127
CIS 210 Week 5 Midterm Exam – Strayer NEW Click On The Link Below To Purchase A+ Graded Material Instant Download http://www.hwgala.com/CIS-210-Midterm-Exam-Week-5- Strayer-NEW-CIS210W5E.htm Chapters 1 Through 6 Chapter 1 – Introduction to Systems Analysis and Design MULTIPLE CHOICE 1. ____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information. a. Information systems b. Information technology c. Computer systems d. Computer technology PTS: 1 REF: 4 2. ____ software controls the flow of data, provides data security, and manages network operations. a. Enterprise c. Application b. System d. Legacy PTS: 1 REF: 7 3. Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. a. enterprise applications c. operating applications b. network operating systems d. legacy systems

CIS/210 Week 5 Midterm Exam – Strayer NEW

Embed Size (px)

DESCRIPTION

CIS/210 Week 5 Midterm Exam – Strayer NEWCIS 210 Week 5 Midterm Exam – Strayer NEW

Citation preview

CIS 210 Week 5 Midterm Exam Strayer NEW

Click On The Link Below To Purchase A+ Graded MaterialInstant Download

http://www.hwgala.com/CIS-210-Midterm-Exam-Week-5-Strayer-NEW-CIS210W5E.htm

Chapters 1 Through 6

Chapter 1 Introduction to Systems Analysis and Design

MULTIPLE CHOICE

1.____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.a.Information systems

b.Information technology

c.Computer systems

d.Computer technology

PTS:1REF:4

2.____ software controls the flow of data, provides data security, and manages network operations.a.Enterprisec.Application

b.Systemd.Legacy

PTS:1REF:7

3.Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.a.enterprise applicationsc.operating applications

b.network operating systems (NOS)d.legacy systems

PTS:1REF:8

4.Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.a.2 monthsc.24 months

b.12 monthsd.48 months

PTS:1REF:8

5.When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.a.enterprise applicationsc.operating applications

b.network operating systems (NOS)d.legacy systems

PTS:1REF:7

6.For complex operations, analysts apply computer-based modeling tools that use a standard language called ____.a.electronic data interchange (EDI)

b.joint application development (JAD)

c.business process modeling notation (BPMN)

d.rapid application development (RAD)

PTS:1REF:14

7.Systems analysts use a ____ to graphically represent company operations and information needs.a.JADc.RAD

b.Scrumd.business process model

PTS:1REF:13

8.A business ____ is an overview that describes a companys overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.a.matrixc.index

b.profiled.glossary

PTS:1REF:13

9.Which of the following is one of the main sectors of e-commerce?a.C2Cc.C2B

b.B2Cd.BBC

PTS:1REF:9

10.____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.a.EDIc.TCH

b.ACHd.O-O

PTS:1REF:10

11.Transaction processing (TP) systems ____.a.provide job-related information to users at all levels of a company

b.simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.process data generated by day-to-day business operations

d.include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems

PTS:1REF:15

12.Business support systems ____.a.provide job-related information support to users at all levels of a company

b.simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.process data generated by day-to-day business operations

d.include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems

PTS:1REF:16

13.Knowledge management systems use a large database called a(n) ____ that allows users to find information by entering keywords or questions in normal English phrases.a.inference enginec.knowledge management system

b.knowledge based.inference manager

PTS:1REF:16

14.User productivity systems ____.a.provide job-related information to users at all levels of a company

b.simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

c.process data generated by day-to-day business operations

d.include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and integrated mobile computing systems

PTS:1REF:17

15.In a typical company organizational model, top managers ____.a.develop long-range plans, called strategic plans, which define the companys overall mission and goals

b.provide direction, necessary resources, and performance feedback to supervisors and team leaders

c.oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people

d.include users who rely on TP systems to enter and receive the data they need to perform their jobs

PTS:1REF:18

16.In a typical company organizational model, middle managers ____.a.develop long-range plans, called strategic plans, which define the companys overall mission and goals

b.provide direction, necessary resources, and performance feedback to supervisors and team leaders

c.oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people

d.include users who rely on TP systems to enter and receive the data they need to perform their jobs

PTS:1REF:18

17.A ____, or requirements model, describes the information that a system must provide.a.process modelc.business model

b.data modeld.network model

PTS:1REF:19

18.A(n) ____ shows the data that flows in and out of system processes.a.process modelc.business model

b.object modeld.network model

PTS:1REF:22

19.____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.a.Prototypingc.Scrum

b.Rapid application developmentd.Modeling

PTS:1REF:19

20.____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.a.Scrumc.Modeling

b.Prototypingd.Rapid application development

PTS:1REF:20

21.____ methods include the latest trends in software development.a.Object-oriented analysisc.Structured analysis

b.Agile/Adaptived.Rapid application development

PTS:1REF:21

22.The ____ method of developing systems is well-suited to project management tools and techniques.a.object-oriented analysisc.structured analysis

b.adaptived.rapid application development

PTS:1REF:21

23.The ____ method of developing systems produces code that is modular and reusable.a.object-oriented analysisc.structured analysis

b.adaptived.rapid application development

PTS:1REF:21

24.The ____ method of developing systems stresses team interaction and reflects a set of community-based values.a.object-oriented analysisc.structured analysis

b.agile/adaptived.rapid application development

PTS:1REF:21

25.Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.a.O-Oc.MSF

b.SDLCd.RUP

PTS:1REF:22

26.Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.a.iterativec.inferred

b.process-centeredd.empowered

PTS:1REF:22

27.In the ____, like that shown in the accompanying figure, the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase in the SDLC.a.interactive modelc.waterfall model

b.requirements modeld.object model

PTS:1REF:23

28.In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.a.systems design phasec.systems support and security phase

b.systems planning phased.systems analysis phase

PTS:1REF:23

29.In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system.a.systems analysis phasec.systems design phase

b.systems implementation phased.systems support and security phase

PTS:1REF:23

30.In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a physical model that will satisfy all documented requirements for the system.a.systems implementation phasec.systems analysis phase

b.systems planning phased.systems design phase

PTS:1REF:24

31.In the model of the SDLC shown in the accompanying figure, during the ____, the new system is constructed.a.systems planning phasec.systems design phase

b.systems support and security phased.systems implementation phase

PTS:1REF:24

32.In the model of the SDLC shown in the accompanying figure, during the ____, the IT staff maintains, enhances, and protects the system.a.systems support and security phasec.systems analysis phase

b.systems implementation phased.systems planning phase

PTS:1REF:24

33.Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.a.the MSFc.RUP

b.the SDLCd.O-O

PTS:1REF:24

34.In object-oriented analysis, an object is a member of a(n) ____, which is a collection of similar objects.a.propertyc.message

b.classd.instance

PTS:1REF:24

35.In object-oriented design, built-in processes called ____ can change an objects properties.a.methodsc.attributes

b.functionsd.features

PTS:1REF:25

36.Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback.a.gradualc.spiral

b.extremed.evaluative

PTS:1REF:26

37.The newest development techniques are called ____, which attempt to develop systems incrementally.a.structured methodsc.CASE methods

b.object-oriented methodsd.agile/adaptive methods

PTS:1REF:25

38.The ____ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.a.Web supportc.systems support

b.application developmentd.database administration

PTS:1REF:27

39.____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.a.User supportc.Systems support and security

b.Database administrationd.Network administration

PTS:1REF:28

40.A(n) ____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a companys information systems.a.application developerc.network administrator

b.database administratord.systems analyst

PTS:1REF:29

MULTIPLE RESPONSE

1.An example of a vertical system is a(n) ____.a.inventory applicationc.payroll application

b.medical practice applicationd.database for an auto dealership

2.An example of a horizontal system is a(n) ____.a.inventory applicationc.payroll application

b.application for a Web-based retailerd.medical practice application

3.A business process describes a specific set of ____.a.transactionsc.events

b.employeesd.results

4.Product-oriented firms produced ____.a.retail servicesc.computers

b.routersd.microchips

5.Database administration involves ____.a.network administrationc.data design

b.user accessd.backup

MODIFIED TRUE/FALSE

1.System software consists of programs that support day-to-day business functions and provide users with the information they require. _________________________

2.Value-added services such as consulting, financing, and technical support can be more profitable than hardware. _________________________

3.Joint application development (JAD) is like a compressed version of the entire development process. _________________________

4.Rapid application development focuses on team-based fact-finding. _________________________

5.User support provides users with technical information, training, and productivity support. _________________________

TRUE/FALSE

1.Most firms give their IT budgets a low priority in bad economic times.

