stand-alone computing
by joining clients into a ____ that allows sharing of data and hardware resources.
A: cloud network
B: peer-to-peer network
C: Web-centric network
D: local area network
21. In a ____ design, also called a file sharing architecture, an individual LAN client has a copy of
the application program installed locally, while the data is stored on a central file server.
A: file server
B: data server
C: independent server
D: peer-to-peer server
22. The ____ stores the data and provides data access and database management functions.
A: client
B: server
C: either a. or b.
D: neither a. nor b.
23. A ____ client design locates all or most of the processing logic at the server.
A: fat
B: thin
C: tall
D: short
24. You can think of the middle layer in an n-tier design as a(n) ____, because it provides the
application logic, or business logic, required by the system.
A: functional server
B: application server
C: data server
D: file server
25. Just as processing can be done at various places in a client/server design, data can be stored
in more than one location using a distributed ____.
A: database centric
B: database access
C: database gateway
D: database management
26. In the past, a device known as a ____ was used to connect star networks, but a switch offers
advanced technology and much better performance.
A: portal
B: peer network
C: gateway
D: hub
27. A ____ local area network is relatively inexpensive to install and is well-suited to workgroups
and users who are not anchored to a specific desk or location.
A: cordless
B: metropolitan
C: peer-based
D: wireless
28. The Basic Service Set (BSS) in also called the ____ mode.
A: dependent
B: independent
C: structured
D: infrastructure
Chapter 11 Review
1. In a structure chart, a____ line, which has a diamond on one end, indicates that a control
module determines which subordinate modules will be invokeD:
A: method
B: condition
C: class
D: attribute
2. During ____ testing, programmers must test programs that interact with other programs and
files individually, before they are integrated into the system.
A: unit
B: integrated
C: link
D: outcome
3. Many organizations require a more formal type of desk checking called a(n) ____ review.
A: design
B: integrated
C: code
D: interpolated
4. The objective of ____ testing is to identify and eliminate execution errors that could cause a
program to terminate abnormally, and logic errors that could have been missed during desk
checking.
A: unit
B: integration
C: user
D: system
5. ____ is the process of reviewing the program code to spot logic errors, which produce incorrect
results.
A: Logic review
B: Code review
C: Results walkthrough
D: Desk checking
7. In ____ programming, two programmers work on the same task on the same computer.
A: parallel
B: duo
C: double
D: driver
8. To achieve better, faster, and less expensive methods of software development, ____ designed
a Capability Maturity Model (CMM)®, which improves quality, reduces development time, and cuts
costs.
A: ISO (International Organization for Standardization)
B: SEI (Software Engineering Institute)
C: ODBC (Open Database Connectivity)
D: CAIT (Center for the Application of Information Technologies)
9. The ____ changeover method allows the new system to be implemented in stages, or modules.
A: phased operation
B: parallel operation
C: pilot operation
D: direct cutover
10. A class diagram includes the class ____, which represent the program logiC:
A: attributes
B: events
C: methods
D: characters
11. O-O analysis makes it easier to translate an object model directly into an object-oriented
programming language. This process is called object-oriented ____.
A: changeover
B: development
C: tracking
D: cycling
13. A ____ evaluation assesses the overall quality of the information system.
A: pre-implementation
B: post-implementation
C: pilot-implementation
D: testing-implementation
14. A control couple shows a message, also called a ____ flag, which one module sends to
another.
A: cycle
B: data
C: status
D: cutover
15. The ____ cutover approach causes the changeover from the old system to the new system to
occur immediately when the new system becomes operational.
A: direct
B: parallel
C: pilot
D: phased
16. Typically, a higher-level module, called a ____ module, directs lower-level modules.
A: control
B: terminal
C: iteration
D: method
17. The environment for the actual system operation is called the ____ environment.
A: operational
B: production
C: either a. or b.
D: neither a. nor v.
18. ____ can be used to model business logic for an information system.
A: Decision tables
B: Decision trees
C: either a. or b.
D: neither a. nor b.
19. Defect tracking software documents and tracks replacement code, called ____.
A: stubs
B: units
C: flags
D: patches
20. A module consists of related program code organized into ____ units that are easy to
understand and maintain.
A: small
B: large
C: either a. or b.
D: neither a. nor b.
21. Testing two or more programs that depend on each other is called integration testing, or ____
testing.
A: stub
B: desk
C: loop
D: link
22. More recently, the Software Engineering Institute established a new model, called Capability
Maturity Model ____, that integrates software and systems development into a much larger
framework called process improvement.
