87
System Analysis and Design Examination Booklet Contributed by: Mr. Ahmed Al-Ghoul 1

An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

System Analysis and Design Examination

BookletContributed by:Mr. Ahmed Al-Ghoul

1

Page 2: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

1- Globalization and the increasing internet users around the world, give IT budgets

a) high priority

b) less importantc) more componentd) more productivity

2- Systems Analysis and Design is the process people use to create

a) server

b) information systemsc) system componentd) software systems

3- System analyst analyzing business, depending on.

a) organization function and requirements

b) identifying opportunities for improvementc) solving problemsd) all of the above

4- .____________ is a choose to implement information systems.

a) CASE

b) Modelingc) Internet based applicationd) All of the above

5.The development of database management systems helped shift the focus of systems development from

a) processes first to data firstb) Data first to process firstc) Software first to hardware firstd) Hardware first to software first

6.The operating systems for computers moved away from line prompt interface to windows and icon based interfaces in

a) 1960sb) 1970sc) 1980sd) 1990s

2

Page 3: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

7. now-a days The focus on developing systems for the

a) Internet and for firm’s intranets and extranetsb) Network databasec) Mini computersd) Large organizations

8.dividing a system into components based on subsystems is

a) Non-Functional decompositionb) Functional decomposition c) Rules decompositiond) Constraints decomposition

9. Is the physical layer of the information system?

a) hardwareb) softwarec) peopled) data

10. To do business process modeling the analyst needs business profile and.

a) business constraints

b) business rules

c)c) business modelsbusiness models

d)d) business driversbusiness drivers

11. Business models support communication between11. Business models support communication between

a)a) analyst and system users analyst and system users

b)b) analyst and programmersanalyst and programmers

c)c) analyst and competitorsanalyst and competitors

d)d) users and managersusers and managers

12. Which business driver require support of multiple languages, currency exchange rates, 12. Which business driver require support of multiple languages, currency exchange rates, business culturesbusiness cultures

a)a) Globalization of the EconomyGlobalization of the Economy

b)b) Security and PrivacySecurity and Privacy

c)c) Collaboration and PartnershipCollaboration and Partnership

3

Page 4: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) Knowledge Asset ManagementKnowledge Asset Management

13. Which business driver require Need to incorporate stringent security and privacy controls13. Which business driver require Need to incorporate stringent security and privacy controls

a)a) Globalization of the EconomyGlobalization of the Economy

b)b) Security and PrivacySecurity and Privacy

c)c) Collaboration and PartnershipCollaboration and Partnership

d)d) Knowledge Asset ManagementKnowledge Asset Management

14. _____________ a commercial exchange between businesses conducted over the internet. 14. _____________ a commercial exchange between businesses conducted over the internet.

a) C2C

b) B2Bc) C2Bd) B2C

15. Customer order processing is an example of.

a)Enterprise computing systemsb)Transaction processing systems c)Business support systemsd)Knowledge management systems

16. Word processing is an example of.

a) Enterprise computing systemsb) Transaction processing systems c) Business support systemsd) User productivity systems

17. A(n) ____________ focus on the overall business enterprise and use IT to set the focus on the overall business enterprise and use IT to set the company’s course and directionscompany’s course and directions

a) Operational

b) Top managerc) Supervisord) Middle Manager

18. An information system that captures the expertise of workers and then simulates that expertise to the benefit of none experts is.

a) Enterprise computing systemsb) Transaction processing systems c) Business support systemsd) Knowledge management systems

4

Page 5: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

19. A(n) ____________ Provide direction, necessary resources, and performance feedback to Provide direction, necessary resources, and performance feedback to

supervisorssupervisors a) Operational

b) Top managerc) Supervisord) Middle Manager

20. Initial design decisions may be poor is one of the cons ofis one of the cons of

a) Structured Analysis

b) Prototypingc) Joint Application Development d) Process model

21. A(n) ____________ Framework for systems development and support a wide variety of design methodologies

a)CASE

b)Modelingc)Strategic planningd)TP

22. A(n) __________ approach uses the organization’s management level as the base for the information system.

a) bottom up approach

b) top down approachc) prototyping approach d) Rapid Application Development

23. A(n) ____________ describes the design and protocols of telecommunications links.

a) object model

b) process modelc) network modeld) prototype model

24. Systems ________ includes preliminary investigation

a) System Planning

b) System Analysisc) System Design

5

Page 6: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d) Systems Implementation

25. The first step in _______ is requirements modeling

a) System Planning

b) System Analysisc) System Designd) Systems Implementation

26. The Technical specifications of the new system determined in

a) System Planning

b) Logical designc) Physical designd) Systems Implementation

27. During system _________ phase users, managers, IT staff trained to operate and support the system.

a) System Planning

b) System Analysisc) System Designd) Systems Implementation

28. An information system called a(n) ____________ is one that was developed by the company that will use it.

a) in-house application

b) on-house applicationc) CASE toolsd) software packages

29. A(n) ____________ is a set of components that produce specific results.

a) server

b) systemc) componentd) IT

30. The primary purpose of an information system is to ____________.

a) have fast computers

b) have the newest softwarec) provide valuable information to usersd) all of the above

31. A company that manufactures and sells products is called a(n) ____________ company.

a) I-commerce

6

Page 7: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b) B2Cc) service-orientedd) product-oriented

32. Knowledge management systems are called ___________ because they simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied.

a) expert systems

b) enterprise systemsc) productivity systemsd) reasoning systems

32. Knowledge management systems are called ___________ because they simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied.

e) expert systems

f) enterprise systemsg) productivity systemsh) reasoning systems

33. A(n) ____________ is is usually manage a group of operational users and are responsible for usually manage a group of operational users and are responsible for their performance their performance

a) Operational

b) Top managerc) Supervisord) Middle Manager

34. an information system that captures and processes data about business transactions34. an information system that captures and processes data about business transactions

a) Transaction processing systems

b) Enterprise computing systemsc) Business support systemsd) Expert Systems

35. Global Economy require 35. Global Economy require

a) Consolidation of international data

b) Support of multiple languagesc) Currency exchange ratesd) All of the above

7

Page 8: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

36. _____________ a commercial exchange between businesses and consumers conducted 36. _____________ a commercial exchange between businesses and consumers conducted over the internet. over the internet.

a) C2C

b) B2Bc) C2Bd) B2C

37. ____________ is a technique that uses powerful software, to help systems analysts develop and maintain information systems.

a) CASE

b) Modelingc) Strategic planningd) TP

38. A(n) ____________ describes the design and protocols of telecommunications links.

a) object model

b) process modelc) network modeld) prototype model

39. A(n) ____________ Describes the logic that programmers use to write code modules .

a) object model

b) process modelc) network modeld) prototype model

40. A(n) ____________ Describes the information that a system must provide. Describes the information that a system must provide.

a) Business model or Requirements model

b) process modelc) network modeld) prototype model

41. Which of the following focus on defining the activities associated with the system

a) Data-centered Methodologies

b) Process-centered Methodologiesc) Object-oriented Methodologiesd) Joint Application Development

8

Page 9: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

42.42. Create a blueprint that will satisfy all documented requirements Would most likely be done during:

a) System Planning

b) System Analysisc) System Designd) Systems Implementation

43 .During the analysis phase, the project team:

a) Investigates any current systems, identifies improvement opportunities, and develops a concept for the new system.

b) Begins the process & describes problems.c) Identify the nature and scope of the business opportunity or problem. d) Identify all outputs, inputs, and processes

44. During implementation, the project team:

a) studies the organization's current procedures and the information systems used to perform organizational tasks

b) Begins the process & describes problems.c) Identify the nature and scope of the business opportunity or problem. d) codes, tests, and installs the new system

45. Speeds45. Speeds up the development process significantly up the development process significantly is one of the pros of is one of the pros of

a) Computer-Aided Systems Engineering

b) Prototypingc) Object modeld) Process model

46. Structured Analysis and Design is an example of46. Structured Analysis and Design is an example of

a) A Process-Centered methodologies

b) A Data-centered Methodologiesc) A Combination of Data and Process methodologiesd) An Object-oriented Methodologies

47.______________ created to radically decrease the time needed to design and implement 47.______________ created to radically decrease the time needed to design and implement information systems.information systems.

a) JAD

b) RAD

9

Page 10: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

c) Structured Analysisd) Object-oriented (O-O) analysis

48. Which of the following is a main reason for a system request?48. Which of the following is a main reason for a system request?

a)a) Improved serviceImproved service

b)b) Bad trainingBad training

c)c) Low salaryLow salary

d)d) TechnologyTechnology

49- Managers alert to detect potential problems by.49- Managers alert to detect potential problems by.

a)a) Observe behavior of employeesObserve behavior of employees

b)b) Listen to feedback from vendorsListen to feedback from vendors

c)c) Listen to feedback from customersListen to feedback from customers

d)d) all of the aboveall of the above

50- The starting point for a project is called a(n) ____________.50- The starting point for a project is called a(n) ____________.

a)a) Systems requestSystems request

b)b) Feasibility studyFeasibility study

c)c) Key performance indicatorKey performance indicator

d)d) Project definitionProject definition

51. A systems review committee.51. A systems review committee.

a)a) Tests for operational, technical, and economic feasibility.Tests for operational, technical, and economic feasibility.

b)b) Produces the company’s strategic plan by using SWOT analysis.Produces the company’s strategic plan by using SWOT analysis.

c)c) Is a group of key managers and users who evaluate systems requestsIs a group of key managers and users who evaluate systems requests

d)d) Is a group of users and costumers who evaluate systems requestsIs a group of users and costumers who evaluate systems requests

52. Which of the following is not an internal factor that will affect a project?52. Which of the following is not an internal factor that will affect a project?

a)a) Strategic planStrategic plan

b)b) Top managersTop managers

c)c) User requestsUser requests

d)d) CompetitorsCompetitors

10

Page 11: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

53. Which of the following is considered when analyst analyze risk53. Which of the following is considered when analyst analyze risk

a)a) ProbabilityProbability

b)b) scalabilityscalability

c)c) durabilitydurability

d)d) ReliabilityReliability

54. _______________ feasibility determines if the human resources are available to operate the 54. _______________ feasibility determines if the human resources are available to operate the system once it has been installedsystem once it has been installed

a)a) OperationalOperational

b)b) TechnicalTechnical

c)c) EconomicEconomic

d)d) ScheduleSchedule

55. Which of the following is a Point to be considered when assessing technical feasibility?55. Which of the following is a Point to be considered when assessing technical feasibility?

a)a) Management supportManagement support

b)b) Users trainingUsers training

c)c) Performance decline in some system partsPerformance decline in some system parts

d)d) Does the proposed platform have sufficient capacity?Does the proposed platform have sufficient capacity?