PTS:1REF:4

2.A mission-critical system is one that is unimportant to a companys operations.

PTS:1REF:6

3.In an information system, data is information that has been transformed into output that is valuable to users.

PTS:1REF:6

4.In an information system, information consists of basic facts that are the systems raw material.

PTS:1REF:7

5.The success or failure of an information system usually is unrelated to whether users are satisfied with the systems output and operations.

PTS:1REF:9

6.Although the business-to-business (B2B) sector is more familiar to retail customers, the volume of business-to-consumer (B2C) transactions is many times greater.

PTS:1REF:10

7.TP systems are inefficient because they process a set of transaction-related commands individually rather than as a group.

PTS:1REF:16

8.In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships.

PTS:1REF:16

9.A knowledge management system uses inference rules, which consist of a large database that allows users to find information by entering keywords or questions in normal English phrases.

PTS:1REF:16

10.Most large companies require systems that combine transaction processing, business support, knowledge management, and user productivity features.

PTS:1REF:17

11.Because they focus on a longer time frame, middle managers need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.

PTS:1REF:18-19

12.Many companies find that a trend called empowerment, which gives employees more responsibility and accountability, improves employee motivation and increases customer satisfaction.

PTS:1REF:19

13.CASE tools provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysis and object-oriented analysis.

PTS:1REF:20

14.It is unusual for system developers to mix and match system development methods to gain a better perspective.

PTS:1REF:22

15.In the systems planning phase, a key part of the preliminary investigation is a feasibility study that reviews anticipated costs and benefits and recommends a course of action based on operational, technical, economic, and time factors.

PTS:1REF:23

16.In the systems analysis phase, the first step is requirements modeling, where business processes are investigated and what the new system must do to satisfy users is documented.

PTS:1REF:23

17.In object-oriented design, objects possess characteristics called properties, which the object inherits from its class or possesses on its own.

PTS:1REF:24

18.A scalable design can expand to meet new business requirements and volumes.

PTS:1REF:24

19.In object-oriented design, a message requests specific behavior or information from another object.

PTS:1REF:25

20.The structure of the IT department varies among companies, as does its name and placement within the organization.

PTS:1REF:27

21.An IT group provides technical support, which includes application development, systems support and security, user support, database administration, network administration, and Web support.

PTS:1REF:27

22.Network administration includes hardware and software maintenance, support, and security.

PTS:1REF:28

23.Companies typically require that systems analysts have a college degree in information systems, computer science, business, or a closely related field, and some IT experience usually is required.

PTS:1REF:37

24.The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation.

PTS:1REF:32

25.A corporate culture is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

PTS:1REF:32

COMPLETION

1._________________________ refers to the combination of hardware, software, and services that companies use to manage, communicate, and share information.

2._________________________ is a step-by-step process for developing high-quality information systems.

3.A(n) _________________________ combines information technology, people, and data to support business requirements.

4.An IT department team includes _________________________ who plan, develop, and maintain information systems.

5.A(n) _________________________ is a set of related components that produces specific results, such as routing Internet traffic, manufacturing microchips, and controlling complex entities like the Hubbell Telescope.

6.In the accompanying figure showing the components of an information system, _________________________ consist(s) of everything in the physical layer of the information system.

7.In the accompanying figure showing the components of an information system, _________________________ refer(s) to the programs that control the hardware and produce the desired information or results.

8.In the accompanying figure showing the components of an information system, _________________________ is/are the raw material that an information system transforms into useful information.

9.In the accompanying figure showing the components of an information system, _________________________ describe(s) the tasks and business functions that users, managers, and IT staff members perform to achieve specific results.

10.In the accompanying figure showing the components of an information system, the people, called _________________________, interact with an information system, both inside and outside the company.

11.The strongest IT companies in the home shopping market are called __________________ because their primary business depends on the Internet rather than a traditional business channel.

12.Traditional companies sometimes are called _________________________ companies because they conduct business primarily from physical locations.

13.Internet-based commerce is called _________________________ and includes two main sectors: B2C (business-to-consumer) and B2B (business-to-business).

14._________________________ technology uses high-frequency radio waves to track physical objects.

15.A truck fleet dispatcher might run a series of _________________________ scenarios to determine the impact of increased shipments or bad weather.

16._________________________ programs run on a company intranet and enable users to share data, collaborate on projects, and work in teams.

17.The systems implementation phase of the SDLC includes an assessment, called a(n) _________________________, to determine whether the system operates properly and if costs and benefits are within expectation.

18.A(n) _________________________ uses various symbols and shapes to represent data flow, processing, and storage.

19._________________________ design and construct Web pages, monitor traffic, manage hardware and software, and link Web-based applications to a companys information systems.

20.Many hardware and software companies offer _________________________ for IT professionals, which verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.

MATCHING

Identify the letter of the choice that best matches the phrase or definition.a.MISf.team leaders

b.modelingg.operational employees

c.messageh.supply chain

d.spiral modeli.scalable design

e.ERPj.prototype

1.In many large companies, these kinds of systems provide cost-effective support for users and managers throughout the company.

2.The name for new business support systems that produced valuable information, in addition to performing manual tasks; their primary users were managers.

3.All companies that provide materials, services, and functions needed to provide a product to a customer.

4.An approach that proponents believe reduces risks and speeds up software development.

5.People who oversee operational employees and carry out day-to-day functions.

6.People who rely on TP systems to enter and receive data they need to perform their jobs.

7.Produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

8.Requests specific behavior or information from another object.

9.Can expand to meet new business requirements and volumes.

10.An early working version of an information system.

ESSAY

1.Explain a knowledge worker, and why this kind of worker is required by successful companies.

2.What are the disadvantages of each of the three system development methods?

3.Discuss two advantages and disadvantages of agile methods.

CASE

Critical Thinking QuestionsCase 1-1

Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.

1.After Roark has spent a week getting to know the members of the team, including their strengths and weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme keeps recurring: the team has particularly weak communications skills. Which of the following methods, then, is he least likely to use, given what he knows about the disadvantages of each method?a.structured analysis

b.agile/adaptive methods

c.object-oriented analysis

d.rapid application development

2.It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client will throw them a curveball and want to make changes late in the game but that they also will be unwilling to absorb the costs of those changes. For this reason, Roark eliminates which of the following methods of development?a.structured analysis

b.agile/adaptive methods

c.object-oriented analysis

d.rapid application development

Critical Thinking QuestionsCase 1-2

Maddy has been performing at a very high level at the firm, and so when two colleagues of hers who are currently leading other development efforts get sick or leave the company, she is asked to step in and help manage these two other efforts.

