systems analysis and design fifth edition l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Systems Analysis and Design Fifth Edition PowerPoint Presentation
Download Presentation
Systems Analysis and Design Fifth Edition

Loading in 2 Seconds...

play fullscreen
1 / 89

Systems Analysis and Design Fifth Edition - PowerPoint PPT Presentation


  • 4212 Views
  • Uploaded on

Systems Analysis and Design Fifth Edition. 1. The Software and Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of __________ is redefining the way that companies develop and deploy their information systems. hardware as a help

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Systems Analysis and Design Fifth Edition


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide3

1. The Software and Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of __________ is redefining the way that companies develop and deploy their information systems.

  • hardware as a help
  • software as a service
  • processing as a product
  • storage as a solution
2 outsourcing can refer to
2. Outsourcing can refer to __________.
  • relatively minor programming tasks
  • the rental of software from a service provider
  • the handling of a company’s entire IT function
  • all of the above
slide5
3. When determining outsourcing fees, a __________ uses a set fee based on a specified level of service and user support.
  • fixed fee model
  • usage model
  • subscription fee model
  • transaction model
slide6

4. When determining outsourcing fees, a __________ has a variable fee based on the number of users or workstations that have access to the application.

  • fixed fee model
  • usage model
  • subscription fee model
  • transaction model
5 typically companies choose in house software development for all of the following reasons except
5. Typically, companies choose in-house software development for all of the following reasons except __________.
  • to minimize changes in business procedures and policies
  • to meet constraints of existing systems and existing technology
  • to develop internal resources and capabilities
  • to obtain input from other companies who have already implemented the software
slide8
6. Advantages of purchasing a software package over developing software in-house include all of the following except __________.
  • satisfaction of unique business requirements
  • lower costs and less time to implement
  • proven reliability and performance benchmarks
  • less technical development staff
7 buyers can customize a software package by
7. Buyers can customize a software package by __________.
  • negotiating directly with the software vendor to make enhancements to meet the buyer’s needs by paying for the changes
  • purchasing a basic package that vendors will customize to suit the buyer’s needs
  • purchasing the software and making their own modifications, if this is permissible under the terms of the software license
  • all of the above
slide10
8. Some data files should be totally hidden from view, while others should have __________ so users can view, but not change, the data.
  • no-access properties
  • read-only properties
  • full-access properties
  • write-only properties
slide11
9. A __________ is a document that describes a company, lists the services or products needed, and specifies the features required.
  • request for quotation (RFQ)
  • net present value (NPV)
  • request for proposal (RFP)
  • return on investment (ROI)
slide12

10. When companies use a __________, they already know the specific products or services they want and need to obtain price quotations or bids from vendors.

  • request for quotation (RFQ)
  • net present value (NPV)
  • request for proposal (RFP)
  • return on investment (ROI)
11 a measures the time a package takes to process a certain number of transactions
11. A __________ measures the time a package takes to process a certain number of transactions.
  • newsgroup
  • parameter
  • benchmark
  • default
slide14

12. When planning a slide presentation to management at the end of the systems analysis phase, systems analysts should keep all of the following suggestions in mind except __________.

  • summarize the primary viable alternatives
  • ignore time for discussion and questions and answers
  • explain why the evaluation and selection team chose the recommended alternatives
  • obtain a final decision or agree on a timetable for the next step in the process
13 the physical design is developed during the phase of the sdlc
13. The physical design is developed during the __________ phase of the SDLC.
  • systems design
  • systems analysis
  • systems operation and support
  • systems planning
slide16

14. A __________ is a value that the user enters whenever a query is run, which provides flexibility, enables users to access information easily, and costs less.

  • newsgroup
  • parameter
  • benchmark
  • default
15 a is a value that a system displays automatically
15. A __________ is a value that a system displays automatically.
  • newsgroup
  • parameter
  • benchmark
  • default
slide18
16. Guidelines to follow when determining data entry and storage considerations include all of the following except __________.
  • data should be verified when it is entered, to catch errors immediately
  • data should be verified when it is entered
  • data duplication should be encouraged
  • data should be entered into a system only once
slide20

17. __________, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.