56. Which of the following is an Operational feasibility vital issue?56. Which of the following is an Operational feasibility vital issue?

a)a) Suppliers supportSuppliers support

b)b) Users trainingUsers training

c)c) System hardware and softwareSystem hardware and software

d)d) Cost reduction and avoidanceCost reduction and avoidance

57. Application software maintenance, incremental data storage expense, and incremental 57. Application software maintenance, incremental data storage expense, and incremental communications are examples of:communications are examples of:

a)a) intangible costsintangible costs

b)b) recurring costsrecurring costs

c)c) tangible benefitstangible benefits

d)d) one-time costsone-time costs

58. System Development, new hardware and software purchases, and user training are 58. System Development, new hardware and software purchases, and user training are examples of.examples of.

a)a) intangible costsintangible costs

11

Page 12: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) recurring costsrecurring costs

c)c) tangible benefitstangible benefits

d)d) one-time costsone-time costs

59. ___________________ associated with project startup, initiation and development59. ___________________ associated with project startup, initiation and development

a)a) intangible costsintangible costs

b)b) recurring costsrecurring costs

c)c) tangible benefitstangible benefits

d)d) one-time costsone-time costs

60. Cost reduction and avoidance, error reduction, and increased speed of activity are examples 60. Cost reduction and avoidance, error reduction, and increased speed of activity are examples of:of:

a)a) intangible costsintangible costs

b)b) tangible coststangible costs

c)c) tangible benefitstangible benefits

d)d) intangible benefitsintangible benefits

61. Project management begins with a systems __________, and continues until the project is 61. Project management begins with a systems __________, and continues until the project is completed or terminatedcompleted or terminated

a)a) requestrequest

b)b) costcost

c)c) analysisanalysis

d)d) designdesign

12

Page 13: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

62. A requirement or condition that a new system must satisfy or an outcome that it must achieve62. A requirement or condition that a new system must satisfy or an outcome that it must achieve is referred to as a _____.is referred to as a _____.

a)a) goalgoal

b)b) constraintconstraint

c)c) processprocess

d)d) scopescope

63. In structured analysis and design ______________ maps the functional requirements to the 63. In structured analysis and design ______________ maps the functional requirements to the hardware and softwarehardware and software

a)a) Environmental ModelEnvironmental Model

b)b) Behavioral ModelBehavioral Model

c)c) Implementation ModelImplementation Model

d)d) Initial modelInitial model

64. The focus on defining the activities associated with the system is a __________ 64. The focus on defining the activities associated with the system is a __________ methodology.methodology.

a)a) data centereddata centered

b)b) life cyclelife cycle

c)c) object-orientedobject-oriented

d)d) process centeredprocess centered

65. A formal step-by-step approach to the systems development life cycle that move logically 65. A formal step-by-step approach to the systems development life cycle that move logically from on phase to the next is called _____.from on phase to the next is called _____.

a)a) ad hoc designad hoc design

b)b) RAD designRAD design

c)c) agile developmentagile development

d)d) structured designstructured design

66. The advantage of this development methodology is that, Results in solid, well-constructed 66. The advantage of this development methodology is that, Results in solid, well-constructed systemssystems

a)a) Waterfall DevelopmentWaterfall Development

b)b) Parallel DevelopmentParallel Development

c)c) Rapid Application Development Rapid Application Development

d)d) agile developmentagile development

13

Page 14: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

67. The advantage of this development methodology is that dramatic time savings the systems 67. The advantage of this development methodology is that dramatic time savings the systems development effortdevelopment effort

a)a) Waterfall DevelopmentWaterfall Development

b)b) Parallel DevelopmentParallel Development

c)c) Rapid Application Development Rapid Application Development

d)d) agile developmentagile development

68. In structured analysis and design Data Flow Diagram is a (n) ____________.68. In structured analysis and design Data Flow Diagram is a (n) ____________.

a)a) Environmental ModelEnvironmental Model

b)b) Behavioral ModelBehavioral Model

c)c) Implementation ModelImplementation Model

d)d) Initial modelInitial model

69. The disadvantage of this development methodology is that, the design must be completely 69. The disadvantage of this development methodology is that, the design must be completely specified before programming begins.specified before programming begins.

a)a) Waterfall DevelopmentWaterfall Development

b)b) Structured methodologyStructured methodology

c)c) Rapid Application Development Rapid Application Development

d)d) agile developmentagile development

70. The disadvantage of this development methodology is that identifying the most important 70. The disadvantage of this development methodology is that identifying the most important subset of requirements at any stage is a tedious task.subset of requirements at any stage is a tedious task.

a)a) Waterfall DevelopmentWaterfall Development

b)b) Structured methodologyStructured methodology

c)c) Prototyping methodologyPrototyping methodology

d)d) object oriented analysis and designobject oriented analysis and design

71. ____________ methodology performs the analysis, design and implementation phases 71. ____________ methodology performs the analysis, design and implementation phases concurrently.concurrently.

a)a) Waterfall DevelopmentWaterfall Development

b)b) Structured methodologyStructured methodology

c)c) Prototyping methodologyPrototyping methodology

d)d) object oriented analysis and designobject oriented analysis and design

14

Page 15: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

72. Whose JAD participant provide enterprise level authorization and support for the project72. Whose JAD participant provide enterprise level authorization and support for the project

a)a) useruser

b)b) analystanalyst

c)c) top managementtop management

d)d) managermanager

73. _______ skills enable you to understand the organization and its functions, to identify 73. _______ skills enable you to understand the organization and its functions, to identify opportunities and problems, and to analyze and solve problems.opportunities and problems, and to analyze and solve problems.

a)a) Analytical Analytical

b)b) Technical Technical

c)c) Management Management

d)d) Interpersonal Interpersonal

74. _______ skills help you understand the potential and limitations of information technology.74. _______ skills help you understand the potential and limitations of information technology.

a)a) Analytical Analytical

b)b) Technical Technical

c)c) Management Management

d)d) Interpersonal Interpersonal

75. Working alone and with a team is part of ___________ skills.75. Working alone and with a team is part of ___________ skills.

a)a) Analytical Analytical

b)b) Technical Technical

c)c) Management Management

d)d) Interpersonal Interpersonal

76. Ability to anticipate what might go wrong in a project and minimize risk and/or minimize 76. Ability to anticipate what might go wrong in a project and minimize risk and/or minimize damage that might result, is a __________damage that might result, is a __________

a)a) resource managementresource management

b)b) project managementproject management

c)c) risk managementrisk management

d)d) change managementchange management

15

Page 16: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

77. In fact finding Performance describes77. In fact finding Performance describes

a)a) hardware, software, and procedural controls that protect the system and hardware, software, and procedural controls that protect the system and data from internal or external threatsdata from internal or external threats

b)b) the system characteristics, speed, volume, capacity, availability, and the system characteristics, speed, volume, capacity, availability, and reliabilityreliability

c)c) data that enters the systemdata that enters the system

d)d) the logical rules that are applied to transform the data into informationthe logical rules that are applied to transform the data into information

78. Analysts using models to.78. Analysts using models to.

a)a) Concentrate on important features of the system, pay less attention to less Concentrate on important features of the system, pay less attention to less important onesimportant ones

b)b) Able to respond to changes or changes in user’s requirements with low Able to respond to changes or changes in user’s requirements with low cost and riskcost and risk

c)c) Properly understand users’ environment Properly understand users’ environment

d)d) All of the aboveAll of the above

79. The automated software tool used by systems analysts to develop information systems are 79. The automated software tool used by systems analysts to develop information systems are calledcalled

a)a) CASE toolsCASE tools

b)b) CSAE toolsCSAE tools

c)c) CESA toolsCESA tools

d)d) CSEA toolsCSEA tools

80. Which of the following types is not a CASE tools type?80. Which of the following types is not a CASE tools type?

a)a) Diagramming toolsDiagramming tools

b)b) Documentation generatorsDocumentation generators

c)c) Code generatorsCode generators

d)d) Cost benefit analysis toolsCost benefit analysis tools

81. Which of the following objectives is not a CASE tools objective?81. Which of the following objectives is not a CASE tools objective?

a)a) Observe behavior of employeesObserve behavior of employees

b)b) Listen to feedback from customersListen to feedback from customers

c)c) Listen to feedback from suppliersListen to feedback from suppliers

d)d) All of the aboveAll of the above

16

Page 17: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

82. The following question is an example of which system requirements ‘’The system must 82. The following question is an example of which system requirements ‘’The system must support 25 users online simultaneously’’support 25 users online simultaneously’’

a)a) ProcessesProcesses

b)b) PerformancePerformance

c)c) ControlsControls

d)d) InputsInputs

83. The following question is an example of which system requirements ‘’ The system must 83. The following question is an example of which system requirements ‘’ The system must provide log-on security at the operating system level and at the application level’’provide log-on security at the operating system level and at the application level’’

a)a) ProcessesProcesses

b)b) PerformancePerformance

c)c) ControlsControls

d)d) InputsInputs

84. _______ skills help you manage projects, resources, risk, and change.84. _______ skills help you manage projects, resources, risk, and change.

a)a) Analytical Analytical

b)b) Technical Technical

c)c) Management Management

d)d) Interpersonal Interpersonal

85. _______ skills help you work with end users as well as with other analysts and programmers. 85. _______ skills help you work with end users as well as with other analysts and programmers.

a)a) Analytical Analytical

b)b) Technical Technical

c)c) Management Management

d)d) Interpersonal Interpersonal

86. Which of the steps in interview preparation should be performed first?86. Which of the steps in interview preparation should be performed first?

a)a) Determine the People to InterviewDetermine the People to Interview

b)b) Establish Objectives for the InterviewEstablish Objectives for the Interview

c)c) Develop Interview QuestionsDevelop Interview Questions

d)d) Prepare for the InterviewPrepare for the Interview

17

Page 18: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

87. The following question is an example of an/a _________ interview question:87. The following question is an example of an/a _________ interview question:

“What added features would you like to have in the new system?”“What added features would you like to have in the new system?”

a)a) closed-endedclosed-ended

b)b) open-endedopen-ended

c)c) random random

d)d) operational operational

88. Which of these is an advantage or benefit of Open-Ended questions?88. Which of these is an advantage or benefit of Open-Ended questions?

a)a) Providing richness of detail.Providing richness of detail.

b)b) Saving interview timeSaving interview time

c)c) Easily comparing interviewsEasily comparing interviews

d)d) Getting to the pointGetting to the point

89. Which of these is a disadvantage of Close-Ended questions?89. Which of these is a disadvantage of Close-Ended questions?

a)a) Boring for the intervieweeBoring for the interviewee

b)b) May result in too much irrelevant detailMay result in too much irrelevant detail

c)c) Possibly losing control of the interviewPossibly losing control of the interview

d)d) May take too much time for the amount of useful information gainedMay take too much time for the amount of useful information gained

90. In written work procedures, you can find out about:90. In written work procedures, you can find out about:

a)a) how a job is performedhow a job is performed

b)b) opportunities to meet new needsopportunities to meet new needs

c)c) titles and names of key individuals who have an interest in relevant existingtitles and names of key individuals who have an interest in relevant existing systemssystems

d)d) all of the aboveall of the above

91. Questionnaires are valuable if.91. Questionnaires are valuable if.

a)a) the number of system user are limitedthe number of system user are limited

b)b) Organization members are widely dispersedOrganization members are widely dispersed

c)c) the proposed system is complexthe proposed system is complex

d)d) all of the aboveall of the above

18

Page 19: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

92. The Simplest method of probability sampling is92. The Simplest method of probability sampling is

a)a) Stratified sampleStratified sample

b)b) Systematic sampleSystematic sample

c)c) Random sampleRandom sample

d)d) arranged samplearranged sample

93. When comparing observation to document review93. When comparing observation to document review

a)a) observation is rated low in terms of information richnessobservation is rated low in terms of information richness

b)b) observation is rated as moderate in terms of time requirementsobservation is rated as moderate in terms of time requirements

c)c) the observe may or may not be involved and committedthe observe may or may not be involved and committed

d)d) the observation may potentially involve largethe observation may potentially involve large

94. Which of the following is not a traditional method of collecting system requirements?94. Which of the following is not a traditional method of collecting system requirements?

a)a) interviewinginterviewing

b)b) RADRAD

c)c) observationsobservations

d)d) document analysisdocument analysis

95. When comparing questionnaires to interviews, questionnaires:95. When comparing questionnaires to interviews, questionnaires:

a)a) are rated high in terms of information richness are rated high in terms of information richness

b)b) are rated high in terms of expenseare rated high in terms of expense

c)c) are limited in terms of chances for follow upare limited in terms of chances for follow up

d)d) have an active and involved subjecthave an active and involved subject

96. In documents, you can find out about:96. In documents, you can find out about:

a)a) problems with existing systemsproblems with existing systems

b)b) opportunities to meet new needsopportunities to meet new needs

c)c) titles and names of key individuals who have an interest in relevant existingtitles and names of key individuals who have an interest in relevant existing systemssystems

d)d) all of the aboveall of the above

19

Page 20: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

97. The biggest difference between collecting data by questionnaire or by interview is:97. The biggest difference between collecting data by questionnaire or by interview is:

a)a) Interviews are interactive and meanings can be clarified; questionnaires Interviews are interactive and meanings can be clarified; questionnaires are not so interactive.are not so interactive.

b)b) Questions on questionnaires cannot be open-ended; interviews can includeQuestions on questionnaires cannot be open-ended; interviews can include open-ended questions.open-ended questions.

c)c) Questionnaires can only be distributed to a small number of people; Questionnaires can only be distributed to a small number of people; interviews can involve a wider number of respondents.interviews can involve a wider number of respondents.

d)d) Questionnaires are easier and faster to design, administer, and analyze Questionnaires are easier and faster to design, administer, and analyze than are interviews.than are interviews.