3.When Maddy sits down at the first meeting at which the first group is gathering, she hears them discussing the feasibility study in which they are currently engaged. She knows, then, in which phase of the SDLC this team currently is. Which phase is it?a.systems analysis

b.systems design

c.systems planning

d.systems implementation

4.After leaving the first meeting, Maddy goes down the hall to meet with the outgoing manager of the second team. In that meeting, he shares with her the latest draft of the systems requirement document, which is nearly complete. In which phase is the second team currently?a.systems analysis

b.systems design

c.systems planning

d.systems implementation

Chapter 2 Analyzing the Business Case

MULTIPLE CHOICE

1.Systems development typically starts with a ____.a.feasibility study, followed by a systems request, which includes a preliminary investigation

b.systems request, followed by a preliminary investigation, which includes a feasibility study

c.preliminary investigation, followed by a feasibility study, which includes a systems request

d.feasibility study, followed by a preliminary investigation, which includes a systems request

PTS:1REF:48

2.____ planning is the process of identifying long-term organizational goals, strategies, and resources.a.Opportunityc.Strategic

b.Preliminaryd.Vertical

PTS:1REF:50

3.During strategic planning, top managers ask a series of questions that is called a ____ analysis because it examines a companys strengths, weaknesses, opportunities, and threats.a.CRMc.JIT

b.TCOd.SWOT

PTS:1REF:51

4.Strategic planning starts with a ____ that reflects the firms vision, purpose, and values..a.Relationship Diagramc.Performance Assessment

b.Feasibility Studyd.Mission Statement

PTS:1REF:50

5.____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.a.Missionc.Feasibility

b.Relationshipd.Performance

PTS:1REF:55

6.Hardware-based security controls include ____.a.passwordsc.coding data

b.various levels of user accessd.none of the above

PTS:1REF:56

7.____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.a.Mission statement

b.Customer relationship management (CRM)

c.Feasibility study

d.Total cost of ownership (TCO)

PTS:1REF:58

8.Electronic data interchange (EDI) enables ____ inventory systems, which rely on computer-to-computer data exchange to minimize unnecessary inventory.a.CRMc.JIT

b.TCOd.RFID

PTS:1REF:58

9.Many companies implement ____ systems that integrate all customer-related events and transactions.a.CRMc.JIT

b.TCOd.RFID

PTS:1REF:58

10.A systems request form should ____.a.have clear instructions

b.be difficult to understand

c.not include enough space for all required information

d.not indicate what supporting documents are needed

PTS:1REF:59

11.IT Departments today ____ .a.only consult users if they want inputc.are not closely linked to management

b.handle all aspects of systems developmentd.are more team-oriented

PTS:1REF:54

12.When evaluating systems requests, which of the following is an advantage of a systems review committee ____.a.action on requests must wait until the committee meets

b.one persons bias is less likely to affect the decisions

c.members might favor projects requested by their own departments

d.internal political differences could delay important decisions

PTS:1REF:60

13.A feasibility study includes tests for ____ feasibility, which means that a proposed system will be used effectively after it has been developed.a.operationalc.schedule

b.technicald.economic

PTS:1REF:62

14.A feasibility study includes tests for ____ feasibility, which refers to the practical resources needed to develop, purchase, install, or operate the system.a.operationalc.schedule

b.technicald.economic

PTS:1REF:62

15.The estimated costs of a proposed system usually are considered the ____, which includes ongoing support and maintenance costs, as well as acquisition costs.a.CRMc.JIT

b.TCOd.RFID

PTS:1REF:63

16.A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs.a.economicc.operational

b.scheduled.technical

PTS:1REF:63

17.A(n) ____ is an example of an intangible benefit.a.user-friendly system that improves employee job satisfaction

b.new scheduling system that reduces overtime

c.online package tracking system that decreases the need for clerical staff

d.sophisticated inventory control system that cuts excess inventory

PTS:1REF:63

18.An example of a tangible benefit includes a(n) ____.a.user-friendly system that improves employee job satisfaction

b.sales tracking system that supplies better information for marketing decisions

c.new Web site that enhances the companys image

d.online package tracking system that decreases the need for clerical staff

PTS:1REF:63

19.When setting priorities for systems requests, the highest priority goes to projects that provide the ____.a.least benefit, at the highest cost, in the longest period of time

b.least benefit, at the lowest cost, in the longest period of time

c.greatest benefit, at the highest cost, in the shortest period of time

d.greatest benefit, at the lowest cost, in the shortest period of time

PTS:1REF:64

20.Of the measures of feasibility in the accompanying figure, ____ considers questions such as Does management support the project? and Will the new system require training for users?a.schedule feasibilityc.economic feasibility

b.technical feasibilityd.operational feasibility

PTS:1REF:62

21.Of the measures of feasibility in the accompanying figure, ____ considers points such as Does the proposed platform have sufficient capacity for future needs? and Will the hardware and software environment be reliable?a.schedule feasibilityc.economic feasibility

b.technical feasibilityd.operational feasibility

PTS:1REF:62

22.Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.a.schedule feasibilityc.economic feasibility

b.technical feasibilityd.operational feasibility

PTS:1REF:63

23.Of the measures of feasibility in the accompanying figure, issues that relate to ____ include Has management established a firm timetable for the project? and Will a project manager be appointed?a.schedule feasibilityc.economic feasibility

b.technical feasibilityd.operational feasibility

PTS:1REF:64

24.When assessing priorities for systems requests, a systems analyst should look for a high score in which of the following ____.a.Will the proposed system diminish customer service?

b.Will the proposed system increase costs?

c.Will the proposed system result in less information for the organization?

d.Will the proposed system increase revenue for the company?

PTS:1REF:64 - 65

25.____ is an example of a discretionary project.a.Creating a new report for a user

b.Adding a report required by a new federal law

c.Including annual updates to payroll and tax percentages

d.Including quarterly changes in insurance reporting required by law

PTS:1REF:65

26.Projects where management has a choice in implementing them are called ____ projects.a.discretionaryc.appended

b.nondiscretionaryd.concatenated

PTS:1REF:65

27.Projects where management has no choice in implementing them are called ____ projects.a.discretionaryc.appended

b.nondiscretionaryd.concatenated

PTS:1REF:65

28.A systems analyst conducts a(n) ____ investigation to study the systems request and recommend specific action.a.preliminaryc.systems

b.appendixd.transitional

PTS:1REF:66

29.A popular technique for investigating causes and effects is called a ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline.a.wishbonec.jawbone

b.fishboned.crossbones

PTS:1REF:67

30.When using a ____ diagram to investigate causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.a.wishbonec.jawbone

b.fishboned.crossbones

PTS:1REF:67

31.To avoid the problem of project creep, ____.a.define project scope as vaguely as possible

b.leave project scope undefined

c.define project scope as clearly as possible

d.expand the focus beyond the problem at hand

PTS:1REF:68

32.Determining the project ____ means to define the boundaries, or extent, of a project being as specific as possible.a.indexc.scope

b.matrixd.estimation

PTS:1REF:67

33.Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called project ____.a.dilationc.expansion

b.creepd.drift

PTS:1REF:68

34.A(n) ____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.a.conditionc.impediment

b.constraintd.obstacle

PTS:1REF:68

35.The primary method of obtaining information during the preliminary investigation is to ____.a.analyze organization chartsc.review documentation

b.conduct interviewsd.observe operations

PTS:1REF:69

36.In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview.a.determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview

b.establish objectives for the interview, develop interview questions, prepare for the interview, determine the people to interview

c.develop interview questions, prepare for the interview, determine the people to interview, establish objectives for the interview

d.prepare for the interview, determine the people to interview, establish objectives for the interview, develop interview questions