A: International
B: Cohesion
C: Process
D: Integration
23. Objects contain both data and program logic, called ____.
A: methods
B: conditions
C: attributes
D: tests
24. During systems implementation, the ____ serves as a blueprint for constructing the new
system.
A: system design specification
B: RFQ
C: RFP
D: system structure chart
25. A condition line indicates that a control module determines which ____ modules will be
invoked, depending on a specific condition.
A: parent
B: peer
C: subordinate
D: pilot
26. The ____ operation changeover method requires that both the old and the new information
systems operate fully for a specified perioD:
A: direct
B: parallel
C: pilot
D: phased
27. A successful information system requires ____ for users, managers, and IT staff members so
people understand the system and know how to use it effectively.
A: tracking
B: flowcharting
C: code reviews
D: training
28. Structured application development usually involves a ____ approach, which proceeds from a
general design to a detailed structure.
A: bottom-up
B: top-down
C: parallel process
D: parent-child
29. Compiling the program using a CASE tool or a language compiler detects syntax errors, which
are ____ errors.
A: cycle
B: math data
C: testing
D: language grammar
30. The main objective of ____ is to avoid problems or to detect them as soon as possible.
A: systems implementation
B: quality assurance
C: status flags
D: partitioning
Chapter 12 Review
2. ____ also can be used to measure the quality of IT support or services by measuring the time
from a user request for help to the resolution of the problem.
A: Bandwidth
B: Turnaround time
C: Throughput
D: Response time
3. Risk ____ develops safeguards that reduce risks and their impact.
A: assessment
B: management
C: identification
D: control
4. The ____ is the configuration of a system documented at the beginning of the project and
consists of all necessary system requirements and design constraints.
A: functional baseline
B: operational baseline
C: allocated baseline
D: product baseline
5. ____ shifts the risk to another asset or party, such as an insurance company, in risk control.
A: Acceptance
B: Avoidance
C: Mitigation
D: Transference
6. The release methodology offers all of the following advantages except ____.
A: all changes are tested together before a new system version is released
B: costs are reduced because only one set of system tests is needed
C: documentation changes are coordinated and become effective simultaneously
D: new features or upgrades are available more often
8. Depending on the system, bandwidth might be measured in any of the following except ____.
A: Kbps (kilobits per second.
B: Mbps (megabits per second.
C: Dbps (decibits per second.
D: Gbps (gigabits per second.
9. In a typical system, the initial version of the system is 1.0, and the release that includes the first
set of maintenance changes is version ____.
A: 1.0
B: 1.1
C: 2.0
D: 2.1
11. The ____ triangle has three main elements of system security: confidentiality, integrity, and
availability.
A: CPA
B: CIA
C: CSI
D: CIS
12. ____ includes monitoring the system for signs of trouble, logging all system failures,
diagnosing the problem, and applying corrective action.
A: Error analysis
B: Fault analysis
C: Error management
D: Fault management
13. When a____ methodology is used, all noncritical changes are held until they can be
implemented at the same time.
A: in-house development
B: version control
C: maintenance release
D: bug fix
14. The maintenance team includes a system administrator and one or more ____.
A: systems analysts
B: programmers
C: both a. and b.
D: neither a. nor b.
15. ____ include items such as supplies, equipment rental, and software leases.
A: Maintenance costs
B: Operational costs
C: Connection costs
D: User costs
17. ____ measures actual system performance under specific circumstances and is affected
by network loads and hardware efficiency.
A: Bandwidth
B: Throughput
C: Response time
D: Answer time
18. A ____ is a formal reference point that measures system characteristics at a specific time.
A: baseline
B: foundation
C: bottom line
D: core
21. If significant changes take place in the existing system, the IT department might develop a
____ that could include online support, a special Web site, and formal training sessions.
A: user training package
B: management training package
C: buyer training package
D: seller training package
22. ____ protects information from unauthorized disclosure and safeguards privacy.
A: Confidentiality
B: Availability
C: Integrity
D: Flexibility
23. To measure system performance, many firms use ____ testing, which uses a set of standard
tests to evaluate system performance and capacity.
A: foundation
B: benchmark
C: comparison
D: baseline
24. In a typical system, the initial release version of the system is ____.
A: 0.0
B: 0.1
C: 1.0
D: 10.0
26. ____ activities include changing programs, procedures, or documentation to ensure correct
system performance.
A: Maintenance
B: Operational
C: Connection
D: Analyst
29. The ____ baseline documents the system at the end of the design phase.
A: functional
B: allocated
C: product
D: formal
30. A(n) ____ programmer focuses on creating and supporting large-scale database systems.
A: systems
B: security
C: applications
D: database