98. What is an effective guideline in ordering questions on the questionnaire?98. What is an effective guideline in ordering questions on the questionnaire?

a)a) Place them in random order.Place them in random order.

b)b) Place those least important to respondents first.Place those least important to respondents first.

c)c) Place the open-ended questions first.Place the open-ended questions first.

d)d) Place those most important to respondents firstPlace those most important to respondents first

99. In sampling, which of these is not a type of sample?99. In sampling, which of these is not a type of sample?

a)a) Systematic sampleSystematic sample

b)b) Stratified sampleStratified sample

c)c) Random sampleRandom sample

d)d) Biological sampleBiological sample

100. Which of these is an advantage or benefit of Close-Ended questions?100. Which of these is an advantage or benefit of Close-Ended questions?

a)a) Providing richness of detail.Providing richness of detail.

b)b) Saving interview timeSaving interview time

c)c) appropriate when you want to understand a larger process or draw out the appropriate when you want to understand a larger process or draw out the interviewee's opinions, attitudes, or suggestionsinterviewee's opinions, attitudes, or suggestions

d)d) Revealing avenues of further questioning that may have gone untappedRevealing avenues of further questioning that may have gone untapped

101. Which of these is a disadvantage of Open-Ended questions?101. Which of these is a disadvantage of Open-Ended questions?

a)a) Boring for the intervieweeBoring for the interviewee

b)b) Failure to obtain rich detailFailure to obtain rich detail

c)c) Missing main ideasMissing main ideas

d)d) May result in too much irrelevant detailMay result in too much irrelevant detail

20

Page 21: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

102. DFDs use _____ basic symbols102. DFDs use _____ basic symbols

a)a) twotwo

b)b) threethree

c)c) fourfour

d)d) fivefive

103. A (n) ________ is a path for data to move from one part of the information system to anther103. A (n) ________ is a path for data to move from one part of the information system to anther

a)a) processprocess

b)b) data flowdata flow

c)c) data store data store

d)d) external entityexternal entity

104. A (n)________ symbol is a rectangle, which may be shaded to make it look three-104. A (n)________ symbol is a rectangle, which may be shaded to make it look three-dimensionaldimensional

a)a) processprocess

b)b) data flowdata flow

c)c) data store data store

d)d) external entityexternal entity

105. A (n) ________ name identifies a specific function and consists of verb, and an adjective, if 105. A (n) ________ name identifies a specific function and consists of verb, and an adjective, if necessarynecessary

a)a) processprocess

b)b) data flowdata flow

c)c) data store data store

d)d) external entityexternal entity

106. The context diagram is the _______ DFD in every business process106. The context diagram is the _______ DFD in every business process

a)a) firstfirst

b)b) secondsecond

c)c) thirdthird

d)d) fourthfourth

21

Page 22: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

107. Processes that do not create a child diagram are called.107. Processes that do not create a child diagram are called.

a)a) Functional primitiveFunctional primitive

b)b) functional diagramfunctional diagram

c)c) child processeschild processes

d)d) level one processeslevel one processes

108. Diagram 0 is the explosion of the 108. Diagram 0 is the explosion of the

a)a) diagram 1diagram 1

b)b) diagram 2diagram 2

c)c) context diagramcontext diagram

d)d) child diagramchild diagram

109. ___________ maintains consistency among a set of DFDs by ensuring that input and output109. ___________ maintains consistency among a set of DFDs by ensuring that input and output data flows align properly.data flows align properly.

a)a) LevelingLeveling

b)b) BalancingBalancing

c)c) FrontingFronting

d)d) IteratingIterating

110. Leveling also is called 110. Leveling also is called

a)a) ExplodingExploding

b)b) partitioningpartitioning

c)c) decomposingdecomposing

d)d) all of the aboveall of the above

111. When a process can be accurately described by a single active verb with a singular object, 111. When a process can be accurately described by a single active verb with a singular object, this indicates that this indicates that

a)a) the level has been carried out to a sufficiently low level. the level has been carried out to a sufficiently low level.

b)b) no need to diagram 0no need to diagram 0

c)c) more levels neededmore levels needed

d)d) it needs anther DFD levelit needs anther DFD level

22

Page 23: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

112. A ____________ is the term used to describe a central storehouse of information about a 112. A ____________ is the term used to describe a central storehouse of information about a system's data.system's data.

a)a) data housedata house

b)b) data basedata base

c)c) data dictionarydata dictionary

d)d) data warehousedata warehouse

113. How are data structures usually described in data dictionaries?113. How are data structures usually described in data dictionaries?

a)a) using psuedocodeusing psuedocode

b)b) using decision treesusing decision trees

c)c) using algebraic notationusing algebraic notation

d)d) using a project repositoryusing a project repository

114. Which of these is included in the data dictionary entry for a data structure?114. Which of these is included in the data dictionary entry for a data structure?

a)a) a list of all the data elements included in the data structure or recorda list of all the data elements included in the data structure or record

b)b) Type and lengthType and length

c)c) Output formatOutput format

d)d) Default valuesDefault values

115. The main purpose of a data dictionary is to provide a source of reference in which the 115. The main purpose of a data dictionary is to provide a source of reference in which the ____________can look up & find out its content and any other relevant information.____________can look up & find out its content and any other relevant information.

a)a) analyst analyst

b)b) useruser

c)c) designerdesigner

d)d) all of the aboveall of the above

116. Which of these is included in the data dictionary entry for a data flow?116. Which of these is included in the data dictionary entry for a data flow?

a)a) the DFD beginning, or source, for the data flowthe DFD beginning, or source, for the data flow

b)b) An alphabetized list of all data elements entering the data flowAn alphabetized list of all data elements entering the data flow

c)c) each process where the data flow is usedeach process where the data flow is used

d)d) each data store where the data flow is usedeach data store where the data flow is used

23

Page 24: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

117. Many valuable reports can obtain from data dictionary including. 117. Many valuable reports can obtain from data dictionary including.

a)a) An alphabetized list of all users by name.An alphabetized list of all users by name.

b)b) An alphabetized list of all data elements by nameAn alphabetized list of all data elements by name

c)c) An alphabetized list of all software applications by nameAn alphabetized list of all software applications by name

d)d) An alphabetized list of all databases by nameAn alphabetized list of all databases by name

118. When you document the Processes, Process name or label means.118. When you document the Processes, Process name or label means.

a)a) the process name as it appears on the data flow diagramthe process name as it appears on the data flow diagram

b)b) the process name as it appears on the sequence diagram the process name as it appears on the sequence diagram

c)c) the process name as it appears on the data decomposition diagramthe process name as it appears on the data decomposition diagram

d)d) the process name as it appears on the data class diagramthe process name as it appears on the data class diagram

119. each data flow represent a group of related data elements called a 119. each data flow represent a group of related data elements called a

a)a) fieldfield

b)b) recordrecord

c)c) processprocess

d)d) data storedata store

120. in structured English selection [] entries become.120. in structured English selection [] entries become.

a)a) DO WHILE statements.DO WHILE statements.

b)b) simple structured English statements.simple structured English statements.

c)c) PERFORM UNTIL statements.PERFORM UNTIL statements.

d)d) IF..THEN...ELSE statements.IF..THEN...ELSE statements.

121. structured English uses a subset of English include121. structured English uses a subset of English include

a)a) Action verbsAction verbs

b)b) phrasesphrases

c)c) adjectives or adverbsadjectives or adverbs

d)d) All of the aboveAll of the above

24

Page 25: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

122. What is a benefit or advantage gained from using structured English to write process 122. What is a benefit or advantage gained from using structured English to write process specifications?specifications?

a)a) It is very difficult to convert the logic in structured English into program It is very difficult to convert the logic in structured English into program code.code.

b)b) Structured English is difficult to understandStructured English is difficult to understand

c)c) Structured English is an excellent tool to clarify logic and relationships.Structured English is an excellent tool to clarify logic and relationships.

d)d) Structured English can often be ambiguousStructured English can often be ambiguous

123. Process specifications are not created for:123. Process specifications are not created for:

a)a) Physical input and/or output processes, such as read and write.Physical input and/or output processes, such as read and write.

b)b) b.Processes that represent simple data validation.b.Processes that represent simple data validation.

c)c) c.Processes for which prewritten code. These processes are generally c.Processes for which prewritten code. These processes are generally included in a system as subprograms and functions.included in a system as subprograms and functions.

d)d) d. all of the aboved. all of the above

124. Assume condition one has four values, condition two has four values, and condition three 124. Assume condition one has four values, condition two has four values, and condition three has two values. How many rules are required?has two values. How many rules are required?

a)a) 55

b)b) 2323

c)c) 3232

d)d) 6464

125. 125. Which decision table variant that contains only the binary selectors (Y, N and -) in the Which decision table variant that contains only the binary selectors (Y, N and -) in the rules quadrant. In the action entries quadrant, indicators other than X appear.rules quadrant. In the action entries quadrant, indicators other than X appear.

a)a) Limited Entry Decision TableLimited Entry Decision Table

b)b) Mixed Entry Decision Table Mixed Entry Decision Table

c)c) Extended Entry Decision TableExtended Entry Decision Table

d)d) None of the aboveNone of the above

126. Decision Tables consists of ______ quadrants.126. Decision Tables consists of ______ quadrants.

a)a) twotwo

b)b) threethree

c)c) fourfour

d)d) fivefive

127. Which decision structure can handle many repetitious actions?127. Which decision structure can handle many repetitious actions?

25

Page 26: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) a decision treea decision tree

b)b) a decision table a decision table

c)c) a structured Englisha structured English

d)d) none of the abovenone of the above

128. Which decision structure you should use when the sequence of conditions and actions is 128. Which decision structure you should use when the sequence of conditions and actions is critical?critical?

a)a) a decision treea decision tree

b)b) a decision table a decision table

c)c) a structured Englisha structured English

d)d) all of the aboveall of the above

129. in decision trees branches represent.129. in decision trees branches represent.

a)a) name of processname of process

b)b) conditionsconditions

c)c) actions to be performedactions to be performed

d)d) rules.rules.

130 . Which of these describes a use for the data flow diagrams of a system?130 . Which of these describes a use for the data flow diagrams of a system?

a)a) Data flow diagrams are generally incorrect once system development has Data flow diagrams are generally incorrect once system development has progressed into the programming stage.progressed into the programming stage.

b)b) Data flow diagrams are useful only for the very early, general stages of Data flow diagrams are useful only for the very early, general stages of defining a system.defining a system.

c)c) Data flow diagrams are generally not saved once the system is builtData flow diagrams are generally not saved once the system is built

d)d) Data flow diagrams can serve as an excellent documentation of the final Data flow diagrams can serve as an excellent documentation of the final system.system.

