1 / 89

Systems Analysis and Design Fifth Edition

Systems Analysis and Design Fifth Edition. 1. The Software and Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of __________ is redefining the way that companies develop and deploy their information systems. hardware as a help

Télécharger la présentation

Systems Analysis and Design Fifth Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Systems Analysis and DesignFifth Edition

  2. 1. The Software and Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of __________ is redefining the way that companies develop and deploy their information systems. • hardware as a help • software as a service • processing as a product • storage as a solution

  3. 2. Outsourcing can refer to __________. • relatively minor programming tasks • the rental of software from a service provider • the handling of a company’s entire IT function • all of the above

  4. 3. When determining outsourcing fees, a __________ uses a set fee based on a specified level of service and user support. • fixed fee model • usage model • subscription fee model • transaction model

  5. 4. When determining outsourcing fees, a __________ has a variable fee based on the number of users or workstations that have access to the application. • fixed fee model • usage model • subscription fee model • transaction model

  6. 5. Typically, companies choose in-house software development for all of the following reasons except __________. • to minimize changes in business procedures and policies • to meet constraints of existing systems and existing technology • to develop internal resources and capabilities • to obtain input from other companies who have already implemented the software

  7. 6. Advantages of purchasing a software package over developing software in-house include all of the following except __________. • satisfaction of unique business requirements • lower costs and less time to implement • proven reliability and performance benchmarks • less technical development staff

  8. 7. Buyers can customize a software package by __________. • negotiating directly with the software vendor to make enhancements to meet the buyer’s needs by paying for the changes • purchasing a basic package that vendors will customize to suit the buyer’s needs • purchasing the software and making their own modifications, if this is permissible under the terms of the software license • all of the above

  9. 8. Some data files should be totally hidden from view, while others should have __________ so users can view, but not change, the data. • no-access properties • read-only properties • full-access properties • write-only properties

  10. 9. A __________ is a document that describes a company, lists the services or products needed, and specifies the features required. • request for quotation (RFQ) • net present value (NPV) • request for proposal (RFP) • return on investment (ROI)

  11. 10. When companies use a __________, they already know the specific products or services they want and need to obtain price quotations or bids from vendors. • request for quotation (RFQ) • net present value (NPV) • request for proposal (RFP) • return on investment (ROI)

  12. 11. A __________ measures the time a package takes to process a certain number of transactions. • newsgroup • parameter • benchmark • default

  13. 12. When planning a slide presentation to management at the end of the systems analysis phase, systems analysts should keep all of the following suggestions in mind except __________. • summarize the primary viable alternatives • ignore time for discussion and questions and answers • explain why the evaluation and selection team chose the recommended alternatives • obtain a final decision or agree on a timetable for the next step in the process

  14. 13. The physical design is developed during the __________ phase of the SDLC. • systems design • systems analysis • systems operation and support • systems planning

  15. 14. A __________ is a value that the user enters whenever a query is run, which provides flexibility, enables users to access information easily, and costs less. • newsgroup • parameter • benchmark • default

  16. 15. A __________ is a value that a system displays automatically. • newsgroup • parameter • benchmark • default

  17. 16. Guidelines to follow when determining data entry and storage considerations include all of the following except __________. • data should be verified when it is entered, to catch errors immediately • data should be verified when it is entered • data duplication should be encouraged • data should be entered into a system only once

  18. For the multiple choice questions 17 through 19 you must use the Picture above.

  19. 17. __________, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system. • Prototyping • Outsourcing • Coding • Benchmarking

  20. 18. Prototyping, like that illustrated in the accompanying figure, includes all of the following benefits except __________. • users and systems analysts can avoid misunderstandings • managers can evaluate a working model more effectively than a paper specification • system requirements, such as reliability and maintainability, can be rated adequately • systems analysts can develop testing and training procedures before the finished solution is available

  21. 19. Potential problems of prototyping, like that illustrated in the accompanying figure, include all of the following except __________. • the rapid pace of development can create quality problems • some system requirements, such as reliability and maintainability, cannot be tested adequately • prototypes become unwieldy and difficult to manage in very complex systems • prototyping increase the risk and potential financial exposure that occur when a finished system fails to support business needs

  22. 20. Sequence codes __________. • use blocks of numbers for different classifications • are numbers or letters assigned in a specific order • use alphabet letters to distinguish one item from another based on a category • combine data from different item attributes, or characteristics, to build the code

  23. 21. Significant digit codes __________. • are numbers or letters assigned in a specific order • indicate what action is to be taken with an associated item • use blocks of numbers for different classifications • distinguish items by using a series of subgroups of digits

  24. 22. Derivation codes __________. • use blocks of numbers for different classifications • combine data from different item attributes, or characteristics, to build the code • are numbers or letters assigned in a specific order • use alphabet letters to distinguish one item from another based on a category

  25. 23. Cipher codes __________. • use blocks of numbers for different classifications • distinguish items by using a series of subgroups of digits • use a keyword to encode a number • indicate what action is to be taken with an associated item

  26. 24. Self-checking codes __________. • use a check digit to verify the validity of a numeric code • combine data from different item attributes, or characteristics, to build the code • use blocks of numbers for different classifications • distinguish items by using a series of subgroups of digits

