Multiple choice - system analysis and design

Assignment Help Operating System
Reference no: EM1379840

1. The _____ is generated by the department or person that has an idea for a new information system.


feasibility analysis
gradual refinement
project sponsor
system request
work plan

2. The principal disadvantages(s) with the waterfall development methodology is (are) _______.


a long time elapses between completion of the system proposal and the delivery of the system
it identifies system requirements long before programming begins
it minimizes changes to the requirements as the project proceeds
the design must be completely specified on paper before programming begins
a long time elapses between completion of the system proposal and the delivery of the system and the design must be completely specified on paper before programming begins

3. During which phase of the SDLC should the analyst determine the who, what, where, when, and how of the current system?
Designing the System
Analyzing the System
none of the above
Evaluating the System

4. Workflow analysis tends to focus most strongly on:
the people who perform the work.
the policies influencing decision making.
the actual work or tasks being completed.
the data used within the system.

5.
The creation of a design prototype that is not a working information system, but represents a part of the system that needs additional refinement happens with the prototyping methodology.


True
False

6.
1. The primary advantage of the Waterfall Development methodology is requirements are completely specified and held relatively constant prior to programming.


True
False

7.
_____ means that the same message can be interpreted differently by different classes of objects.


Inheritance
Encapsulation
Polymorphism

Information Hiding

Dynamic Binding

8. Which of the steps in interview preparation should be performed first?
Decide whom to interview.
Read background material.
Decide on question types and interview structure.
Prepare the interviewee.

9. The biggest difference between collecting data by questionnaire or by interview is:
questionnaires are easier and faster to design, administer, and analyze than are interviews.
questions on questionnaires cannot be open-ended; interviews can include open-ended questions.
interviews are interactive and meanings can be clarified; questionnaires are not so interactive.
questionnaires can only be distributed to a small number of people; interviews can involve a wider number of respondents.

10. Which of these is not a recommended task in designing observation activities?
Deciding what activities to observe.
Decide at what level of concreteness activities are to be observed.
Notify all who will be observed so they can clean their offices, dress up for the observation, and generally spruce things up.
Prepare appropriate scales, checklists, and other materials for conducting the observations.

11. What is an advantage gained from the use of data flow diagrams rather than narratives to represent the information requirements of a system?
Users will immediately understand the diagrams with no need for explanation or training.
Data flow diagrams are not able to be easily understood by users.
The diagrams are an excellent way to represent the system graphically without committing to a specific technical implementation.
Data flow diagrams represent systems only in extremely simple terms.

12.
The objective of UML is to provide diagramming techniques in the analysis and design phases that easily translate to Java code during the implementation phase.


True
False

13.
_________ diagrams represent the things, concepts or ideas that are contained in an application.


Activity diagrams
Sequence diagrams
Class diagrams
Deployment diagrams
Interaction diagrams

14.
Feasibility analysis may be defined as a(n)_____.


assessment of ability of the ultimate users of the system to accept the system and incorporate it into the ongoing operations of the organization
determination of the extent to which the system can be technically designed, developed, and installed
guide to determining whether to proceed with a project
identification of only the costs and benefits associated with the project
none of the above

15.
Which of the following factors would tend to increase the technical risk of a project?


familiarity with the technology
large project size
creating an application that is familiar to the users and analysts
small project size
the number of other applications under development in the firm

16.
Examples of development costs include all EXCEPT _____.


consultant fees
hardware expenses
salaries for the project team
software licensing fees
none of the above

17.
If end users feel fearful or threatened by a proposed new system, this factor should be included as a part of the _____.


economic feasibility assessment
organizational feasibility assessment
system proposal
system request
technical feasibility assessment

18.
A critical success factor for project management is to _____.


create a work plan
follow the three steps of project management
identify most project tasks
manage the hundreds of tasks
start with a realistic assessment of the work

19.
Diane needs to create a work plan for an upcoming systems project. She must first _____.


estimate the hours and request deliverables
identify the tasks and estimate the time needed to complete them
initiate the project and create the project management assessment
make tradeoffs and set conservative numbers
timebox the completion date

20.
The process of assigning values for the time and effort needed to perform a system project is called _____.


analysis
estimation
identifying
planning
preparation

21.
Kathryn has little experience estimating the time it will take to complete a systems project. She has just completed the planning phase of the project. What method should she use to estimate the time required to build the system?


adjusted project complexity
function points
industry standards
Microsoft Project
more complex approach

22.
A(n) ____________ is a measure of program size based on the number and complexity of inputs, outputs, queries, files, and program interfaces.


function point
line of code
project plan
standard module
workplan

23.
Root cause analysis attempts to find solutions for the business problems.


True
False

24.
A systems analyst is participating in an exchange of services with another organization. First, the analyst visits the partner organization, studies and evaluates their systems, and recommends changes and improvements. Then, a team of analysts from the partner organization visits the analyst's organization and performs the same service. This process is an example of benchmarking.


True
False

25.
What information-gathering strategy enables the analyst to see the reality of the situation rather than listen to others describe it?


document analysis
interviewing
joint application design (JAD) sessions
observation
questionnaires

26.
The information gathering technique that is most effective in combining information from a variety of perspectives, building consensus, and resolving discrepancies is a(n) _____.


document analysis
interview
joint application development
observation
questionnaire

27.
Which of the following analysis strategies incurs the highest risk yet has the potential to provide high value to the business?