131. A(n) ____________ shows how data moves through an information system.131. A(n) ____________ shows how data moves through an information system.

a)a) entityentity

b)b) relationshiprelationship

c)c) data flowdata flow

d)d) zerozero

26

Page 27: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

132. A process that has no input is called a ____________ process.132. A process that has no input is called a ____________ process.

a)a) spontaneous generationspontaneous generation

b)b) black hole black hole

c)c) gray holegray hole

d)d) negative data flownegative data flow

133. The four symbols when diagramming a DFD are________.133. The four symbols when diagramming a DFD are________.

a)a) context, level 0, level 1 and level 2 context, level 0, level 1 and level 2

b)b) entity, relationship, process, and data flowentity, relationship, process, and data flow

c)c) fragment, diagram, scenario, and visualizationfragment, diagram, scenario, and visualization

d)d) process, data flow, data store, and external entityprocess, data flow, data store, and external entity

134. When each level of a Data Flow Diagram shows how one business process in more and 134. When each level of a Data Flow Diagram shows how one business process in more and more detail, the levels of the DFD have been______.more detail, the levels of the DFD have been______.

a)a) ComposedComposed

b)b) Relationship LeveledRelationship Leveled

c)c) ContextedContexted

d)d) DecomposedDecomposed

135. A ____________ is the term used to describe a central storehouse of information about a 135. A ____________ is the term used to describe a central storehouse of information about a system's data.system's data.

a)a) data housedata house

b)b) data basedata base

c)c) data dictionarydata dictionary

d)d) data warehousedata warehouse

136. Which of these is an advantage or benefit of a data dictionary?136. Which of these is an advantage or benefit of a data dictionary?

a)a) It provides documentation and eliminates redundancy.It provides documentation and eliminates redundancy.

b)b) It provides additional work for the systems analyst.It provides additional work for the systems analyst.

c)c) It is required for database design.It is required for database design.

d)d) It is required for on-line system design.It is required for on-line system design.

27

Page 28: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

137. What does the plus sign (+) symbol mean in a data structure definition?137. What does the plus sign (+) symbol mean in a data structure definition?

a)a) iterationiteration

b)b) optionaloptional

c)c) either/oreither/or

d)d) andand

138. Which data elements must be contained in a data store?138. Which data elements must be contained in a data store?

a)a) data stores contain no data elementsdata stores contain no data elements

b)b) only the data elements on the data flows going out of the data storeonly the data elements on the data flows going out of the data store

c)c) all of the data elements used in the attached processall of the data elements used in the attached process

d)d) all of the data elements on data flows going into or out of the data storeall of the data elements on data flows going into or out of the data store

139. Which of these is included in the data dictionary entry for a data element?139. Which of these is included in the data dictionary entry for a data element?

a)a) all elements derived from the data elementall elements derived from the data element

b)b) aliases, synonyms or other names for the elementaliases, synonyms or other names for the element

c)c) each process where the data element is usedeach process where the data element is used

d)d) each user view in which the data element appearseach user view in which the data element appears

140. Which of the following is not a logical structure upon which modular design is based?140. Which of the following is not a logical structure upon which modular design is based?

a)a) CalculationCalculation

b)b) SequenceSequence

c)c) SelectionSelection

d)d) IterationIteration

141. 141. A tabular of conditions and actions and an indication under which conditions, which actions A tabular of conditions and actions and an indication under which conditions, which actions must be performed, this is a description of.must be performed, this is a description of.

a)a) Decision TablesDecision Tables

b)b) ..

c)c) Decision tree.Decision tree.

d)d) Structured EnglishStructured English

e)e) Pesudo codesPesudo codes

28

Page 29: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

142. Which decision table variant that Contains only the binary selectors Y & N and the catch all 142. Which decision table variant that Contains only the binary selectors Y & N and the catch all selector - in the rules quadrant. In the action entries, it contains only the action selector symbol X.selector - in the rules quadrant. In the action entries, it contains only the action selector symbol X.

a)a) Limited Entry Decision TableLimited Entry Decision Table

b)b) Mixed Entry Decision Table Mixed Entry Decision Table

c)c) Extended Entry Decision TableExtended Entry Decision Table

d)d) None of the aboveNone of the above

143. 143.

Alternatives are shown side by side is one of the advantages of Alternatives are shown side by side is one of the advantages of

a)a) Decision TablesDecision Tables

b)b) ..

c)c) Decision tree.Decision tree.

d)d) Structured EnglishStructured English

e)e) Pesudo codesPesudo codes

144. In a decision tree the 144. In a decision tree the Root of tree Root of tree

a)a) conditionsconditions

b)b) Actions to be performedActions to be performed

c)c) Name of processName of process

d)d) none of the abovenone of the above

145. Proper use of structured English will involve145. Proper use of structured English will involve

a)a) clear expression of hierarchy or nesting.clear expression of hierarchy or nesting.

b)b) no use of terms or expressions used in the data dictionaryno use of terms or expressions used in the data dictionary

c)c) no use of logic structures such as IF,THEN,ELSE or PERFORM.no use of logic structures such as IF,THEN,ELSE or PERFORM.

d)d) no use of the term “and” or “or”.no use of the term “and” or “or”.

146. What is one way to reduce the redundancy and complexity of a decision table?146. What is one way to reduce the redundancy and complexity of a decision table?

a)a) Write the table in extended entry form when conditions are mutually-Write the table in extended entry form when conditions are mutually-exclusive.exclusive.

b)b) Skip infrequently occurring conditions.Skip infrequently occurring conditions.

29

Page 30: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

c)c) Skip infrequently occurring actions.Skip infrequently occurring actions.

d)d) Modify the rules to simplify the situation.Modify the rules to simplify the situation.

147. UML used to 147. UML used to model the behaviour of objects with___________.model the behaviour of objects with___________.

a)a) use casesuse cases

b)b) class diagramsclass diagrams

c)c) actors diagramsactors diagrams

d)d) state transition diagramsstate transition diagrams

148. A (n) ___________defines specific tasks that an object can perform148. A (n) ___________defines specific tasks that an object can perform

a)a) InstanceInstance

b)b) AttributeAttribute

c)c) MethodMethod

d)d) MessageMessage

149. If objects are similar to nouns, _______ are similar to adjectives that describe the 149. If objects are similar to nouns, _______ are similar to adjectives that describe the characteristics of an objectcharacteristics of an object

a)a) attributesattributes

b)b) classes classes

c)c) MethodsMethods

d)d) MessagesMessages

150. Relationship describe the effects of membership in150. Relationship describe the effects of membership in

a)a) classes classes

b)b) super-classessuper-classes

c)c) subclassessubclasses

d)d) All of the aboveAll of the above

151. In a use case diagram action or event represents by an ______ with a label that describes 151. In a use case diagram action or event represents by an ______ with a label that describes the action or eventthe action or event

a)a) ovaloval

b)b) esquireesquire

c)c) rectangle rectangle

d)d) circlecircle

30

Page 31: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

152. use case diagram Performed during the _______ phase 152. use case diagram Performed during the _______ phase

a)a) analysisanalysis

b)b) designdesign

c)c) implementationimplementation

d)d) maintenancemaintenance

153. In a class diagram, class is drawn as a _____ with the class name at the top.153. In a class diagram, class is drawn as a _____ with the class name at the top.

a)a) circlecircle

b)b) oval.oval.

c)c) pentagon.pentagon.

d)d) rectangle.rectangle.

154. UML notation (1...*) means154. UML notation (1...*) means

a)a) One or zeroOne or zero

b)b) One or manyOne or many

c)c) One and only oneOne and only one

d)d) none of the abovenone of the above

155. A _______ is identified by a line showing direction that runs between two objects155. A _______ is identified by a line showing direction that runs between two objects

a)a) ClassesClasses

b)b) LifelinesLifelines

c)c) MessagesMessages

d)d) FocusesFocuses

156. In a state transition diagram, the states appear as rounded rectangles with the state names 156. In a state transition diagram, the states appear as rounded rectangles with the state names insideinside

a)a) circlecircle

b)b) oval.oval.

c)c) pentagon.pentagon.

d)d) rounded rectangle.rounded rectangle.

31

Page 32: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

157. A (n) ___________ is a command that tells an object or class to perform a creation method157. A (n) ___________ is a command that tells an object or class to perform a creation method

a)a) InstanceInstance

b)b) AttributeAttribute

c)c) classclass

d)d) MessageMessage

158. A class can belong to a more general category called 158. A class can belong to a more general category called

a)a) objectobject

b)b) subclasssubclass

c)c) super classsuper class

d)d) main classmain class

159. A (n) __________ initiates a use case by requesting the system to perform a function or 159. A (n) __________ initiates a use case by requesting the system to perform a function or processprocess

a)a) casecase

b)b) eventevent

c)c) actoractor

d)d) attributeattribute

160. 160. A class is a collection of objects with common structure, common ________A class is a collection of objects with common structure, common ________

a)a) behaviourbehaviour

b)b) relationshipsrelationships

c)c) semantics.semantics.

d)d) all of the above.all of the above.

161. UML notation (0...*) means161. UML notation (0...*) means

a)a) zero or onezero or one

b)b) zero or manyzero or many

c)c) zero and only zerozero and only zero

d)d) none of the abovenone of the above

32

Page 33: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

162. A software package that can be used by many different types of organizations is called a 162. A software package that can be used by many different types of organizations is called a ____________ .____________ .

a)a) standard applicationstandard application

b)b) vertical applicationvertical application

c)c) horizontal applicationhorizontal application

d)d) VAR applicationVAR application

163. Which of the following is not a reason for purchasing a Software Package?163. Which of the following is not a reason for purchasing a Software Package?

a)a) Meet constraints of existing technologyMeet constraints of existing technology

b)b) Lower costsLower costs

c)c) Require less time to implementRequire less time to implement

d)d) Future upgrades provided by the vendorFuture upgrades provided by the vendor

164. Which of the following is not a reason for developing in-house software?164. Which of the following is not a reason for developing in-house software?

a)a) Meet constraints of existing technologyMeet constraints of existing technology

b)b) Lower costsLower costs

c)c) Satisfy unique business requirementsSatisfy unique business requirements

d)d) Develop internal resources and capabilitiesDevelop internal resources and capabilities

165. Which of these tasks regarding ascertaining hardware and software needs should be done 165. Which of these tasks regarding ascertaining hardware and software needs should be done first?first?

a)a) Inventory all current computer hardware.Inventory all current computer hardware.

b)b) Estimate current and future system workloads.Estimate current and future system workloads.

c)c) Evaluate available hardware and software for the proposed system.Evaluate available hardware and software for the proposed system.

d)d) Call vendors and schedule new system demonstrations.Call vendors and schedule new system demonstrations.

166. Which of the hardware acquisition methods is better only for the long run?166. Which of the hardware acquisition methods is better only for the long run?

a)a) rentingrenting

b)b) leasingleasing

c)c) buyingbuying

d)d) all methods are the sameall methods are the same

33

Page 34: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

167. There are _____ options for obtaining computer equipment.167. There are _____ options for obtaining computer equipment.

a)a) twotwo

b)b) threethree

c)c) fourfour

d)d) fivefive

168. The advantage of ______ hardware decision is that; 168. The advantage of ______ hardware decision is that; provide tax advantages of accelerated provide tax advantages of accelerated deprecation. deprecation.

a)a) rentingrenting

b)b) leasingleasing

c)c) buyingbuying

d)d) all methods are the sameall methods are the same

169. The environment that analysts and programmers use to develop and maintain programs is 169. The environment that analysts and programmers use to develop and maintain programs is called the _______________ environment. called the _______________ environment.

a)a) operationaloperational

b)b) testtest

c)c) managementmanagement

d)d) analystanalyst

170. Using a _______________ strategy to train users, you can select knowledgeable users who170. Using a _______________ strategy to train users, you can select knowledgeable users who then conduct sessions for others.then conduct sessions for others.

a)a) tutorialtutorial

b)b) classroomclassroom

c)c) operationaloperational

d)d) train-the-trainertrain-the-trainer

171. The environment for the actual system operation is called _____.171. The environment for the actual system operation is called _____.

a)a) operational environmentoperational environment

b)b) production environmentproduction environment

c)c) both a. and b.both a. and b.

34

Page 35: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) neither a. nor b.neither a. nor b.

172. The process in which existing data is loaded into a new system is referred to as _____.172. The process in which existing data is loaded into a new system is referred to as _____.

a)a) data conversiondata conversion

b)b) data additiondata addition

c)c) data directiondata direction

d)d) data exchangedata exchange

173. The ____________ approach for a system changeover causes the new system to be used 173. The ____________ approach for a system changeover causes the new system to be used immediately as soon as it becomes operational.immediately as soon as it becomes operational.

a)a) parallel operationparallel operation

b)b) smooth cutoversmooth cutover

c)c) direct cutoverdirect cutover

d)d) pilot operationpilot operation

174. The ____________ changeover method allows you to implement the new system in stages,174. The ____________ changeover method allows you to implement the new system in stages, or modules.or modules.

a)a) phased operationphased operation

b)b) staged operationstaged operation

c)c) parallel operationparallel operation

d)d) horizontal operationhorizontal operation

175. The _____ assesses the overall quality of a new information system.175. The _____ assesses the overall quality of a new information system.

a)a) post-cutover evaluation post-cutover evaluation

b)b) post-implementation evaluation post-implementation evaluation

c)c) post-integration evaluation post-integration evaluation

d)d) none of the abovenone of the above

176.The process of putting the new information system online and retiring the old system is 176.The process of putting the new information system online and retiring the old system is described as _____.described as _____.

a)a) system renewal system renewal

35

Page 36: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) system shutdown system shutdown

c)c) system changeover system changeover

d)d) system initiativesystem initiative

177. Which of the following is the least expensive installation method?177. Which of the following is the least expensive installation method?

a)a) direct cutoverdirect cutover

b)b) pilot operationpilot operation

c)c) parallel operationparallel operation

d)d) phased operationphased operation

178. A reusable module that can be invoked from more than one point in a structure chart is a 178. A reusable module that can be invoked from more than one point in a structure chart is a _____._____.

a)a) subordinate module subordinate module

b)b) library module library module

c)c) repeat module repeat module

d)d) couple modulecouple module

179. _____ measures a module's scope and processing characteristics.179. _____ measures a module's scope and processing characteristics.

a)a) Coupling Coupling

b)b) Transference Transference

c)c) Cohesion Cohesion

d)d) Transaction propertiesTransaction properties

180. A lower-level module in a structure chart is referred to as a _____.180. A lower-level module in a structure chart is referred to as a _____.

a)a) control module control module

b)b) sub-control module sub-control module

c)c) subordinate module subordinate module

d)d) level 2 modulelevel 2 module

181. Testing each module alone in an attempt to discover any errors in its code best describes:181. Testing each module alone in an attempt to discover any errors in its code best describes:

a)a) module testingmodule testing

b)b) integration testingintegration testing

36

Page 37: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

c)c) unit testingunit testing

d)d) function testingfunction testing

182. The language grammar errors are called.182. The language grammar errors are called.

a)a) Syntax errorsSyntax errors

b)b) Symantec errorsSymantec errors

c)c) design errorsdesign errors

d)d) software errorssoftware errors

183. A review of a project team member's work by other members of the team is called.183. A review of a project team member's work by other members of the team is called.

a)a) Desk checkingDesk checking

b)b) Structured walkthroughStructured walkthrough

c)c) analysts walkthroughanalysts walkthrough

d)d) project walkthroughproject walkthrough

184. ______________________ is the process of bringing together all of the modules that a 184. ______________________ is the process of bringing together all of the modules that a program comprises for testing purposes. program comprises for testing purposes.

a)a) integration testing integration testing

b)b) system testing system testing

c)c) control testingcontrol testing

d)d) stub testingstub testing

185. Written or other visual information about an application system, how it works, and how to 185. Written or other visual information about an application system, how it works, and how to use it best describes:use it best describes:

a)a) System documentationSystem documentation

b)b) Operations DocumentationOperations Documentation

c)c) Message documentationMessage documentation

d)d) User documentationUser documentation

186. Operations Documentation Include 186. Operations Documentation Include

a)a) Special forms required, including online formsSpecial forms required, including online forms

b)b) Error and informational messages to operators and restart proceduresError and informational messages to operators and restart procedures

c)c) Special instructions, such as security requirementsSpecial instructions, such as security requirements

d)d) all of the above all of the above

37

Page 38: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

187. A successful information system requires training for187. A successful information system requires training for

a)a) usersusers

b)b) managersmanagers

c)c) IT staff membersIT staff members

d)d) all of the aboveall of the above

188. The environment for the actual system operation is called the _______________ 188. The environment for the actual system operation is called the _______________ environment. environment.

a)a) operationaloperational

b)b) testtest

c)c) managementmanagement

d)d) analystanalyst

189. Systems analysts and programmers should not have access to the _________ environment189. Systems analysts and programmers should not have access to the _________ environment except to correct a system problem or to make authorized modification or enhancementsexcept to correct a system problem or to make authorized modification or enhancements

a)a) operationaloperational

b)b) testtest

c)c) managementmanagement

d)d) analystanalyst

190. Which of the following is the most expensive installation method?190. Which of the following is the most expensive installation method?

a)a) direct cutoverdirect cutover

b)b) pilot operationpilot operation

c)c) parallel operationparallel operation

d)d) phased operationphased operation

191. You might talk to ___________ to learn how the system functions on day-to-day basis 191. You might talk to ___________ to learn how the system functions on day-to-day basis

a)a) operational personaloperational personal

b)b) high level managershigh level managersc)c) supervisorssupervisors

38

Page 39: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) customerscustomers

192. A(n) _______________ describes a company for its stakeholders and briefly states the 192. A(n) _______________ describes a company for its stakeholders and briefly states the company's overall purpose, services, and values.company's overall purpose, services, and values.

a)a) Mission statementMission statement

b)b) ObjectivesObjectivesc)c) Strategic planningStrategic planningd)d) A company goalsA company goals

193.Valuable sources in problem finding.193.Valuable sources in problem finding.

a)a) Observe behavior of employeesObserve behavior of employees

b)b) Listen to feedback from customersListen to feedback from customersc)c) Listen to feedback from suppliersListen to feedback from suppliersd)d) All of the aboveAll of the above

194. In a SWOT analysis, the O stands for ____________.194. In a SWOT analysis, the O stands for ____________.

a)a) ObjectObject

b)b) OperationOperationc)c) ObjectionsObjectionsd)d) OpportunitiesOpportunities

195. Stakeholders in a company are which of the following? 195. Stakeholders in a company are which of the following?

a)a) CommunityCommunity

b)b) SuppliersSuppliersc)c) EmployeesEmployeesd)d) all of the aboveall of the above

196. The coding of data to keep it safe from unauthorized users is called ___________ 196. The coding of data to keep it safe from unauthorized users is called ___________

a)a) lockinglocking

b)b) hidinghidingc)c) shadingshadingd)d) encryptionencryption

196. Which of the following is not an external factor that will affect a project?196. Which of the following is not an external factor that will affect a project?

a)a) CustomersCustomers

b)b) Existing SystemsExisting Systems

39

Page 40: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

c)c) EconomyEconomyd)d) TechnologyTechnology

197. Which of the following is not a main reason for a system request?197. Which of the following is not a main reason for a system request?

a)a) Improved serviceImproved service

b)b) Support for new products and servicesSupport for new products and servicesc)c) Better performanceBetter performanced)d) TechnologyTechnology

198. Which of the following is not considered when analyst analyze risk198. Which of the following is not considered when analyst analyze risk

a)a) ProbabilityProbability

b)b) Financial impact of the risk.Financial impact of the risk.c)c) Risk natureRisk natured)d) ReliabilityReliability

199. ____________ can be measured in dollars.199. ____________ can be measured in dollars.

a)a) Tangible benefitsTangible benefits

b)b) Intangible benefitsIntangible benefitsc)c) Projected salesProjected salesd)d) Future growthFuture growth

200. _______________ feasibility refers to the technical resources needed to develop, purchase, 200. _______________ feasibility refers to the technical resources needed to develop, purchase, install, or operate a system.install, or operate a system.

a)a) OperationalOperational

b)b) TechnicalTechnicalc)c) EconomicEconomicd)d) ScheduleSchedule

201. An analyst has identified the costs for hardware repairs to the system. This will be 201. An analyst has identified the costs for hardware repairs to the system. This will be categorized as a _____.categorized as a _____.

a)a) tangible benefittangible benefit

b)b) intangible benefitintangible benefitc)c) operational costoperational costd)d) development benefitdevelopment benefit

202. Faster decision making, information processing efficiency, and improved asset utilization are202. Faster decision making, information processing efficiency, and improved asset utilization are examples of:examples of:

a)a) intangible costsintangible costs

b)b) tangible coststangible costsc)c) tangible benefitstangible benefits

40

Page 41: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) intangible benefitsintangible benefits

203. The process of assessing the degree to which the potential time frame and completion 203. The process of assessing the degree to which the potential time frame and completion dates for all major activities within a project meet organizational deadlines and constraints for dates for all major activities within a project meet organizational deadlines and constraints for affecting change best describes:affecting change best describes:

a)a) Operational feasibilityOperational feasibility

b)b) Technical feasibilityTechnical feasibilityc)c) Economic feasibilityEconomic feasibilityd)d) Schedule feasibilitySchedule feasibility

204. Which of the following is not an Operational feasibility vital issue?204. Which of the following is not an Operational feasibility vital issue?

a)a) Management supportManagement support

b)b) Users trainingUsers trainingc)c) Performance decline in some system partsPerformance decline in some system partsd)d) Cost reduction and avoidanceCost reduction and avoidance

205. A project is Important enough to be considered over other projects, is one of205. A project is Important enough to be considered over other projects, is one of

a)a) History of the project requestHistory of the project request

b)b) Project Selection criteria Project Selection criteria c)c) Operational feasibilityOperational feasibilityd)d) Economic feasibilityEconomic feasibility

206. The product of the _________________ is a report to management206. The product of the _________________ is a report to management

a)a) preliminary investigationpreliminary investigation

b)b) strategic planningstrategic planningc)c) feasibility studyfeasibility studyd)d) risk analysisrisk analysis

207. To get information from a larger group, you should conduct207. To get information from a larger group, you should conduct

a)a) Group interviewGroup interview

b)b) user surveyuser surveyc)c) official observationofficial observationd)d) unofficial observation unofficial observation

208. The final task in the preliminary investigation is 208. The final task in the preliminary investigation is

a)a) Estimate Project Development Time and CostEstimate Project Development Time and Cost

b)b) Evaluate FeasibilityEvaluate Feasibilityc)c) Perform Fact-FindingPerform Fact-Findingd)d) Present Results and Recommendations to ManagementPresent Results and Recommendations to Management

41

Page 42: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

209. Representing the systems concept as a set of storage containers and how the contents are 209. Representing the systems concept as a set of storage containers and how the contents are

organized is a _____ methodology.organized is a _____ methodology.

a)a) data centereddata centered

b)b) life cyclelife cyclec)c) object-orientedobject-orientedd)d) process centeredprocess centered

210.A(n) _____________ is a document that describes your company, lists the IT

services or products you need, and specifies the features you require.

a) ERP

b) RFP

c) 4GL

d) ROI

211. A(n) _____________ is a document that can involve outright purchase or a verity of

leasing or renting options and can include maintenance or technical support terms

a) RFQ

b) RFP

c) 4GL

d) ROI

212. A test that evaluates the time a package takes to process a certain number of 212. A test that evaluates the time a package takes to process a certain number of

transactions is a _____ test.transactions is a _____ test.

a)a) milestonemilestone

b)b) standardstandard

c)c) productionproduction

d)d) benchmarkbenchmark

213. The FIRST thing that should be included in a presentation to management at the 213. The FIRST thing that should be included in a presentation to management at the

completion of the systems analysis phase is a _____.completion of the systems analysis phase is a _____.

a)a) summary of primary viable alternativessummary of primary viable alternatives

b)b) brief overview of the purpose and objectives of the system projectbrief overview of the purpose and objectives of the system project

c)c)   justification for the choice of the recommended alternativejustification for the choice of the recommended alternative