  27. 25. When developing a code, all of the following suggestions should be kept in mind except __________. • avoid confusing codes • keep codes concise • make codes unique • keep codes variable

  28. True/False 1. Mission-critical IT systems should be outsourced only if the result is a cost-effective, reliable, business solution that fits the company’s long-term business strategy. (6) 2. A major advantage of outsourcing is that it eliminates employee concerns about job security. (7) T F

  29. True/False 3. A software package that can be used by many different types of organizations is called a vertical application. (8) 4. A software package developed to handle information requirements for a specific type of business is called a horizontal application. (9) 5. By designing a system in-house, companies can develop and train an IT staff that understands the organization’s business functions and information support needs. (10) F F T

  30. True/False 6. Compared to software developed in-house, a software package almost always is more expensive, particularly in terms of initial investment. (11) 7. Companies that use commercial software packages always must increase the number of programmers and systems analysts on the IT staff. (12) F F

  31. True/False 8. Software vendors regularly upgrade software packages by adding improvements and enhancements to create a new version or release. (13) 9. Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals. (14) 10. The decision to develop software in-house will require less participation from the systems analyst than outsourcing or choosing a commercial package. (15) T F F

  32. True/False 11. The primary objective of an evaluation and selection team is to eliminate system alternatives that will not work, rank the system alternatives that will work, and present the viable alternatives to management for a final decision. )16) T 12. Return on investment (ROI) is a percentage rate that compares the total net benefits (the return) received from a project to the total costs (the investment) of the project. (17) 13. The net percent value (NPV) of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point at which they occur. (18) 14. A request for quotation (RFQ) is less specific than an RFP (request for proposal). (19) T T F

  33. True/False 15. A systems analyst must understand the logical design of a system before beginning the physical design of any one component. (29) 16. A system is reliable if it adequately handles errors, such as input errors, processing errors, hardware failures, or human mistakes. (30) 17. Automated methods of data entry should be avoided whenever possible. (34) T T F

  34. True/False 18. Although every project has budget and financial constraints, decisions that achieve short-term savings but might mean higher costs later should be avoided. (38) 19. Allowing users to experiment with a prototype and provide feedback on how well it meets their needs can increase development costs, but the expense will be offset by lower costs in subsequent SDLC phases. (39) 20.Category codes are alphabetic abbreviations. (44) T T F

  35. Systems Analysis and DesignFifth Edition Multiple Choice – Chapter 7

  36. 1. According to a usability expert at IBM, a computer user has the right to __________. • easy-to-use instructions for understanding and utilizing a system to achieve desired goals and recover from problem situations • be informed clearly about all systems requirements for successfully using software or hardware • communicate with the technology provider and receive a thoughtful and helpful response when raising concerns • all of the above

  37. 2. Initial screen designs can be presented to users in the form of a(n) __________, which is a sketch that shows the general screen layout and design. • storyboard • turn-around document • faxback • output control

  38. 3. Good user interface design is based partly on __________, which describes how people work, learn, and interact with computers. • aesthetics • interface technology • ergonomics • output security

  39. 4. Good interface design is based partly on __________, which focuses on how an interface can be made attractive and easy to use. • aesthetics • interface technology • ergonomics • output security

  40. 5. Good interface design is based partly on __________, which provides the operational structure required to carry out the design objectives. • aesthetics • interface technology • ergonomics • output security

  41. Figure Above used for Questions 6 thur 9!

  42. 6. In a data entry screen such as that shown in the accompanying figure, a(n) __________ is a control feature that initiates an action such as printing a form or requesting Help. • command button • option button • toggle button • radio button

  43. 7. In a data entry screen such as that shown in the accompanying figure, a(n) __________ is a control feature that is used to represent on or off status and switches to the other status when clicked. • command button • option button • toggle button • radio button

  44. 8. In a data entry screen such as that shown in the accompanying figure, a __________ is a control feature that displays the current selection and, when a user clicks the arrow, a roster of available choices. • text box • drop-down list box • check box • dialog box

  45. 9. In a data entry screen such as that shown in the accompanying figure, a __________ is a control feature that is used to select one or more choices from a group. • dialog box • list box • text box • check box

  46. 10. The concept that the quality of the output is only as good as the quality of the input, which sometimes is known as __________, is familiar to IT professionals, who recognize that the best time to avoid problems is when data is entered. • bad input, bad output (BIBO) • garbage in, garbage out (GIGO) • poor start, poor finish (PSPF)) • weak hand, weak hold (WHWH)

  47. 11. To design data entry screens that are easy to learn and use, employ all of the following guidelines except __________. • restrict user access to screen locations where data is entered • provide a descriptive caption for every field • require users to type leading zeroes for numeric fields • display a default value when a field value will be constant for successive records

  48. 12. An existence check is a data validation check that __________. • tests data items to verify that they fall between a specified minimum and maximum value • identifies values that are questionable, but not necessarily wrong • is performed on two or more fields to ensure that they are consistent or reasonable when considered together • is used for mandatory data items

  49. 13. A range check is a data validation check that __________. • tests data items to verify that they fall between a specified minimum and maximum value • identifies values that are questionable, but not necessarily wrong • is performed on two or more fields to ensure that they are consistent or reasonable when considered together • is used for mandatory data items

More Related