  • Prototyping
  • Outsourcing
  • Coding
  • Benchmarking
slide21
18. Prototyping, like that illustrated in the accompanying figure, includes all of the following benefits except __________.
  • users and systems analysts can avoid misunderstandings
  • managers can evaluate a working model more effectively than a paper specification
  • system requirements, such as reliability and maintainability, can be rated adequately
  • systems analysts can develop testing and training procedures before the finished solution is available
slide22
19. Potential problems of prototyping, like that illustrated in the accompanying figure, include all of the following except __________.
  • the rapid pace of development can create quality problems
  • some system requirements, such as reliability and maintainability, cannot be tested adequately
  • prototypes become unwieldy and difficult to manage in very complex systems
  • prototyping increase the risk and potential financial exposure that occur when a finished system fails to support business needs
20 sequence codes
20. Sequence codes __________.
  • use blocks of numbers for different classifications
  • are numbers or letters assigned in a specific order
  • use alphabet letters to distinguish one item from another based on a category
  • combine data from different item attributes, or characteristics, to build the code
21 significant digit codes
21. Significant digit codes __________.
  • are numbers or letters assigned in a specific order
  • indicate what action is to be taken with an associated item
  • use blocks of numbers for different classifications
  • distinguish items by using a series of subgroups of digits
22 derivation codes
22. Derivation codes __________.
  • use blocks of numbers for different classifications
  • combine data from different item attributes, or characteristics, to build the code
  • are numbers or letters assigned in a specific order
  • use alphabet letters to distinguish one item from another based on a category
23 cipher codes
23. Cipher codes __________.
  • use blocks of numbers for different classifications
  • distinguish items by using a series of subgroups of digits
  • use a keyword to encode a number
  • indicate what action is to be taken with an associated item
24 self checking codes
24. Self-checking codes __________.
  • use a check digit to verify the validity of a numeric code
  • combine data from different item attributes, or characteristics, to build the code
  • use blocks of numbers for different classifications
  • distinguish items by using a series of subgroups of digits
25 when developing a code all of the following suggestions should be kept in mind except
25. When developing a code, all of the following suggestions should be kept in mind except __________.
  • avoid confusing codes
  • keep codes concise
  • make codes unique
  • keep codes variable
slide29

True/False

1. Mission-critical IT systems should be outsourced only

if the result is a cost-effective, reliable, business solution

that fits the company’s long-term business strategy. (6)

2. A major advantage of outsourcing is that it eliminates

employee concerns about job security. (7)

T

F

slide30

True/False

3. A software package that can be used by many

different types of organizations is called a vertical

application. (8)

4. A software package developed to handle information

requirements for a specific type of business is called a

horizontal application. (9)

5. By designing a system in-house, companies can

develop and train an IT staff that understands the

organization’s business functions and information

support needs. (10)

F

F

T

slide31

True/False

6. Compared to software developed in-house, a

software package almost always is more expensive,

particularly in terms of initial investment. (11)

7. Companies that use commercial software

packages always must increase the number of

programmers and systems analysts on the IT staff.

(12)

F

F

slide32

True/False

8. Software vendors regularly upgrade software

packages by adding improvements and enhancements

to create a new version or release. (13)

9. Empowerment makes an IT department less

productive because it must spend more time

responding to the daily concerns of users and less

time on high-impact systems development projects

that support strategic business goals. (14)

10. The decision to develop software in-house will

require less participation from the systems analyst

than outsourcing or choosing a commercial package.

(15)

T

F

F

slide33

True/False

11. The primary objective of an evaluation and

selection team is to eliminate system alternatives

that will not work, rank the system alternatives that

will work, and present the viable alternatives to

management for a final decision. )16)

T

12. Return on investment (ROI) is a percentage rate that

compares the total net benefits (the return) received

from a project to the total costs (the investment) of the

project. (17)

13. The net percent value (NPV) of a project is the

total value of the benefits minus the total value of the

costs, with both costs and benefits adjusted to reflect

the point at which they occur. (18)

14. A request for quotation (RFQ) is less specific than

an RFP (request for proposal). (19)

T

T

F

slide34

True/False

15. A systems analyst must understand the logical

design of a system before beginning the physical

design of any one component. (29)

16. A system is reliable if it adequately handles errors,

such as input errors, processing errors, hardware

failures, or human mistakes. (30)

17. Automated methods of data entry should be

avoided whenever possible. (34)

T

T

F

slide35

True/False

18. Although every project has budget and financial

constraints, decisions that achieve short-term savings

but might mean higher costs later should be avoided.

(38)

19. Allowing users to experiment with a prototype and

provide feedback on how well it meets their needs can

increase development costs, but the expense will be

offset by lower costs in subsequent SDLC phases. (39)

20.Category codes are alphabetic abbreviations. (44)

T

T

F

systems analysis and design fifth edition36
Systems Analysis and DesignFifth Edition

Multiple Choice – Chapter 7

1 according to a usability expert at ibm a computer user has the right to
1. According to a usability expert at IBM, a computer user has the right to __________.
  • easy-to-use instructions for understanding and utilizing a system to achieve desired goals and recover from problem situations
  • be informed clearly about all systems requirements for successfully using software or hardware
  • communicate with the technology provider and receive a thoughtful and helpful response when raising concerns
  • all of the above
slide38

2. Initial screen designs can be presented to users in the form of a(n) __________, which is a sketch that shows the general screen layout and design.

  • storyboard
  • turn-around document
  • faxback
  • output control
slide39
3. Good user interface design is based partly on __________, which describes how people work, learn, and interact with computers.
  • aesthetics
  • interface technology
  • ergonomics
  • output security
slide40
4. Good interface design is based partly on __________, which focuses on how an interface can be made attractive and easy to use.
  • aesthetics
  • interface technology
  • ergonomics
  • output security
slide41

5. Good interface design is based partly on __________, which provides the operational structure required to carry out the design objectives.

  • aesthetics
  • interface technology
  • ergonomics
  • output security
slide43

6. In a data entry screen such as that shown in the accompanying figure, a(n) __________ is a control feature that initiates an action such as printing a form or requesting Help.

  • command button
  • option button
  • toggle button
  • radio button
slide44

7. In a data entry screen such as that shown in the accompanying figure, a(n) __________ is a control feature that is used to represent on or off status and switches to the other status when clicked.

  • command button
  • option button
  • toggle button
  • radio button
slide45

8. In a data entry screen such as that shown in the accompanying figure, a __________ is a control feature that displays the current selection and, when a user clicks the arrow, a roster of available choices.

  • text box
  • drop-down list box
  • check box
  • dialog box
slide46

9. In a data entry screen such as that shown in the accompanying figure, a __________ is a control feature that is used to select one or more choices from a group.

  • dialog box
  • list box
  • text box
  • check box
slide47

10. The concept that the quality of the output is only as good as the quality of the input, which sometimes is known as __________, is familiar to IT professionals, who recognize that the best time to avoid problems is when data is entered.

  • bad input, bad output (BIBO)
  • garbage in, garbage out (GIGO)
  • poor start, poor finish (PSPF))
  • weak hand, weak hold (WHWH)
slide48
11. To design data entry screens that are easy to learn and use, employ all of the following guidelines except __________.
  • restrict user access to screen locations where data is entered
  • provide a descriptive caption for every field
  • require users to type leading zeroes for numeric fields
  • display a default value when a field value will be constant for successive records
12 an existence check is a data validation check that
12. An existence check is a data validation check that __________.
  • tests data items to verify that they fall between a specified minimum and maximum value
  • identifies values that are questionable, but not necessarily wrong
  • is performed on two or more fields to ensure that they are consistent or reasonable when considered together
  • is used for mandatory data items
13 a range check is a data validation check that
13. A range check is a data validation check that __________.
  • tests data items to verify that they fall between a specified minimum and maximum value
  • identifies values that are questionable, but not necessarily wrong
  • is performed on two or more fields to ensure that they are consistent or reasonable when considered together
  • is used for mandatory data items
14 a reasonableness check is a data validation check that
14. A reasonableness check is a data validation check that __________.
  • tests data items to verify that they fall between a specified minimum and maximum value
  • identifies values that are questionable, but not necessarily wrong
  • is performed on two or more fields to ensure that they are consistent or reasonable when considered together
  • is used for mandatory data items
15 a combination check is a data validation check that
15. A combination check is a data validation check that __________.
  • tests data items to verify that they fall between a specified minimum and maximum value
  • identifies values that are questionable, but not necessarily wrong
  • is performed on two or more fields to ensure that they are consistent or reasonable when considered together
  • is used for mandatory data items
slide53

16. On a source document, the __________ contains codes, identification information, numbers, and dates that are used for storing completed forms.

  • control zone
  • heading zone
  • totals zone
  • authorization zone
slide54

17. On a source document, the main part of the form, called the __________, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.

  • instruction zone
  • authorization zone
  • body zone
  • heading zone
slide55

18. Because users tend to skim a Web page, picking out individual words and sentences, Web designers must use __________ to capture and hold a user’s attention.

  • batch controls
  • scannable text
  • audit trails
  • hash totals
19 a n produces one or more lines of output for each record processed
19. A(n) __________ produces one or more lines of output for each record processed.
  • detail report
  • exception report
  • summary report
  • all of the above
20 a n displays only those records that meet a specific condition or conditions
20. A(n) __________ displays only those records that meet a specific condition or conditions.
  • detail report
  • exception report
  • summary report
  • all of the above
slide58
21. For upper-level managers who often want to see total figures and do not need supporting details, a(n) __________ is appropriate.
  • detail report
  • exception report
  • summary report
  • all of the above
slide59
22. When designing a report, a sample report, which is a __________, or prototype, should be prepared for users to review.
  • storyboard
  • dialog box
  • form layout
  • mock-up
slide60

23. After a report design is approved, the design should be documented in a __________, which contains information about the fields, data types and lengths, report frequency and distribution, and other comments.

  • printer spacing chart
  • data validation check
  • source document
  • report analysis form
slide61
24. The speed of laser printers is rated in __________, which can be used to estimate the time required to print a report.
  • cps (characters per second)
  • lpm (lines per minute)
  • ppm (pages per minute)
  • rph (reports per hour)
slide62
25. __________ protects privacy rights and shields an organization’s proprietary data from theft or unauthorized access.
  • Aesthetics
  • Interface technology
  • Ergonomics
  • Output security
systems analysis and design fifth edition63
Systems Analysis and DesignFifth Edition

Multiple Choice – Chapter 8

slide64

1. __________ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

  • Transparency
  • Scalability
  • Redundancy
  • Interoperability
2 every information system involves
2. Every information system involves __________.
  • data storage and access methods
  • application programs to handle the programming logic
  • an interface that allows users to interact with the system
  • all of the above
3 a system design where the server performs all the processing is described as
3. A system design where the server performs all the processing is described as __________.
  • mainframe architecture
  • thin architecture
  • workstation architecture
  • thick architecture
4 a server that supports a large number of clients at various locations is called a n
4. A server that supports a large number of clients at various locations is called a(n) __________.
  • closed system
  • distributed system
  • open system
  • centralized system
5 file sharing designs are efficient only if the number of networked users is
5. File sharing designs are efficient only if the number of networked users is __________
  • low and the transmitted file sizes are relatively small
  • high but the transmitted file sizes are relatively small
  • low but the transmitted file sizes are relatively large
  • high and the transmitted file sizes are relatively large
6 in a client server design a database server
6. In a client/server design, a database server __________.
  • processes individual SQL commands
  • exchanges object methods with clients
  • handles a set of SQL commands
  • sends and receives Internet-based communications
slide70

7. A fat client design is __________ to develop than a thin client design, because the architecture resembles traditional file server designs where all processing is performed at the client.

  • simpler but more expensive
  • more complex and more expensive
  • simpler and less expensive
  • more complex but less expensive
8 compared to file server designs client server systems response times
8. Compared to file server designs, client/server systems __________ response times.
  • increase network loads but improve response times
  • reduce network loads and improve response times
  • increase network loads and worsen response times
  • reduce network loads but worsen response times
slide72
9. Using a DDBMS (distributed database management system) offers all of the following advantages except __________.
  • the system is scalable, so new data sites can be added without reworking the system design
  • data stored closer to users can reduce network traffic
  • with data stored in various locations, the system is less likely to experience a catastrophic failure
  • the architecture of the system is simple and easy to manage
slide73

10. When developing e-business systems, an in-house solution usually requires a __________ for a company that must adapt quickly in a dynamic e-commerce environment.

  • smaller initial investment and provides more flexibility
  • smaller initial investment but provides less flexibility
  • greater initial investment but provides more flexibility
  • greater initial investments and provides less flexibility
11 online processing systems typically have all of the following characteristics except
11. Online processing systems typically have all of the following characteristics except __________.
  • users interact directly with the information system
  • the system requires significantly fewer network resources than batch systems
  • users can access data randomly
  • the system processes transactions completely when and where they occur
12 a batch processing system has all of the following characteristics except
12. A batch processing system has all of the following characteristics except __________.
  • transactions are collected, processed, and grouped periodically
  • the IT operations group can run batch programs on a predetermined schedule
  • the information system is available whenever necessary to support business operations
  • batch programs require significantly fewer network resources than online systems
13 in the osi open system interconnection model the application layer
13. In the OSI (open system interconnection) model, the application layer __________.
  • defines specific methods of transmitting data over the physical layer
  • provides network services requested by local workstation
  • defines control structures that manage the communications link between computers
  • contains physical components that carry data
14 in the osi open system interconnection model the presentation layer
14. In the OSI (open system interconnection) model, the presentation layer __________.
  • defines network addresses and determines how data is routed over the network
  • provides reliable data flow and error recovery
  • assures that data is uniformly structured and formatted for network transmission
  • contains physical components that carry data
15 in the osi open system interconnection model the session layer
15. In the OSI (open system interconnection) model, the session layer __________.
  • assures that data is uniformly structured and formatted for network transmission
  • defines network addresses and determines how data is routed over the network
  • defines specific methods of transmitting data over the physical layer
  • defines control structures that managed the communications link between computers
slide79

16. In a __________, one computer (typically a mainframe), controls the network, and satellite computers or servers control lower levels of processing and network devices.

  • hierarchical network
  • star network
  • bus network
  • ring network
slide81
17. A __________, such as that illustrated in the accompanying figure, has a central computer with network devices connected to it.
  • hierarchical network
  • star network
  • bus network
  • ring network
slide82

18. As shown in the accompanying figure, at the center of a star network, which is called the __________, a central computer manages the network.

  • log
  • scale
  • hub
  • portal
slide83
19. In a __________, a single communications path connects the mainframe computer, server, workstations, and peripheral devices.
  • hierarchical network
  • star network
  • bus network
  • ring network
20 a disadvantage of a bus network is that
20. A disadvantage of a bus network is that __________.
  • performance can decline as more users and devices are added
  • devices cannot be attached or detached without disturbing the rest of the network
  • failure in one workstation necessarily affects other workstations on the network
  • all of the above
21 a resembles a circle of computers that communicate with each other
21. A __________ resembles a circle of computers that communicate with each other.
  • hierarchical network
  • star network
  • bus network
  • ring network
slide86

22. Apart from backup and recovery procedures necessary to sustain business operations __________ laws and regulations apply to company data.

  • file retention
  • file backup
  • file server
  • file disposal
slide87

23. The __________ section in a typical system design specification contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.

  • System Components
  • Executive Summary
  • Implementation Requirements
  • Time and Cost Estimates
slide88

24. The __________ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

  • Time and Cost Estimates
  • System Environment
  • Executive Summary
  • System Components
slide89

25. In the __________ section in a typical system design specification, startup processing, initial data entry or acquisition, user training requirements, and software test plans are specified.

  • System Environment
  • Executive Summary
  • System Components
  • Implementation Requirements