42

Page 43: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) none of the abovenone of the above

214. logical design includes214. logical design includes

a)a) Output that must be produced by the systemOutput that must be produced by the system

b)b) Input needed by the systemInput needed by the system

c)c) Process that must be performed by the system, without regard to how Process that must be performed by the system, without regard to how

tasks will be accomplished physically tasks will be accomplished physically

d)d) All of the aboveAll of the above

215. A system is maintainable if it 215. A system is maintainable if it

a)a) adequately handles errorsadequately handles errors

b)b) defined requirements and constraints, accepted by users, and supportdefined requirements and constraints, accepted by users, and support

the organization’s business objectivesthe organization’s business objectives

c)c) is well designed, flexible, and developed with future modifications in is well designed, flexible, and developed with future modifications in

mindmind

d)d) none of the abovenone of the above

216. The ____________ design of an information system is a plan for the actual 216. The ____________ design of an information system is a plan for the actual

implementation of the system.implementation of the system.

a)a) physicalphysical

b)b) logicallogical

c)c) verticalvertical

d)d) horizontalhorizontal

217. Report that trace the entry of and changes to critical data values are called 217. Report that trace the entry of and changes to critical data values are called

_________ and are essential in every system_________ and are essential in every system

a)a) audit trailsaudit trails

b)b) undo transactionsundo transactions

c)c) ROIROI

43

Page 44: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

218. The focus on defining the activities associated with the system is a __________ 218. The focus on defining the activities associated with the system is a __________

methodology.methodology.

a)a) data centereddata centered

b)b) life cyclelife cycle

c)c) object-orientedobject-oriented

d)d) process centeredprocess centered

219. A formal step-by-step approach to the systems development life cycle that move 219. A formal step-by-step approach to the systems development life cycle that move

logically from on phase to the next is called _____.logically from on phase to the next is called _____.

a)a) ad hoc designad hoc design

b)b) RAD designRAD design

c)c) agile developmentagile development

d)d) structured designstructured design

220. The advantage of ______ hardware decision is that; 220. The advantage of ______ hardware decision is that; provide tax advantages of provide tax advantages of

accelerated deprecation. accelerated deprecation.

a)a) rentingrenting

b)b) leasingleasing

c)c) buyingbuying

d)d) all methods are the sameall methods are the same

221. A risk is an event that can affect a project _____.221. A risk is an event that can affect a project _____.

a)a)   negativelynegatively

b)b) positivelypositively

c)c) in any wayin any way

d)d) all of the aboveall of the above

222. A project where management has a yes/no choice over implementation is called a ____ 222. A project where management has a yes/no choice over implementation is called a ____ project.project.

a)a) nondiscretionary nondiscretionary

b)b) discretionarydiscretionary

c)c) resourceresource

44

Page 45: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) non-resourcenon-resource

223. The first step in evaluating feasibility is _____.223. The first step in evaluating feasibility is _____.

a)a) setting priorities setting priorities

b)b) identify systems requests that are not feasible or necessaryidentify systems requests that are not feasible or necessary

c)c) conducting a preliminary investigationconducting a preliminary investigation

d)d) none of the abovenone of the above

224. The first step in a preliminary investigation is generally to _____.224. The first step in a preliminary investigation is generally to _____.

a)a) evaluate feasibilityevaluate feasibility

b)b) perform fact-findingperform fact-finding

c)c) understand the problem or opportunityunderstand the problem or opportunity

d)d) estimate project development time and costestimate project development time and cost

225. Project creep refers to a project that _____.225. Project creep refers to a project that _____.

a)a) expands gradually without specific authorizationexpands gradually without specific authorization

b)b) moves at an appropriate pacemoves at an appropriate pace

c)c) adheres to effective boundariesadheres to effective boundaries

d)d) none of the abovenone of the above

226. When interacting with users about a new system, _____ is the most effective approach 226. When interacting with users about a new system, _____ is the most effective approach toward building a positive relationship with users.toward building a positive relationship with users.

a)a) asking users about problems they are encounteringasking users about problems they are encountering

b)b) asking users about additional capabilities they would like to have with the asking users about additional capabilities they would like to have with the systemsystem

c)c) asking users about the limitations of the systemasking users about the limitations of the system

d)d) all of the aboveall of the above

227. A report to management that results from a preliminary investigation does NOT need to 227. A report to management that results from a preliminary investigation does NOT need to include _____.include _____.

a)a) a summary of the systems requesta summary of the systems request

b)b) an estimate of the time involved to implement the new systeman estimate of the time involved to implement the new system

c)c) detailed reports of the interviews conducted in the investigationdetailed reports of the interviews conducted in the investigation

45

Page 46: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

d)d) a list of the expected benefits of the systema list of the expected benefits of the system

228. To obtain information about a systems request, initial fact-finding should include _____.228. To obtain information about a systems request, initial fact-finding should include _____.

a)a) studying organization charts studying organization charts

b)b) performing interviewsperforming interviews

c)c) observing operationsobserving operations

d)d) all of the aboveall of the above

229. A(n) _______________ describes a company for its stakeholders and briefly states the 229. A(n) _______________ describes a company for its stakeholders and briefly states the company's overall purpose, services, and values.company's overall purpose, services, and values.

a)a) Mission statementMission statement

b)b) ObjectivesObjectives

c)c) Strategic planningStrategic planning

d)d) A company goalsA company goals

230. Valuable sources in problem finding.230. Valuable sources in problem finding.

a)a) Observe behavior of employeesObserve behavior of employees

b)b) Listen to feedback from customersListen to feedback from customers

c)c) Listen to feedback from suppliersListen to feedback from suppliers

d)d) All of the aboveAll of the above

231. The disadvantage of this development methodology is that it may have inconsistent internal 231. The disadvantage of this development methodology is that it may have inconsistent internal designs within and across systemsdesigns within and across systems

a)a) Waterfall DevelopmentWaterfall Development

b)b) Structured methodologyStructured methodology

c)c) Rapid Application Development Rapid Application Development

d)d) agile developmentagile development

232. The advantage of this development methodology is that most important functionalities are 232. The advantage of this development methodology is that most important functionalities are considered as and when they arriveconsidered as and when they arrive

a)a) . a. Waterfall Development. a. Waterfall Development

b)b) Prototyping methodologyPrototyping methodology

c)c) Rapid Application Development Rapid Application Development

d)d) agile developmentagile development

46

Page 47: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

233. The creation of a quick program that provides a minimal amount of features is performed 233. The creation of a quick program that provides a minimal amount of features is performed during this development methodology.during this development methodology.

a)a) object-orientedobject-oriented

b)b) parallelparallel

c)c) prototypingprototyping

d)d) structured structured

234. Whose JAD participant provide operational level input on current operations234. Whose JAD participant provide operational level input on current operations

a)a) useruser

b)b) analystanalyst

c)c) top managementtop management

d)d) managermanager

235. _________ analysis and design, blend analysis and design in evolutionary process235. _________ analysis and design, blend analysis and design in evolutionary process

a)a) Waterfall DevelopmentWaterfall Developmentb)b) object oriented object oriented c)c) StructuredStructuredd)d) spiralspiral

236. In structured analysis and design context diagram is a (n) ____________.236. In structured analysis and design context diagram is a (n) ____________.

a)a) Environmental ModelEnvironmental Model

b)b) Behavioral ModelBehavioral Modelc)c) Implementation ModelImplementation Modeld)d) Initial modelInitial model

237. The term _____ refers to the additional layers required by Web-based software to 237. The term _____ refers to the additional layers required by Web-based software to communicate with existing software and legacy systems.communicate with existing software and legacy systems.

a)a) transware transware

b)b) connective softwareconnective softwarec)c) middlewaremiddlewared)d) all of the aboveall of the above

238. A ____________ determines how long it takes an information system to pay for itself 238. A ____________ determines how long it takes an information system to pay for itself through reduced costs and increased benefits.through reduced costs and increased benefits.

47

Page 48: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) net present valuenet present value

b)b) return on investmentreturn on investmentc)c) payback analysispayback analysisd)d) Information Systems analysisInformation Systems analysis

239. The advantage of this development methodology is that dramatic time savings the systems 239. The advantage of this development methodology is that dramatic time savings the systems development effortdevelopment effort

a)a) Waterfall DevelopmentWaterfall Developmentb)b) Parallel DevelopmentParallel Developmentc)c) Rapid Application Development Rapid Application Development d)d) agile developmentagile development

240. In structured analysis and design Data Flow Diagram240. In structured analysis and design Data Flow Diagram

is a (n) ____________.is a (n) ____________.

a)a) Environmental ModelEnvironmental Model

b)b) Behavioral ModelBehavioral Modelc)c) Implementation ModelImplementation Modeld)d) Initial modelInitial model

241. The disadvantage of this development methodology is that identifying the most important 241. The disadvantage of this development methodology is that identifying the most important subset of requirements at any stage is a tedious task.subset of requirements at any stage is a tedious task.

a)a) Waterfall DevelopmentWaterfall Developmentb)b) Structured methodologyStructured methodologyc)c) Prototyping methodologyPrototyping methodologyd)d) object oriented analysis and designobject oriented analysis and design

242. ____________ methodology performs the analysis, design and implementation phases 242. ____________ methodology performs the analysis, design and implementation phases concurrently.concurrently.

a)a) Waterfall DevelopmentWaterfall Developmentb)b) Structured methodologyStructured methodologyc)c) Prototyping methodologyPrototyping methodologyd)d) object oriented analysis and designobject oriented analysis and design

243. Whose JAD participant provide enterprise level authorization and support for the project243. Whose JAD participant provide enterprise level authorization and support for the project

a)a) useruser

b)b) analystanalystc)c) top managementtop managementd)d) managermanager

244. Which of the following objectives is not a CASE tools objective?244. Which of the following objectives is not a CASE tools objective?

a)a) Observe behavior of employeesObserve behavior of employees

48

Page 49: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) Listen to feedback from customersListen to feedback from customersc)c) Listen to feedback from suppliersListen to feedback from suppliersd)d) All of the aboveAll of the above

245. The following question is an example of which system requirements ‘’The system must 245. The following question is an example of which system requirements ‘’The system must support 25 users online simultaneously’’support 25 users online simultaneously’’

a)a) ProcessesProcesses

b)b) PerformancePerformancec)c) ControlsControlsd)d) InputsInputs

246. What is an effective guideline in ordering questions on the questionnaire?246. What is an effective guideline in ordering questions on the questionnaire?

a)a) Place them in random order.Place them in random order.

b)b) Place those least important to respondents first.Place those least important to respondents first.c)c) Place the open-ended questions first.Place the open-ended questions first.d)d) Place those most important to respondents firstPlace those most important to respondents first

247. In sampling, which of these is not a type of sample?247. In sampling, which of these is not a type of sample?

a)a) Systematic sampleSystematic sample

b)b) Stratified sampleStratified samplec)c) Random sampleRandom sampled)d) Biological sampleBiological sample

248. Which of these is a disadvantage of Open-Ended questions?248. Which of these is a disadvantage of Open-Ended questions?

a)a) Boring for the intervieweeBoring for the interviewee

b)b) Failure to obtain rich detailFailure to obtain rich detailc)c) Missing main ideasMissing main ideasd)d) May result in too much irrelevant detailMay result in too much irrelevant detail

249. Which of these describes a use for the data flow diagrams of a system?249. Which of these describes a use for the data flow diagrams of a system?

a)a) Data flow diagrams are generally incorrect once system development has Data flow diagrams are generally incorrect once system development has progressed into the programming stage.progressed into the programming stage.

b)b) Data flow diagrams are useful only for the very early, general stages of Data flow diagrams are useful only for the very early, general stages of defining a system.defining a system.

c)c) Data flow diagrams are generally not saved once the system is builtData flow diagrams are generally not saved once the system is builtd)d) Data flow diagrams can serve as an excellent documentation of the final Data flow diagrams can serve as an excellent documentation of the final

system.system.

250. A(n) ____________ shows how data moves through an information system.250. A(n) ____________ shows how data moves through an information system.

a)a) entityentity

b)b) relationshiprelationship

49

Page 50: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

c)c) data flowdata flowd)d) zerozero

251. A process that has no input is called a ____________ process.251. A process that has no input is called a ____________ process.

a)a) spontaneous generationspontaneous generation

b)b) black hole black hole c)c) gray holegray holed)d) negative data flownegative data flow

252. The four symbols when diagramming a DFD are________.252. The four symbols when diagramming a DFD are________.

a)a) context, level 0, level 1 and level 2 context, level 0, level 1 and level 2

b)b) entity, relationship, process, and data flowentity, relationship, process, and data flowc)c) fragment, diagram, scenario, and visualizationfragment, diagram, scenario, and visualizationd)d) process, data flow, data store, and external entityprocess, data flow, data store, and external entity

253. A ____________ is the term used to describe a central storehouse of information about a 253. A ____________ is the term used to describe a central storehouse of information about a system's data.system's data.

a)a) data housedata house

b)b) data basedata basec)c) data dictionarydata dictionaryd)d) data warehousedata warehouse

254. Which of these is an advantage or benefit of a data dictionary?254. Which of these is an advantage or benefit of a data dictionary?

a)a) It provides documentation and eliminates redundancy.It provides documentation and eliminates redundancy.

b)b) It provides additional work for the systems analyst.It provides additional work for the systems analyst.c)c) It is required for database design.It is required for database design.d)d) It is required for on-line system design.It is required for on-line system design.

255. What does the plus sign (+) symbol mean in a data structure definition?255. What does the plus sign (+) symbol mean in a data structure definition?

a)a) iterationiterationb)b) optionaloptionalc)c) either/oreither/ord)d) andand

256. A (n) ___________ is a command that tells an object or class to perform a creation method256. A (n) ___________ is a command that tells an object or class to perform a creation method

a)a) InstanceInstance

b)b) AttributeAttributec)c) classclassd)d) MessageMessage

50

Page 51: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

257. A class can belong to a more general category called 257. A class can belong to a more general category called

a)a) objectobject

b)b) subclasssubclassc)c) superclasssuperclassd)d) main classmain class

258. A (n) __________ initiates a use case by requesting the system to perform a function or 258. A (n) __________ initiates a use case by requesting the system to perform a function or processprocess

a)a) casecase

b)b) eventeventc)c) actoractord)d) attributeattribute

259. 259. A class is a collection of objects with common structure, common ________A class is a collection of objects with common structure, common ________

a)a) behaviourbehaviour

b)b) relationshipsrelationshipsc)c) semantics.semantics.d)d) all of the above.all of the above.

260. 260. A software package developed to handle information requirements for a specific type of A software package developed to handle information requirements for a specific type of businessbusiness

a)a) standard applicationstandard application

b)b) vertical applicationvertical applicationc)c) horizontal applicationhorizontal applicationd)d) VAR applicationVAR application

261. Which of the following is a reason for developing in-house software?261. Which of the following is a reason for developing in-house software?

a)a) Meet constraints of existing technologyMeet constraints of existing technology

b)b) Lower costsLower costsc)c) Require less time to implementRequire less time to implementd)d) Future upgrades provided by the vendorFuture upgrades provided by the vendor

262. Outsourcing raises issues such as 262. Outsourcing raises issues such as

a)a) controlcontrol

b)b) cultureculturec)c) communicationcommunicationd)d) all of the aboveall of the above

51

Page 52: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

263. The advantage of ______ hardware decision is that; 263. The advantage of ______ hardware decision is that; easy to change systems. easy to change systems.

a)a) rentingrenting

b)b) leasingleasingc)c) buyingbuyingd)d) all methods are the sameall methods are the same

264. Which of these is not one of six objectives for output?264. Which of these is not one of six objectives for output?

a)a) serves a specific purposeserves a specific purpose

b)b) on timeon timec)c) available in unlimited quantityavailable in unlimited quantityd)d) using the most effective output methodusing the most effective output method

265. Which of these is not an output method?265. Which of these is not an output method?

a)a) printerprinter

b)b) electronic output; email, faxes, Web pageselectronic output; email, faxes, Web pagesc)c) keyboardkeyboardd)d) audio output.audio output.

266. Automated facsimile systems are also called ____.266. Automated facsimile systems are also called ____.

a)a) fax request systemsfax request systems

b)b) fax response systemsfax response systemsc)c) .faxback systems.faxback systemsd)d) none of the abovenone of the above

267. Output methods affect267. Output methods affect

a)a) flexibilityflexibility

b)b) durabilitydurabilityc)c) distributiondistributiond)d) all of the aboveall of the above

268. If the output is intended to be a report created to attract shareholders to the business, 268. If the output is intended to be a report created to attract shareholders to the business, _______________is desirable_______________is desirable

a)a) microfilmsmicrofilms

b)b) audioaudioc)c) send by e-mailsend by e-maild)d) printed outputprinted output

269. to create mock-up report you can use269. to create mock-up report you can use

52

Page 53: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) word processor,word processor,

b)b) a report generator a report generator c)c) a printer spacing chart a printer spacing chart d)d) all of the aboveall of the above

270. A ____________ usually causes specific actions, such as printing subtotals for a group of 270. A ____________ usually causes specific actions, such as printing subtotals for a group of records.records.

a)a) control breakcontrol break

b)b) file breakfile breakc)c) detail breakdetail breakd)d) output breakoutput break

271. A(n) ____________ displays only those records that meet a specific condition or conditions.271. A(n) ____________ displays only those records that meet a specific condition or conditions.

a)a) conditional reportconditional report

b)b) exception reportexception reportc)c) work reportwork reportd)d) summary filesummary file

272- ____________ identify a group of related items.

a) Category codes

b) Alphabetic codesc) Block sequence codesd) Sequence codes

273- ____________ combine data from different item attributes, or characteristics, to build the code.

a) Category codes

b) Alphabetic codesc) Derivation codesd) Sequence codes

274- ____________ use a specific combination of letters that are easy to remember.

a) Category codes

b) Alphabetic codesc) Derivation codesd) mnemonic codes

53

Page 54: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

275. A natural extension of the object-oriented analysis process is the _____.

a) relational database

b) hierarchical databasec) object compatible databased) OODB

276- The _____ model was introduced during the 1970's and three decades later is still the predominant model.

a) relational

b) OODBc) hierarchicald) none of the above

277. Which type of database has become increasingly widespread because it can run on many 277. Which type of database has become increasingly widespread because it can run on many platforms?platforms?

a)a) process-oriented databasesprocess-oriented databases

b)b) networked databasesnetworked databases

c)c) hierarchical databaseshierarchical databases

d)d) relational databasesrelational databases

278. Make sure that the data dictionary entities for all ______________________are 278. Make sure that the data dictionary entities for all ______________________are documented completely and correctlydocumented completely and correctly

a)a) data storesdata stores

b)b) recordsrecords

c)c) data elementsdata elements

d)d) all of the aboveall of the above

279. The two popular database models now-a day are ________________.279. The two popular database models now-a day are ________________.

a)a) network and relationalnetwork and relational

b)b) relational and hierarchalrelational and hierarchal

c)c) relational and object-oriented.relational and object-oriented.

d)d) network and object-oriented.network and object-oriented.

280. Data mining, can be described as:280. Data mining, can be described as:

54

Page 55: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) a simple database query.a simple database query.

b)b) a data query written in SQL.a data query written in SQL.

c)c) a technique for retrieving data from Web-based databases.a technique for retrieving data from Web-based databases.

d)d) Data mining looks for meaningful patterns and relationships among dataData mining looks for meaningful patterns and relationships among data

281. A _________________ is the smallest unit of data that is accessed by the operating 281. A _________________ is the smallest unit of data that is accessed by the operating system.system.

a)a) physical recordphysical record

b)b) logical recordlogical record

c)c) physical filephysical file

d)d) logical filelogical file

282. ____________ refers to information as seen through a user’s eyes, regardless of how or 282. ____________ refers to information as seen through a user’s eyes, regardless of how or where the information actually is organized or stored.where the information actually is organized or stored.

a)a) Physical storagePhysical storage

b)b) Logical storageLogical storage

c)c) Data storageData storage

d)d) Information storageInformation storage

283. A ____________ is a set of field values that describes a single person, place, thing, or 283. A ____________ is a set of field values that describes a single person, place, thing, or event.event.

a)a) physical recordphysical record

b)b) report recordreport record

c)c) logical recordlogical record

d)d) page recordpage record

284. An integrated collection of data that can include seemingly unrelated information, no matter 284. An integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company is a _____.where it is stored in the company is a _____.

a)a) data dictionarydata dictionary

b)b) network warehousenetwork warehouse

c)c) data warehousedata warehouse

d)d) company data structurecompany data structure

285. Files record details of all accesses and changes to a file or database and can be used to 285. Files record details of all accesses and changes to a file or database and can be used to recover changes made since the last backup, are. recover changes made since the last backup, are.

55

Page 56: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) rollback filesrollback files

b)b) commit filescommit files

c)c) Audit log filesAudit log files

d)d) access control filesaccess control files

286. the first step in the system design specification is.286. the first step in the system design specification is.

a)a) System environmentSystem environment

b)b) Time and cost estimatesTime and cost estimates

c)c) Executive summaryExecutive summary

d)d) AppendicesAppendices

287. The section that contains the complete design for the new system, is called.287. The section that contains the complete design for the new system, is called.

a)a) System componentsSystem components

b)b) System environmentSystem environment

c)c) Implementation requirementsImplementation requirements

d)d) Executive summaryExecutive summary

288. The section that describes the constraints, or conditions, affecting the system is called.288. The section that describes the constraints, or conditions, affecting the system is called.

a)a) System componentsSystem components

b)b) System environmentSystem environment

c)c) Implementation requirementsImplementation requirements

d)d) Executive summaryExecutive summary

289. Inaccurate requirements, coding errors, and faulty documentation highlight the need for 289. Inaccurate requirements, coding errors, and faulty documentation highlight the need for robust ____________________ . robust ____________________ .

a)a) quality assurancequality assurance

b)b) software engineeringsoftware engineering

c)c) object oriented analysisobject oriented analysis

d)d) training training

290. After the design is created, ________ can begin290. After the design is created, ________ can begin

56

Page 57: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) installationinstallation

b)b) supportsupport

c)c) codingcoding

d)d) analysisanalysis

291. A set of guidelines that provide a quality assurance framework for developing and 291. A set of guidelines that provide a quality assurance framework for developing and maintaining software is _____.maintaining software is _____.

a)a) ISO 9000-3ISO 9000-3

b)b) CMMCMM

c)c) SEI 1000-3SEI 1000-3

d)d) none of the abovenone of the above

292. When designing programs and code modules, it is helpful to refer to ____ created in prior 292. When designing programs and code modules, it is helpful to refer to ____ created in prior SDLC phases.SDLC phases.

a)a) object modelsobject models

b)b) class diagramsclass diagrams

c)c) ERDsERDs

d)d) all of the aboveall of the above

293. A message used by a module to signal a specific condition or action to another module is a 293. A message used by a module to signal a specific condition or action to another module is a _____._____.

a)a) flag flag

b)b) triggertrigger

c)c) tagtag

d)d) markmark

294. In a structure chart, _____ represents repetitive processing.294. In a structure chart, _____ represents repetitive processing.

57

Page 58: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) a transfer symbol a transfer symbol

b)b) a condition symbola condition symbol

c)c) a loop symbola loop symbol

d)d) all of the aboveall of the above

295. Data that one module passes to another is shown in _____.295. Data that one module passes to another is shown in _____.

a)a) a control module a control module

b)b) a data couplea data couple

c)c) a library modulea library module

d)d) a transfer modulea transfer module

296. _____ refers to modules that are independent.296. _____ refers to modules that are independent.

a)a) Tightly coupled Tightly coupled

b)b) Loosely coupledLoosely coupled

c)c) Strongly couplesStrongly couples

d)d) Openly coupledOpenly coupled

297. If modules are _______________, one module refers to internal logic contained in another 297. If modules are _______________, one module refers to internal logic contained in another module.module.

a)a) tightly coupledtightly coupled

b)b) loosely coupledloosely coupled

c)c) data coupledata couple

d)d) control coupledcontrol coupled

298. The pictorial representation of the programs or the algorithm is known as ________.298. The pictorial representation of the programs or the algorithm is known as ________.

a)a) flowchartsflowcharts

b)b) structured English structured English

c)c) PseudocodePseudocode

d)d) data flow diagramdata flow diagram

299. Pseudocode can be used to describe a(n) _____________ .299. Pseudocode can be used to describe a(n) _____________ .

a)a) hardwarehardware

58

Page 59: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) softwaresoftware

c)c) algorithmalgorithm

d)d) all of the above all of the above

300. Structured application development usually involves a ________________ , which 300. Structured application development usually involves a ________________ , which proceeds from a general design to a detailed structure.proceeds from a general design to a detailed structure.

a)a) hardware development approachhardware development approach

b)b) top-down approachtop-down approach

c)c) software engineering approachsoftware engineering approach

d)d) ODBCODBC

301. In _____________, the programmer simulates each program outcome or result and displays301. In _____________, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.a message to indicate whether or not the program executed successfully.

a)a) integration testing integration testing

b)b) system testing system testing

c)c) control testingcontrol testing

d)d) stub testingstub testing

302. The process of reviewing program code to spot logic errors is considered to be _____.302. The process of reviewing program code to spot logic errors is considered to be _____.

a)a) terminal checkingterminal checking

b)b) monitor checkingmonitor checking

c)c) table checkingtable checking

d)d) desk checkingdesk checking

303. _________________ is the process of bringing together of all the programs that a system 303. _________________ is the process of bringing together of all the programs that a system comprises for testing purposes. comprises for testing purposes.

a)a) integration testing integration testing

b)b) system testing system testing

c)c) control testingcontrol testing

d)d) stub testingstub testing

305. The system's functions and how they are implemented is described in _____.305. The system's functions and how they are implemented is described in _____.

59

Page 60: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

a)a) system documentation system documentation

b)b) user documentationuser documentation

c)c) operations documentationoperations documentation

d)d) program documentationprogram documentation

306. The inputs, outputs, and processing logic for all program modules are found in _____.306. The inputs, outputs, and processing logic for all program modules are found in _____.

a)a) system documentationsystem documentation

b)b) user documentationuser documentation

c)c) operations documentationoperations documentation

d)d) program documentationprogram documentation

307. ____________ contains all the information needed for processing and distributing online 307. ____________ contains all the information needed for processing and distributing online and printed output. and printed output.

a)a) System documentationSystem documentation

b)b) Operations DocumentationOperations Documentation

c)c) Message documentationMessage documentation

d)d) Program documentationProgram documentation

308. User Documentation Include.308. User Documentation Include.

a)a) Security and audit trail informationSecurity and audit trail information

b)b) Examples of exceptions and error situationsExamples of exceptions and error situations

c)c) A system overview that clearly describes all major system features, A system overview that clearly describes all major system features, capabilities, and limitationscapabilities, and limitations

d)d) all of the aboveall of the above

309. The environment that analysts and programmers use to develop and maintain programs is 309. The environment that analysts and programmers use to develop and maintain programs is called the _______________ environment. called the _______________ environment.

a)a) operationaloperational

b)b) testtest

c)c) managementmanagement

d)d) analystanalyst

310. Using a _______________ strategy to train users, you can select knowledgeable users who310. Using a _______________ strategy to train users, you can select knowledgeable users who then conduct sessions for others.then conduct sessions for others.

a)a) tutorialtutorial

60

Page 61: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) classroomclassroom

c)c) operationaloperational

d)d) train-the-trainertrain-the-trainer

311. The environment for the actual system operation is called _____.311. The environment for the actual system operation is called _____.

a)a) operational environmentoperational environment

b)b) production environmentproduction environment

c)c) both a. and b.both a. and b.

d)d) neither a. nor b.neither a. nor b.

312. The process in which existing data is loaded into a new system is referred to as _____.312. The process in which existing data is loaded into a new system is referred to as _____.

a)a) data conversion data conversion

b)b) data additiondata addition

c)c) data directiondata direction

d)d) data exchangedata exchange

313. The ____________ approach for a system changeover causes the new system to be used 313. The ____________ approach for a system changeover causes the new system to be used immediately as soon as it becomes operational.immediately as soon as it becomes operational.

a)a) parallel operationparallel operation

b)b) smooth cutoversmooth cutover

c)c) direct cutoverdirect cutover

d)d) pilot operationpilot operation

314. The ____________ changeover method allows you to implement the new system in stages, 314. The ____________ changeover method allows you to implement the new system in stages, or modules.or modules.

a)a) phased operationphased operation

b)b) staged operationstaged operation

c)c) parallel operationparallel operation

d)d) horizontal operationhorizontal operation

315. The _____ assesses the overall quality of a new information system.315. The _____ assesses the overall quality of a new information system.

a)a) post-cutover evaluation post-cutover evaluation

61

Page 62: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) post-implementation evaluationpost-implementation evaluation

c)c) post-integration evaluationpost-integration evaluation

d)d) none of the abovenone of the above

316. The process of putting the new information system online and retiring the old system is 316. The process of putting the new information system online and retiring the old system is described as _____.described as _____.

a)a) system renewalsystem renewal

b)b) system shutdownsystem shutdown

c)c) system changeoversystem changeover

d)d) system initiativesystem initiative

317. Which of the following is the least expensive installation method?317. Which of the following is the least expensive installation method?

a)a) direct cutoverdirect cutover

b)b) pilot operationpilot operation

c)c) parallel operationparallel operation

d)d) phased operationphased operation

318. Testing each module alone in an attempt to discover any errors in its code best describes:318. Testing each module alone in an attempt to discover any errors in its code best describes:

a)a) module testingmodule testing

b)b) integration testingintegration testing

c)c) unit testingunit testing

d)d) function testingfunction testing

319. The language grammar errors are called.319. The language grammar errors are called.

a)a) Syntax errorsSyntax errors

b)b) Symantec errorsSymantec errors

c)c) design errorsdesign errors

d)d) software errorssoftware errors

320. A review of a project team member's work by other members of the team is called.320. A review of a project team member's work by other members of the team is called.

a)a) Desk checkingDesk checking

62

Page 63: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

b)b) Structured walkthroughStructured walkthrough

c)c) analysts walkthroughanalysts walkthrough

d)d) project walkthroughproject walkthrough

321. ______________________ is the process of bringing together all of the modules that a 321. ______________________ is the process of bringing together all of the modules that a program comprises for testing purposes. program comprises for testing purposes.

a)a) integration testing integration testing

b)b) system testing system testing

c)c) control testingcontrol testing

d)d) stub testingstub testing

322. Written or other visual information about an application system, how it works, and how to 322. Written or other visual information about an application system, how it works, and how to use it best describes:use it best describes:

a)a) System documentationSystem documentation

b)b) Operations DocumentationOperations Documentation

c)c) Message documentationMessage documentation

d)d) User documentationUser documentation

323. ____________ are numbers or letters assigned in a specific order.

a) Category codes

b) Alphabetic codesc) Block sequence codesd) Sequence codes

324. One of the rights cited by IBM usability expert Dr. Clare-Marie Karat is compliance, compliance means?

a) the user has the right to a system that performs exactly as promised

b) the user is always rightc) the user has the right to know the limits of the system’s capabilitiesd) the user has the right to be informed clearly about all systems requirements

325. One of the rights cited by IBM usability expert Dr. Clare-Marie Karat is scope, scope means?

a) the user has the right to a system that performs exactly as promised

b) the user is always rightc) the user has the right to know the limits of the system’s capabilitiesd) the user has the right to be informed clearly about all systems requirements

63

Page 64: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

326. The main menu options that display at the top of the screen are collectively referred to as the ____.

a) menu table

b) menu displayc) menu bard) none of the above

327. A ____________ can display messages or provide a place for a user to enter data.

a) display box

b) toggle boxc) text boxd) check box

328. Operations Documentation Include 328. Operations Documentation Include

a)a) Special forms required, including online formsSpecial forms required, including online forms

b)b) Error and informational messages to operators and restart proceduresError and informational messages to operators and restart procedures

c)c) Special instructions, such as security requirementsSpecial instructions, such as security requirements

d)d) all of the above all of the above

329 . A successful information system requires training for329 . A successful information system requires training for

a)a) usersusers

b)b) managersmanagers

c)c) IT staff membersIT staff members

d)d) all of the aboveall of the above

330 . The environment for the actual system operation is called the _______________ 330 . The environment for the actual system operation is called the _______________ environment. environment.

a)a) operationaloperational

b)b) testtest

c)c) managementmanagement

d)d) analystanalyst

331 . Which of the following is the most expensive installation method?331 . Which of the following is the most expensive installation method?

a)a) direct cutoverdirect cutover

b)b) pilot operationpilot operation

64

Page 65: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

c)c) parallel operationparallel operation

d)d) phased operationphased operation

332. The ____________ changeover method involves implementing the complete new system at332. The ____________ changeover method involves implementing the complete new system at a selected location of the company. a selected location of the company.

a)a) direct cutoverdirect cutover

b)b) pilot operationpilot operation

c)c) parallel operationparallel operation

d)d) phased operationphased operation

333. Which of the following is important to a successful implementation process?333. Which of the following is important to a successful implementation process?

a)a) commitment to the projectcommitment to the project

b)b) commitment to changecommitment to change

c)c) extent of project definition and planningextent of project definition and planning

d)d) all of the above all of the above

65

Page 66: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

Number of Question Answer155 C156 D157 D158 C159 C160 D161 B162 C163 A164 B165 A166 C167 B168 C169 B170 D171 C172 A173 C174 A175 B176 C177 A178 B179 C180 C181 C182 A183 B184 A185 D186 D187 D188 A189 A190 C

66

Page 67: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

Number of Question Answer118 A119 B120 D121 A122 C123 D124 C125 B126 C127 C128 A129 B130 D131 C132 A133 D134 D135 C136 A137 D138 D139 A140 A141 A142 A143 B144 C145 A146 A147 D148 C149 A150 D151 A152 A153 D154 B

Number of Question Answer191 A

67

Page 68: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

192 A193 D194 D195 D196 B197 D198 D199 A200 B201 C202 D203 D204 D205 B206 A207 B208 D209 D210 B211 D212 A213 B214 D215 C216 A217 A218 D219 D220 C221 A223 B224 B225 A226 C227 A228 B

Number of Question Answer229 C230 D231 A

68

Page 69: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

232 A233 D234 A235 C236 C237 B238 B239 C240 A241 B242 A243 C244 C245 C246 B247 C248 C249 C250 D251 B252 D253 D254 C255 C256 D257 A258 D259 C260 A261 D262 D263 C264 C265 D

69

Page 70: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

70

Number of Question Answer266 B267 A268 D269 A270 C271 C272 C273 D274 D275 D276 A277 B278 D279 D280 A281 B282 C283 C284 C285 C286 A287 B288 A289 B290 C291 A292 D293 A294 C295 B296 B297 A298 A299 C300 B301 D302 D

Number of Question Answer303 D304 A305 A306 D307 B308 D309 B310 D311 C312 A313 C314 A315 B316 C317 A318 C319 A320 B321 A322 D323 D324 A325 C326 C327 C328 D329 D330 A331 C332 A333 D

Page 71: An MCQ on ISA - Philadelphia University Analy…  · Web viewPossibly losing control of the interview. May take too much time for the amount of useful information gained. 90. In

71