PTS:1REF:69

37.A survey is ____, generally takes less time, and can involve a broad cross-section of people.a.more flexible than a series of interviews, and it is less expensive

b.more flexible than a series of interviews, but it is more expensive

c.not as flexible as a series of interviews, but it is less expensive

d.not as flexible as a series of interviews, and it is more expensive

PTS:1REF:71

38.A(n) _____, sometimes called a(n) _____, is another problem-solving tool often used by an analyst to look for a correlation between two variables..a.Gantt chart, work breakdown structure

b.Fishbone diagram, Ishikawa diagram

c.Pareto chart, vertical bar graph

d.XY chart, scatter diagram

PTS:1REF:72

39.In a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.a.introductionc.expected benefits

b.systems request summaryd.time and costs estimates

PTS:1REF:74

40.In the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the projects scope, constraints, and feasibility.a.appendixc.case for action

b.introductiond.findings

PTS:1REF:74

MULTIPLE RESPONSE

Modified Multiple Choice

1.A SWOT analysis contributes to the strategic planning process by identifying ____ resources.a.technicalc.financial

b.humand.logistical

2.Common reasons for systems requests are ____.a.improved servicesc.better performance

b.weaker controlsd.reduced cost

3.____ is/are an external factor(s) that affect(s) IT systems projects.a.Technologyc.Managers

b.Competitorsd.Suppliers

4.____ is/are an internal factor(s) that affect(s) IT systems projects.a.The economyc.Strategic plans

b.User requestsd.Existing systems and data

5.By questioning users about additional capabilities they would like to have, instead of focusing on difficulties, a systems analyst ____.a.leaves project scope undefined

b.gets a better understanding of operations

c.highlights ways to improve the user's job

d.builds better, more positive relationships with users

MODIFIED TRUE/FALSE

1.It is easier to assign dollar values to intangible benefits. _________________________

2.Regardless of the type, all constraints should be identified as late as possible. _________________________

3.A clear definition of project scope and constraints promotes misunderstandings that arise where managers assume that the system will have a certain feature or support for a project, but later find that the feature is not included. _________________________

4.A Gantt chart is drawn as a vertical bar graph; arranged in descending order, so the team can focus on the most important causes, the bars represent various causes of a problem. _________________________

5.In a preliminary investigation report, the case for action section includes a summary of the project request and a specific recommendation. _________________________

TRUE/FALSE

1.As a project progresses, conditions never change.

PTS:1REF:64

2.A companys mission statement is unrelated to its major goals, shorter-term objectives, and day-to-day business operations.

PTS:1REF:50

3.Management leadership and information technology are unconnected, and no significant changes have occurred in either area.

PTS:1REF:54

4.Systems requests seldom are aimed at improving service to customers or users within a company.

PTS:1REF:55

5.Data entry controls should be excessive without being effective.

PTS:1REF:56

6.Internal and external factors affect every business decision that a company makes, and IT systems are no exception.

PTS:1REF:56

7.A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.

PTS:1REF:57

8.As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.

PTS:1REF:57

9.Information systems that interact with customers usually receive low priority.

PTS:1REF:58

10.Competition drives many information systems decisions.

PTS:1REF:59

11.Economic activity has little influence on corporate information management.

PTS:1REF:59

12.Most large companies rely on one person to evaluate systems requests instead of a committee.

PTS:1REF:60

13.If only one person has the necessary IT skills and experience to evaluate systems requests, that person should consult closely with users and managers throughout the company to ensure that business and operational needs are considered carefully.

PTS:1REF:60

14.Even if users have difficulty with a new system, it still will produce the expected benefits.

PTS:1REF:62

15.When assessing schedule feasibility, a systems analyst must consider the interaction between time and costs.

PTS:1REF:64

16.The first step in evaluating feasibility is to accept and include all systems requests, even those that are not feasible.

PTS:1REF:64

17.Feasibility analysis is an ongoing task that must be performed throughout the systems development process.

PTS:1REF:64

18.Whenever possible, a systems analyst should evaluate a proposed project based on tangible costs and benefits that represent actual (or approximate) dollar values.

PTS:1REF:65

19.Few nondiscretionary projects are predictable.

PTS:1REF:65

20.Before beginning a preliminary investigation, it is important to let people know about the investigation and explain the systems analysts role.

PTS:1REF:66

21.A systems project seldom produces significant changes in company operations.

PTS:1REF:66

22.When interacting with users, a systems analyst should focus on difficulties instead of questioning users about additional capability they would like to have.

PTS:1REF:66

23.Often a change in one system has an unexpected effect on another system.

PTS:1REF:66

24.The purpose of an interview, and of the preliminary investigation itself, is to convince others that a project is justified, not to uncover facts.

PTS:1REF:70

25.The format of a preliminary investigation report is the same from one company to another.

PTS:1REF:74

COMPLETION

1.The term _________________________ refers to the reasons, or justification, for a systems development proposal.

2.A(n) _________________________ describes a company for its stakeholders and briefly states the companys overall purpose, products, services, and values.

3.The outcome of the day-to-day business operations, supported by IT and other corporate resources, is a set of business results that affect company _________________________.

4.After composing a mission statement, a company identifies a set of _________________________ that will accomplish the mission.

5.To achieve its goals, a company develops a list of shorter-term _________________________, which translate into day-to-day business operations.

6._________________________ are vital objectives that must be achieved for an enterprise to fulfill its mission.

7.The starting point for a systems development project is called a(n) _________________________, which is a formal way of asking for IT support.

8.Some common security controls include passwords, various levels of user access, and _________________________, or coding of data to keep it safe from unauthorized users.

9.Hardware-based security controls include _________________________ that can identify a person by a retina scan or by mapping a facial pattern.

10.In the accompanying figure showing factors that affect IT systems projects, a companys _________________________ sets the overall direction for the firm and has an important impact.

11.In the accompanying figure showing factors that affect IT systems projects, many systems project requests come from the _________________________, which often makes recommendations based on its knowledge of business operations and technology trends.

12.In the accompanying figure showing factors that affect IT systems projects, changing _________________________ is a major force affecting business and society in general.

13.In the accompanying figure showing factors that affect IT systems projects, the growth of electronic data interchange (EDI) has made relationships with _________________________ critically important.

14.Many companies call the group of key managers and users responsible for evaluating systems requests a(n) _________________________.

15.A systems request must pass several tests, called a(n) _________________________, to see whether it is worthwhile to proceed further.

16._________________________ are benefits that can be measured in dollars, resulting from a decrease in expenses, an increase in revenues, or both.

17._________________________ are advantages that are difficult to measure in dollars but are important to a company.

18.A feasibility study includes tests for _________________________, which means that a project can be implemented in an acceptable time frame.

19.At some point in the systems development process, a(n) _________________________ is presented, which is a summary of the project request and a specific recommendation.

20.A(n) _________________________ is included in the report to management if you need to attach supporting information (e.g., the interviews you conducted, the documentation you reviewed).

MATCHING

Identify the letter of the choice that best matches the phrase or definition.a.schedule feasibilityf.systems request

b.EPCg.control

c.JITh.preliminary investigation

d.systems developmenti.organization chart

e.EPODj.case for action

1.Today, it is much more team-oriented than in the past.

2.This might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system.

3.A system needs this to ensure that data is secure and accurate.

4.Technology that is expected to overshadow bar code technology in the future.

5.System whose purpose is to provide the right product at the right place at the right time.

6.With this technology, a supplier uses RFID tags on each crate, case, or shipping unit to create a digital shipping list.

7.When assessing this, a systems analyst must consider the interaction between time and costs.

8.Its end product is a report to management.

9.Can be obtained during fact-finding to understand how a department functions.

10.The part of a preliminary investigation report that summarizes the project request and makes a specific recommendation.

ESSAY

1.Discuss in detail at least four of the main reasons for systems requests, including examples where appropriate.

2.Describe in detail at least four of the internal factors that affect the business decisions a company makes.

3.Outline the steps typically conducted during the preliminary investigation.

CASE

Critical Thinking QuestionsCase 2-1

As part of the annual report for the fiscal year just ended, Lara is working on a grid that summarizes the major decisions that the small business for which she works made during the year. As part of her review, she is identifying whether a decision was impacted by factors internal to the company, or external.

1.Lara has just finished writing a short blurb about the internal factors that impacted the major decisions made by the company last fiscal year. Which of the following factors does NOT appear on that list?a.Users were not satisfied by the current tracking database because it was difficult to learn and lacked flexibility.

b.The bar code technology that they have always used to monitor the movement of their products from the factory floor to the retail checkout counter has begun to be replaced by RFID tags.

c.In-house database users wanted information systems support for new features that did not exist when the system was first developed five years earlier.

d.The current systems have, over time, become a patchwork of changes and corrections that cannot support the company's overall sales volume.

2.Which of the following does not appear on Lara's list of external factors?a.The economy experienced a period of expansion, requiring the company to respond with a scalable system that could handle the additional volume and growth.

b.Sales reps requested a more powerful sales analysis report.

c.The firm's closest competitor launched a new sales incentive with which Lara's firm needed to compete.

d.Congress instituted an Internet sales tax.

Critical Thinking QuestionsCase 2-2

Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

3.Which of the following is NOT an area in which Sam must estimate costs to determine TCO?a.licenses

b.facility costs

c.cost of competitors' systems

d.equipment

4.Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?a.The new system is more user-friendly, thus increasing employee job satisfaction.

b.The new scheduling system requires overtime.

c.The new inventory control feature cuts excess inventory and eliminates production delays.

d.The new online package tracking feature improves service and decreases the need for clerical staff.

Chapter 3 Managing Systems Projects

MULTIPLE CHOICE

1.Which of the following are metrics of a successful project ____.a.late completion

b.completion with the same personnel as were on the team at the outset

c.completion over budget

d.delivery of a product that satisfies users

PTS:1REF:90

2.A project managers planning _____.a.involves guiding, supervising, and coordinating the project teams workload

b.includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target

c.consists of staffing, which includes selecting the project team and assigning specific tasks to team members

d.includes identifying project tasks and estimating completion times and costs

PTS:1REF:91

3.A project managers scheduling function _____.a.involves guiding, supervising, and coordinating the project teams workload

b.includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target

c.involves staffing, which includes selecting the project team and assigning specific tasks to team members

d.includes identifying and arranging project tasks and estimating completion times and costs

PTS:1REF:92

4.For a project manager, monitoring _____.a.requires guiding, supervising, and coordinating the project teams workload

b.involves controlling capital

c.consists of staffing, which includes selecting the project team and assigning specific tasks to team members

d.includes identifying and arranging project tasks and estimating completion times and costs

PTS:1REF:92

5.For a project manager, reporting _____.a.involves controlling capital

b.includes informing management, users, and the project team about the progress of the project

c.consists of staffing, which includes selecting the project team and assigning specific tasks to team members

d.includes identifying and arranging project tasks and estimating completion times and costs

PTS:1REF:92

6.Effective project reporting requires ____.a.strong communication skillsc.creating Gantt charts

b.staffing the project teamd.assigning specific tasks to team members

PTS:1REF:92

7.The accompanying figure shows task ____, which simplify a complex task by combining several activities.a.groupsc.aggregates

b.clustersd.links

PTS:1REF:92

8.PERT/CPM is called a(n) ____ technique, because it analyzes a large, complex project as a series of individual tasks.a.top-downc.indexed

b.bottom-upd.cataloging

PTS:1REF:93

9.The first step in the creation of a PERT/CPM chart is to ____.a.determine the logical order of project tasks

b.identify the graphical planning aids to use

c.identify all the project tasks

d.determine the status of all tasks

PTS:1REF:93

10.Many project managers find ____ charts more helpful for scheduling, monitoring, and controlling projects.a.Ganttc.index

b.PERT/CPMd.task

PTS:1REF:93

11.A(n) ____ chart displays complex task patterns and relationships.a.Ganttc.PERT/CPM

b.indexd.task

PTS:1REF:93

12.The first step in creating a WBS is to ____.a.mark all recognizable eventsc.identify all tasks

b.determine time requirementsd.estimate task completion time and cost

PTS:1REF:94

13.A event is a recognizable reference point that you can use to ____.a.monitor progressc.manage time

b.assign peopled.allocate money

PTS:1REF:94

14.In addition to tasks, every project has ____, which are reference points used to monitor progress and manage the project.a.targetsc.members

b.milestonesd.workloads

PTS:1REF:94

15.A ____ might involve maximums for one or more resources.a.successor taskc.constraint

b.task groupd.bottom-up technique

PTS:1REF:97

16.In a PERT/CPM chart, each task has which of the following ____.a.references to successor tasksc.start day/date

b.references to predecessor tasksd.resources allocated

PTS:1REF:98

17.When several tasks can start at the same time, each is called a(n) ____ task.a.synchronousc.baseline

b.asynchronousd.concurrent

PTS:1REF:99

18.Two or more concurrent tasks often depend on a single prior task, which is called a(n) ____ task.a.predecessorc.antecedent

b.a priorid.ancestor

PTS:1REF:99

19.When two or more concurrent tasks depend on a single prior task, the concurrent tasks are called ____ tasks.a.descendentc.children

b.successord.antecedent

PTS:1REF:99

20.A ____ path includes all tasks that are vital to the project schedule.a.vitalc.critical

b.baselined.foundational

PTS:1REF:102

21.Project managers always must be aware of the ____ path, so they can monitor the vital tasks and keep the project on track.a.vitalc.foundational

b.baselined.critical

PTS:1REF:102

22.When maintaining schedules, if enough ____ and frequent checkpoints exist, problems will be detected rapidly.a.success indicesc.milestones

b.critical pathsd.all of the above

PTS:1REF:104

23.____ is open-source software that is supported by a community of users and developers.a.GanttProjectc.Microsoft Project Professional

b.Microsoft Project Standardd.Both b and c

PTS:1REF:109

24.GanttProject can open files created with ____.a.Apptivoc.Microsoft Word

b.HTMLd.Microsoft Project

PTS:1REF:109

25.The Apptivo ____ is free of charge with unlimited duration.a.Full Planc.Expanded Plan

b.Enhanced Pland.Standard Plan

PTS:1REF:111

26._____ is a full-featured program that holds the dominant share of the project management software market.a.Apptivoc.Microsoft Project

b.GanttProjectd.OpenProject

PTS:1REF:107

27.A _____ cannot be started until one or more other tasks are completed.a.dependent taskc.predecessor task

b.concurrent taskd.all of the above

PTS:1REF:99

28.A ____ is an event that could affect a project negatively.a.menacec.doubt

b.threatd.risk

PTS:1REF:111

29.A risk management plan includes a review of ____.a.employeesc.program code

b.project scoped.open source

PTS:1REF:111

30.Most risk identifications include a brief description of ____.a.the team member who might cause a risk to occur

b.who would be responsible for responding to a given risk

c.the project manager most vulnerable to a given risk

d.the team member most vulnerable to a given risk

PTS:1REF:111

31.A(n) ____ chart can be used to display the qualitative risk analysis matrix.a.piec.bar

b.XYd.line

PTS:1REF:112

32.A risk ____ plan is a proactive effort to anticipate a risk and describe an action plan to deal with it.a.identificationc.response

b.managementd.balancing

PTS:1REF:112

33.A continuous risk-tracking process can ____.a.identify new risks

b.prevent human resource turnover issues

c.increase employee satisfaction

d.encourage team building

PTS:1REF:112

34.Microsoft claims that Microsoft Project has the capability of ____.a.linking risks with specific vendors

b.assign ownership of risks

c.eliminating risk

d.preventing fraud

PTS:1REF:112

35.Microsofts risk management model includes ____.a.category, which specifies the risk type

b.probability, which indicates the degree of adverse effect should the risk occur, on a scale of 1 to 10

c.impact plan, which identifies plans to control or limit the risk

d.contingency, which identifies a condition that would initiate the contingency plan

PTS:1REF:112-113

36.When an information system does not meet business requirements, causes might include ____.a.identified requirementsc.imprecise targets

b.adequately defined scoped.sufficient testing

PTS:1REF:113

37.____ is a possible cause of cost overruns related to human resource issues.a.unrealistic estimatesc.inaccurate TCO forecast

b.poor monitoring of progressd.turnover

PTS:1REF:114

38.Problems with timetables and project milestones can indicate ____.a.recognition of task dependencies

b.continuity of project personnel

c.good control methods

d.personality conflicts among team members

PTS:1REF:114

39.When a project manager first recognizes that a project is in trouble, the options available to her include ____.a.expanding the project requirementsc.reducing the project resources

b.delaying the project deadlined.eliminating controls and procedures

PTS:1REF:114

40.A project triangle shows three legs: _____.a.project cost, scope, and time

b.project cost, size, and scope

c.project size, scope, and time

d.project size, cost, and time

PTS:1REF:90

MULTIPLE RESPONSE

Modified Multiple Choice

1.In the end, every successful information system must ____.a.support business requirementsc.be completed on time

b.stay within budgetd.not have any errors

2.Project managers typically perform the tasks of ____.a.project planningc.project scheduling

b.project reconciliationd.project monitoring

3.Which of the following is an example of an event?a.the start of user trainingc.project creep

b.conversion of system datad.completion of interviews

4.____ is a time estimate the project manager makes for a task.a.The weightc.The best-case estimate

b.The worst-case estimated.The probable-case estimate

5.Structured walk-throughs take place throughout the SDLC and are called ____ reviews, depending on the phase in which they occur.a.technicalc.design

b.coded.testing

MODIFIED TRUE/FALSE

1.A PERT/CPM chart does not show the project as a network diagram with tasks connectedby arrows.

2.Critical time is the amount of time that a task would be late without pushing back the completion date of the entire project. _________________________

3.Gantt charts often are included in progress reports to show project status graphically. _________________________

4.Quantitative risk analysis evaluates each risk by estimating the probability that it will occur and the degree of impact. _________________________

5.The purpose of quantitative risk analysis is to understand the actual impact in terms of dollars, time, project scope, or quality. _________________________

TRUE/FALSE

1.System developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur.

PTS:1REF:90

2.A project manager, or project leader, usually is a senior systems analyst or an IT department manager if the project is large.

PTS:1REF:91

3.Although a Gantt chart provides more detailed information about a project, a PERT/CPM chart offers a rapid overview that graphically displays the timing, duration, and progress of each task.

PTS:1REF:93

4.PERT/CPM and Gantt charts are mutually exclusive techniques.

PTS:1REF:94

5.Gantt charts are an ideal tool for controlling a complex project because they provide plenty of detailed information.

PTS:1REF:93

6.Using a WBS allows you to manage a project as one large task.

PTS:1REF:94

7.If it will take one person 20 days to perform a particular task, it is true that two people could complete the same task in 10 days or that 10 people could perform the task in two days.

PTS:1REF:95-96

8.In most systems analysis tasks, time and people are interchangeable.

PTS:1REF:96

9.If you do not have previous experience to measure a project in a given environment, you could design a prototype or pilot system to gain technical and cost estimating experience.

PTS:1REF:97

10.Using prior experience to make time and cost estimates works best for large projects.

PTS:1REF:97

11.In a PERT/CPM chart, each rectangular box, called a task box, has five sections that contain important information about a task.

PTS:1REF:98

12.In any project, large or small, tasks depend on each other and must be performed in a sequence.

PTS:1REF:99

13.When tasks must be completed one after another, they are called concurrent tasks.

PTS:1REF:99

14.When several tasks can take place at the same time, each is called a sequential task.

PTS:1REF:99

15.Often, two or more concurrent tasks depend on a single prior task, which is called a successor task.

PTS:1REF:99

16.When two or more concurrent tasks depend on a single prior task, each of the concurrent tasks is called a predecessor task.

PTS:1REF:99

17.Project management software can highlight the series of tasks that form the critical path.

PTS:1REF:102

18.If any task along the critical path falls behind schedule, the entire project is delayed.

PTS:1REF:102

19.Generally, systems analysts review the work of other systems analysts, and programmers review the work of other programmers, as a form of peer review, in structured walk-throughs.

PTS:1REF:103

20.Tasks that are not on the critical path cannot be ignored.

PTS:1REF:104

21.Project status meetings give project managers an opportunity to seek input and conduct brainstorming sessions.

PTS:1REF:104

22.Most managers recognize that problems do occur on most projects; it is better to alert management sooner rather than later.

PTS:1REF:105

23.In GanttProject, unlike in Microsoft Project, you create tasks and durations, indicate dependencies, and assign resources.

PTS:1REF:108

24.Project management is dynamic and challenging, regardless of which software you use..

PTS:1REF:111

25.If team members lack experience with certain aspects of the required technology, temporary help might be obtained from IT consultants or part-time staff.

PTS:1REF:115

COMPLETION

1.The ____________________ handles administrative responsibilities for a project development team and negotiates with users who might have conflicting requirements or want changes that would require additional time or expense.

2.To schedule a project, a project manager can use a(n) ____________________ like the one in the accompanying figure, which is a horizontal bar chart that represents a series of tasks.

3.To simplify a Gantt chart for a large project, a project manager can combine related activities into ____________________ that represent several activities.

4.In the project planning process, a(n) ____________________ is any work that has a beginning and an end and requires the use of company resources.

5.A(n) ____________________ is a recognizable reference point that can be used to monitor progress and manage a project.

6.Instead of training a project as one large task, you break the project down into a series of smaller tasks, called a(n) ____________________.

7.A(n) ____________________ represents the amount of work that one person can complete in one day.

8.When estimating the duration of a task, the project manager makes three time estimates for the task and then assigns a(n) ____________________, which is an importance value, to each estimate.

9.____________________ can involve dependent tasks, multiple successor tasks, and multiple predecessor tasks.

10.The ____________________ is the time that a task is scheduled to begin.

11.A project is based on a pattern of ____________________.

12.The ____________________ is the time that a task is scheduled to be completed.

13.A(n) ____________________ is a review of a project team members work by other members of the team.

14.____________________ is software that can assist in project planning, estimating, scheduling, monitoring, and reporting.

15.In Microsoft Project, a(n) ____________________ is similar to a PERT chart.

16.Projects with general scope definitions are risky, because they tend to expand gradually, without specific authorization, in a process called ____________________.

17.According to the concept called ____________________, adding manpower to a late software project only makes it later.

18.A(n) ____________________ is a series of tasks with no slack time.

19.Over time, the distinctions between the Program Evaluation Review Technique (PERT) and the Critical Path Method (CPM) have disappeared, and today the scheduling technique is called ____________________, as represented in the accompanying figure.

20.The PERT chart called a network diagram in the accompanying figure represents a bottom-up technique, because it analyzes a large, complex project as a series of individual ____________________.

MATCHING

Identify the letter of the choice that best matches the phrase or definition.a.project managementf.weight

b.project coordinatorg.bottom-up technique

c.project leaderh.dependent

d.milestonei.concurrent

e.constraintj.predecessor

1.Usually a senior systems analyst or an IT department manager, if the project is large.

2.A condition, restriction, or requirement that the system must satisfy.

3.The process of planning, scheduling, monitoring, and reporting on the development of an information system.

4.Handles the administrative responsibilities for the development team.

5.An importance value assigned to an estimate.

6.PERT/CPM is an example.

7.The kind of tasks that must be completed one after another.

8.A recognizable reference point that can be used to monitor progress and manage the project.

9.Tasks that can start at the same time are this kind of task.

10.Tasks that must be completed before another task can start.

ESSAY

1.Project managers typically perform four main tasks. Identify these and explain what they are.

2.As you enter the start and finish times for tasks in the process of transforming a task list into a PERT/CPM chart, you move through the tasks, adding the task duration for each task to its start time to determine its finish time. As you move through the tasks, there are three important rules to keep in mind. What are they?

3.What would a basic list of risk management steps include?

CASE

Critical Thinking QuestionsCase 3-1

Mauricio needs to develop a project plan for a new software release that he and his team will develop. He turns to you for assistance in developing the plan.

1.You begin by reviewing some of the key points of project planning. Which of the following is NOT a true statement about the process of developing a project plan?a.You should break the project down into a series of smaller tasks, called a work breakdown structure.

b.Projects with general scope definitions tend to expand gradually in a process called project creep.

c.A project that is twice as large as another project will typically be twice as complex.

d.Adding manpower to a late software project only makes it later.

2.You show Mauricio the formula that project managers often use for estimating the duration of a task. Which of the following is NOT one of factors in that formula?a.the best-case estimate

b.the initial-case estimate

c.the worst-case estimate

d.the probable-case estimate

Critical Thinking QuestionsCase 3-2

Alicia needs to develop a schedule for a project that her team of software engineers is about to begin. You suggest that she consider one of the graphical planning aids that can help a project manager in the scheduling process, and you give her a description of two of those tools.

3.Which of the following is NOT a true statement about Gantt charts?a.It is a horizontal bar chart that represents a series of tasks.

b.The position of a bar shows the planned start and end of the task, and the length of the bar indicates its duration.

c.They can show task status in several ways, including the use of a vertical line to represent the current date.

d.They provide the detailed information that is necessary when managing a complex project.

4.In discussing PERT/CPM charts, you discuss the types of task patterns that can occur in a project schedule. You give an example of two tasks, A and B, that can both begin as soon as task C is finished. Which of the following is NOT a true statement about tasks A and B?a.They are predecessor tasks of each other.

b.They are concurrent tasks.

c.They each depend on task C.

d.They are multiple successor tasks of task C.

Chapter 4 Requirements Modeling

MULTIPLE CHOICE

1.The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.a.systems planningc.systems design

b.systems analysisd.systems implementation

PTS:1REF:132

2.One of the main activities in the systems analysis phase is ____ modeling, which involves fact-finding to describe the current system and identification requirements for the new system.a.objectivec.goal-based

b.requirementsd.user-based

PTS:1REF:132

3.____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.a.Analytical skillsc.Interpersonal skills

b.Artistic skillsd.Confrontational skills

PTS:1REF:133

4.Greater user involvement in the system development process usually results in ____.a.poorer communicationc.slower development times

b.more satisfied usersd.lower quality deliverable

PTS:1REF:133

5.____ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.a.Analytical skillsc.Interpersonal skills

b.Artistic skillsd.Confrontational skills

PTS:1REF:133

6.RAD relies heavily on ____.a.prototypingc.agile methods

b.management directiond.Scrum

PTS:1REF:136

7.The primary advantage of RAD is that ____.a.systems can be developed more quickly with significant cost savings

b.the companys strategic business needs are emphasized and the mechanics of the system are not stressed

c.the decelerated time cycle allows more time to develop quality, consistency, and design standards

d.systems are developed more slowly with fewer bugs

PTS:1REF:137

8.In a(n) ____, team members prepare to lunge at each other to achieve their objectives.a.dodgec.scrum

b.resequencingd.adaptation

PTS:1REF:138

9.Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.a.UMLc.FDD

b.TCOd.REJ

PTS:1REF:140

10.A(n) ____ is a top-down representation of a function or a process.a.UMLc.FDD

b.TCOd.REJ

PTS:1REF:140

11.The ____ is a widely used method of visualizing and documenting software systems design.a.UMLc.FDD

b.TCOd.REJ

PTS:1REF:141

12.A ____ is a UML technique that visually represents the interaction between users and an information system.a.TCOc.use case diagram

b.data schematicd.user-based flowchart

PTS:1REF:141

13.In a use case diagram, the user becomes a(n) ____, with a specific role that describes how he or she interacts with a system.a.agentc.interlocutor

b.actord.master

PTS:1REF:141

14.A(n) ____ diagram shows the timing of interactions between objects as they occur.a.timingc.orientation

b.orderingd.sequence

PTS:1REF:142

15.Which of the following is a general category of system requirements?a.daily reportsc.response time

b.inputsd.login security

PTS:1REF:143

16.____ is a typical example of a system requirement for the output category.a.Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs

b.The contact management system must generate a daily reminder list for all sales reps

c.The student records system must allow record access by either the student name or the student number

d.The system must support 25 users simultaneously

PTS:1REF:143

17.____ is a typical example of a system requirement for the input category.a.As a final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits

b.Response time must not exceed four seconds

c.The system must provide log-on security at the operating system level and at the application level

d.Student grades must be entered on machine-scannable forms prepared by the instructor

PTS:1REF:144

18.____ is a typical example of a system requirement for the process category.a.The Web site must report online volume statistics every four hours and hourly during peak periods

b.The system must be operated seven days a week, 365 days a year

c.The equipment rental system must not execute new rental transactions for customers who have overdue tapes

d.All transactions must have audit trails

PTS:1REF:144

19.____ is a typical example of a system requirement for the performance category.a.The purchasing system must provide suppliers with up-to-date specifications

b.Each input form must include date, time, product code, customer number, and quantity

c.The manager of the sales department must approve orders that exceed a customers credit limit

d.The student records system must produce class lists within five hours after the end of registration

PTS:1REF:144

20.____ is a typical example of a system requirement for the control category.a.The customer analysis system must produce a quarterly report that identifies changes in ordering patterns

b.The system must maintain separate levels of security for users and the system administrator

c.The data entry screens must be uniform, except for background color, which can be changed by the user

d.The warehouse distribution system must analyze daily orders and create a routing pattern for delivery trucks

PTS:1REF:144

21.To evaluate ____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.a.scalabilityc.compatibility

b.reliabilityd.applicability

PTS:1REF:145

22.The term ____ refers to a systems ability to handle increased business volume and transactions in the future.a.scalabilityc.compatibility

b.reliabilityd.applicability

PTS:1REF:145

23.In addition to direct costs, systems developers must identify and document indirect expenses that contribute to the ____.a.TCOc.FDD

b.REJd.UML

PTS:1REF:145

24.Microsoft has developed a method for measuring a systems total costs and benefits, called ____, which is a framework to help IT professionals analyze and optimize IT investments.a.TCOc.FDD

b.REJd.UML

PTS:1REF:146

25.In a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.a.spontaneousc.informal

b.unstructuredd.open-ended

PTS:1REF:149

26.In an interview, ____ encourage spontaneous and unstructured responses.a.open-ended questionsc.leading questions

b.closed-ended questionsd.range-of-response questions

PTS:1REF:150

27.In an interview, ____ limit or restrict the response.a.open-ended questionsc.leading questions

b.closed-ended questionsd.range-of-response questions

PTS:1REF:150

28.In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.a.open-ended questionsc.leading questions

b.closed-ended questionsd.range-of-response questions

PTS:1REF:150

29.Supporters of neutral locations for interviews believe that it ____.a.makes the interviewee feel comfortable during the meeting

b.gives the interviewee easy access to supporting material that might be needed

c.keeps interruptions to a minimum so people can concentrate fully

d.gives the interviewee opportunity to take calls during the interview

PTS:1REF:151

30.If an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should do which of the following ____.a.switch to closed-ended questions

b.give the interviewee easy access to supporting material that might be needed

c.continue using open-ended questions

d.rudely conclude the meeting

PTS:1REF:153

31.When studying an information system, examples of actual documents should be collected using a process called ____.a.stratificationc.indexing

b.randomizationd.sampling

PTS:1REF:158

32.When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select every tenth customer for review.a.systematic samplec.random sample

b.stratified sampled.comprehensive sample

PTS:1REF:158

33.When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.a.systematic samplec.random sample

b.stratified sampled.comprehensive sample

PTS:1REF:158

34.When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.a.systematic samplec.random sample

b.stratified sampled.comprehensive sample

PTS:1REF:158

35.A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____.a.flowchartc.agile method

b.histogramd.Venn diagram

PTS:1REF:161

36.Some ____, such as Microsoft Outlook, include a personal calendar, a to-do list, and powerful contact management features.a.PIMsc.PDAs

b.laptopsd.Visios

PTS:1REF:163

37.A category of information management software or programs designed for the large amount of information generated by an IT project is called _____.a.PIMc.PDA

b.Project data managementd.Personal data management

PTS:1REF:162

38.Software such as Microsoft OneNote is a type of ____ software.a.PIMc.Project data management

b.Personal data managementd.PDA

PTS:1REF:163

39.In projects where it is desirable to obtain input from a large number of people, a(n) ____, such as that shown in the accompanying figure, can be a valuable tool.a.interviewc.sample

b.questionnaired.research report

PTS:1REF:156

40.The kind of document shown in the accompanying figure starts with a heading, which should include all except which of the following ____.a.a brief statement of purpose

b.your suggestions

c.your signature

d.your observations

PTS:1REF:157

MULTIPLE RESPONSE

Modified Multiple Choice

1.Compared with traditional methods, when properly used, JAD can result in ____.a.less expense and greater manageability if the group is too large

b.more accurate statement of system requirements

c.better understanding of common goals

d.stronger commitment to the success of the new system

2.When preparing a checklist of specific tasks to observe and questions to ask, a systems analyst should consider ____.a.asking sufficient questions to ensure a complete understanding of the present system operation

b.observing all steps in a transaction and noting the documents, inputs, outputs, and processes involved

c.talking to the people who receive current reports to see whether the reports are complete, timely, accurate, and in a useful form

d.examining each form, record, and report

3.When designing a questionnaire, all of the following are ideas to keep in mind: ____.a.providing clear instructions that will answer all anticipated questions

b.arranging questions in a logical order

c.trying to lead the response or use questions that give clues to expected answers

d.phrasing all questions to avoid misunderstandings, and use simple terms and wording

4.When recording facts, a systems analyst should document the work by ____.a.recording information as soon as it is obtained

b.recording findings in such a way that they can be understood by someone else

c.organizing documentation so related material is located easily

d.using the most complex recording method possible

5.When recording and documenting information, Microsoft Word can create _____.a.reportsc.tables

b.summariesd.forms

MODIFIED TRUE/FALSE

1.JAD provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation. _________________________

2.An agile approach emphasizes continuous feedback, and each incremental step is affected by what was learned in the prior steps. _________________________

3.In a sequence diagram, vertical arrows represent messages from one object to another. _________________________

4.The personal interview usually is the least expensive fact-finding technique. _________________________

5.A graphic modeling program allows you to manage details of a complex project, create queries to retrieve specific information, and generate custom reports. _________________________

TRUE/FALSE

1.Each activity within the systems analysis phase has an end product and one or more milestones.

PTS:1REF:133

2.Because it is linked to a specific development methodology, systems developers use JAD whenever group input and interaction is not desired.

PTS:1REF:133

3.IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

PTS:1REF:134

4.Because of the limited range of input and interaction among participants, few companies believe that a JAD group produces the best definition of a new system.

PTS:1REF:134

5.Compared with traditional methods, the entire RAD process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.

PTS:1REF:137

6.The main objective of all RAD approaches is to extend development time and expense by excluding users from every phase of systems development.

PTS:1REF:137

7.Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.

PTS:1REF:141

8.System requirements serve as benchmarks to measure the overall acceptability of a finished system.

PTS:1REF:143

9.System requirements fall into five general categories: outputs, inputs, processes, performance, and controls.

PTS:1REF:143

10.In addition to helping to gather and analyze facts, many programs also perform fact-finding for systems analysts.

PTS:1REF:146

11.When fact-finding, asking what is being done is the same as asking what could or should be done.

PTS:1REF:147

12.Knowledge of a companys formal and informal structures helps a systems analyst determine the people to interview during the systems analysis phase.

PTS:1REF:149

13.In the early stages of systems analysis, interviews usually focus on specific topics, but as the fact-finding process continues, the interviews are more general.

PTS:1REF:149

14.Creating a standard list of interview questions helps a systems analyst to keep on track and avoid unnecessary tangents.

PTS:1REF:149

15.A list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting.

PTS:1REF:150

16.When conducting an interview, after asking a question, allow the person enough time to think about the question and arrive at an answer.

PTS:1REF:152

17.Although taking notes during an interview has both advantages and disadvantages, the accepted view is that note taking should be extensive.

PTS:1REF:152

18.System documentation always is up to date.

PTS:1REF:154

19.Personal observation allows a systems analyst to verify statements made in interviews and determine whether procedures really operate as they are described.

PTS:1REF:154

20.When designing a questionnaire, the most important rule of all is to make sure that questions collect the right data in a form that can be used to further fact-finding.

PTS:1REF:157

21.When designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.

PTS:1REF:157

22.Before publishing a form on the Internet or a company intranet, a systems analyst should protect it so users can change the layout or design but cannot fill it in.

PTS:1REF:157

23.The main objective of a sample is to ensure that it represents the overall population accurately.

PTS:1REF:158

24.A single site visit usually gives true pictures, so it is unnecessary to visit more than one installation.

PTS:1REF:159

25.The ability to manage information is the mark of a successful systems analyst and an important skill for all IT professionals.

PTS:1REF:160

COMPLETION

1.The deliverable, or end product, of the systems analysis phase is a(n) ____________________, which is an overall design for the new system.

2.A common technique that allows users to participate in various development tasks is called ____________________, which is a user-oriented technique for fact-finding and requirements modeling.

3.In addition to joint application development, another popular user-oriented method is ____________________, which resembles a condensed version of the entire SDLC with users involved every step of the way.

4.In the RAD model in the accompanying figure, during the ____________________ phase users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs.

5.In the RAD model in the accompanying figure, the ____________________ phase focuses on program and application development tasks similar to the SDLC.

6.In the RAD model in the accompanying figure, the ____________________ phase resembles the final tasks in the SDLC implementation phase.

7.A(n) ____________________ is a characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users.

8.The ____________________ is a model that asks the traditional fact-finding questions in a systems development context.

9.A(n) ____________________ is a planned meeting during which a systems analyst obtains information from another person.

10.When phrasing interview questions, a systems analyst should avoid ____________________ that suggest or favor a particular reply.

11.The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called ____________________.

12.____________________ is a fact-finding technique that can help a systems analyst understand how the current system is supposed to work.

13.The ____________________ of current operating procedures is a fact-finding technique that gives a systems analyst additional perspective and a better understanding of system procedures.

14.When observing people at work, a systems analyst should consider the ____________________, which suggests that worker productivity improves during observation.

15.A(n) ____________________ is a document containing a number of standard questions that can be sent to many individuals.

16.A questionnaire can be a traditional paper form, or a(n) ____________________ can be created and data collected on the Internet or a company intranet.

17.____________________ is an important fact-finding technique that can include the Internet, IT magazines, and books to obtain background information, technical material, and news about industry trends and developments.

18.Online forums and ____________________ are good resources for exchanging information with other professionals, seeking answers to questions, and monitoring discussions of interest.

19.Research can involve a visit to a physical location, called a(n) ____________________, where the objective is to observe a system in use at another location.

20.In the RAD model in the accompanying figure, the ____________________ phase combines elements of the systems planning and systems analysis phases of the SDLC.

MATCHING

Identify the letter of the choice that best matches the phrase or definition.a.TCOf.open-ended

b.clos