Business Process Automation
Business Process Improvement
Business Process Reengineering
Business Process Renovation
Root cause analysis

28.
The goal of ______ analysis strategy is to make minor or moderate changes to the business processes so that they will become more efficient and effective.


business process automation
business process benchmarking
business process reengineering
business process systemization
business process improvement

29.
_______ is an example of functional requirements.


The system should work with any web browser
The system should load any web page within 3 seconds
Customers should be able to see their orders after authentication
The system should comply with the company's policy of buying all PCs and servers from Dell
The system should be able to search all available inventory in order to determine whether a product can be made by a given date

30.
A scenario is the same as a(n) _____.


use case
relationship
path through a use case
collection of use cases
role

31.
Each use case describes _____ function(s) in which users interact with the system.


one
one or more
many
zero, one, or more
all

32.
The importance level of a use case increases for all of the following characteristics of the use case EXCEPT _____.


the use case represents an important business process
the use case supports revenue generation
the technology is proven
the functionality is complex

the functionality is time-critical

33.
The _____ relationship in use cases allows use cases to support the concept of inheritance.


association
extend
include
generalization
none of the above

34.
Which of the following relationships describe the communication between the use case and the actors?


association relationship
extend relationship
include relationship
generalization relationship
none of the above

35.
Which of the relationship types in use cases enables functional decomposition?


association relationship
extend relationship
include relationship
generalization relationship
decompose relationship

36.
Use cases are the primary drivers for all of the UML diagramming techniques.


True
False

37.
Each object has _______ that specify information about the object.


Methods
Messages
Procedures
Other objects
Attributes

38.
________ allow the analyst to model the processes in an information system.


Package diagrams
Deployment diagrams
Component diagrams
Class diagrams
Activity diagrams

39.
Agile development approach is considered a special case of RAD approach to developing systems.


True
False

40.
In which phase of the SDLC is the system proposal developed?


analysis
design
implementation
planning
system delivery

 

Reference no: EM1379840

Questions Cloud

How much omputer also software result in increased profit : which he says should result in an increase in profits of 10 percent. Will purchase of new computer also software result in increased profits also if so, by how much.
Utilizing the five distributing bargaining skills outline : Utilizing the Five Distributing Bargaining Skills outline the steps as well as various aspects you would consider implementing in buying a house.
In making decision about whether to hire peter : A prospective employer learns of Peter's hepatitis also is unwilling to hire him, fearing that disease will be communicated to others in workplace. In making decision about whether to hire Peter.
Human centered and user centered approaches : Discuss the differences between the human centered and user centered approaches? Do you consider that human centered approach is more effective?
Multiple choice - system analysis and design : The primary benefits of the Waterfall Development methodology is needs are completely specified and held relatively constant prior to programming.
Deciding to change levels of capacity : What issues need to be considered when deciding to change levels of capacity? How is this decision taken in your or well known industry.
How strong is your public relations media relations decides : How strong is your public relations, media relations decides whether your free publicity is god or bad also it can be said that it is indeed one of best way to freely advertise your things by just a word of mouth information which can publicize th..
Friendly computer program : Consider of any computer related item that you felt was not user friendly to you? Did you feel reluctant to continue using it.
By how much would your answer differ if you invested : By how much would your answer differ if you invested additional funds at beginning of each year instead of at end of each year.

Reviews

Write a Review

Operating System Questions & Answers

  Dns security measurements

Having a Domain Name Server available to the public can be a tool in the hand for attackers. If anyone is able to use your Domain Name Server, they can use it to send a huge amount of traffic to their victim.

  Page table entries are needed for two-level paging

Assume that word 0 is part of a hole and that the highest word in memory contains valid tries are needed in the page table if traditional(one-level) paging is used? how many page table entries are needed for two-level paging, with 10 bits in ea..

  Finding server side software

Find the Internet to search server side software that is needed to be installed on the hospital's servers to support access by your local hospital doctors to patients' data using their cellular phones or PDAs.

  Creating programs to compute

Compare zero-, one-, two-, and three-address machines through writing programs to compute X = (A+B X C)/D - E X F)

  Automate or automated patch deployment

Discuss and define Automate or Automated patch deployment?

  Procedure to manually remove the existing power supply

Explain the procedure necessary to properly install or replace the computer power supply in a computer.

  Explain the concepts of nat and ipv6

At present we have a huge problem with advertising corporations which are making profiles of people by collecting their information.

  What is average rotational latency if seek time is given

5 Disk, seek time, latency, sector, request Single-platter disk rotation speed: 7200 rpm number of tracks on one side of platter. What is avg rotational latency?

  Efficiency and effectiveness of project communications

Determine what types of data are shared through documents and what types are shared through meetings? Discuss how has social networking affected the efficiency and effectiveness of project communications?

  Trends in information management

Assume you have been asked to join with many other IT professionals for an hour on the local cable channel, discussing some of the current trends in information management,

  Information technology security

Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution corporation.

  Implement the parser in two iterations

Implement the parser in a separate file. Implement the main parser function in a separate file main.c

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd