Uncategorized

Pick a business task you would like to computerize. How could you use the steps of the information systems development cycle, that has been discussed throughout this course?

Pick a business task you would like to computerize. How could you use the steps of the information systems development cycle, that has been discussed throughout this course?

Newer Question 1. Question : (TCO 1) When developing information systems, an organization could use: Student Answer: an information technology services firm. open-source software. cloud computing. in-house development. all of the above. Question 2. Question : (TCO 1) The practice of turning over responsibility of some or all of an organization’s information systems applications and operations to an outside firm is referred to as: Student Answer: realignment. downsizing. outsourcing. time sharing. system reassignment and deployment. Instructor Explanation: Ref: chapter 2 page 28 Points Received: 5 of 5 Comments: Question 3. Question : (TCO 2) Identifying, assessing, and managing the risks and day-to-day changes that occur during a project best defines which of the following project manager activities? Student Answer: Conflict management Risk and change management Team management Customer relations Technical problem solving Instructor Explanation: Ref: Chapter 3 page 49 Points Received: 5 of 5 Comments: Question 4. Question : (TCO 2) Which of the following is NOT a project management phase? Student Answer: Closing down the project Planning the project Executing the project Initiating a project Implementing the project Instructor Explanation: Ref: Chapter 3 page 48 Points Received: 5 of 5 Comments: Question 5. Question : (TCO 2) Which of the following would be classified as an intangible cost? Student Answer: Hardware costs Labor costs Employee morale Operational costs Internet service setup fee Instructor Explanation: Ref: Chapter 4 page 93 Points Received: 5 of 5 Comments: Question 6. Question : (TCO 2) The primary deliverable from the project identification and selection phase is: Student Answer: a context data flow diagram. at least three substantively different system design strategies for building the replacement information system. the development of a new version of the software and new versions of all design documents. an entity relationship diagram. a schedule of specific IS development projects. Instructor Explanation: Ref: Chapter 4 page 87 Points Received: 5 of 5 Comments: Question 7. Question : (TCO 3) The term that refers to systems development projects bogged down in an abundance of analysis work is: Student Answer: information overload. analysis paralysis. analysis overload. information abundance. disruptive analysis. Instructor Explanation: Ref: Chapter 5 page 126 Points Received: 5 of 5 Comments: Question 8. Question : (TCO 3) Good interview guidelines consist of: Student Answer: phrasing the question to illicit the correct response. typing your notes within two weeks of the interview. establishing expectation levels about the new system. seeking a variety of perspectives from the interviews. using as much time as you need. Instructor Explanation: Ref: Chapter 5 page 130 Points Received: 5 of 5 Comments: Question 9. Question : (TCO 3) The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services best defines: Student Answer: joint application design. rapid application development. structured programming. business process reengineering. disruptive design. Instructor Explanation: Ref: Chapter 5 page 141 Points Received: 5 of 5 Comments: Question 10. Question : (TCO 3) The purpose of requirements structuring is to: Student Answer: enable the analysts to gather information on what the system should do from as many sources as possible. enable the analysts to develop a baseline project plan quickly. enable the large amount of information gathered during requirements determination to be organized. enable the analysts to identify several feasible alternatives. Instructor Explanation: Ref: Chapter 5 page 126 Points Received: 5 of 5 Comments: Question 11. Question : (TCO 4) The diagram that shows the scope of the system, indicating what elements are inside and outside the system, is called a: Student Answer: context diagram. level-2 diagram. referencing diagram. representative diagram. decomposition diagram. Instructor Explanation: Ref: Chapter 6 page 158 Points Received: 5 of 5 Comments: Question 12. Question : (TCO 5) The number of instances of entity B that can (or must) be associated with each instance of entity A refers to: Student Answer: cardinality. domain. ternary occurrence. participation level. join level. Instructor Explanation: Chapter 7 page 203 Points Received: 5 of 5 Comments: Question 13. Question : (TCO 6) Shaping alternative system design strategies involves: Student Answer: enumerating different potential implementation environments. proposing different ways to source or acquire the various sets of capabilities for the different implementation environments. dividing requirements into different sets of capabilities. all of the above. none of the above. Instructor Explanation: Ref: Chapter 7 page 213 Points Received: 5 of 5 Comments: Question 14. Question : (TCO 7) Which of the following are general guidelines for displaying tables and lists? Student Answer: All columns and rows should have meaningful labels. Place a blank line between every five rows in long columns. Use the same family of typefaces within and across displays and reports. Allow white space on printed reports for the user to write notes. All of the above are guidelines for displaying tables and lists. Instructor Explanation: Ref: Chapter 8 page 244 Points Received: 5 of 5 Comments: Question 15. Question : (TCO 7) Which of the following is a guideline for displaying text? Student Answer: Use double spacing if space permits. Do not hyphenate words between lines. Left-justify text and leave a ragged right margin. Display text in mixed upper and lowercase and use conventional punctuation. All of the above are guidelines for displaying text. Instructor Explanation: Ref: Chapter 8 page 242 Points Received: 5 of 5 Comments: Question 16. Question : (TCO 7) Reversing the sequence of one or more characters in a field is called: transposing. transcripting. appending. truncating. hashing. Instructor Explanation: Ref: Chapter 8 page 252 Points Received: 5 of 5 Comments: Question 17. Question : (TCO 8) A notation that allows the modeler to specify, visualize, and construct the artifacts of software systems, as well as business models, best defines: Student Answer: Unified Modeling Language. Structured English. pseudocode. logic modeling. structured design. Instructor Explanation: Ref: Appendix A page 362 Points Received: 5 of 5 Comments: Question 18. Question : (TCO 8) Benefits of the object-oriented modeling approach include: Student Answer: the ability to tackle more challenging problem domains. improved communication among users, analysts, designers, and programmers. reusability of analysis, design, and programming results. increased consistency among the models developed during object-oriented analysis, design, and programming. all of the above. Instructor Explanation: Ref: Appendix A page 361 Points Received: 5 of 5 Comments: Question 19. Question : (TCO 9) System documentation that is part of the program source code or is generated at compile time best defines: Student Answer: system documentation. user documentation. internal documentation. external documentation. embedded documentation. Instructor Explanation: Ref: Chapter 10 page 333 Points Received: 5 of 5 Comments: Question 20. Question : (TCO 9) User testing of a completed information system using simulated data refers to: Student Answer: acceptance testing. alpha testing. beta testing. system testing. stub testing. Instructor Explanation: Ref: Chapter 10 page 329 Points Received: 5 of 5 Comments: Question 1. Question : (TCO 1) Describe the role of a systems analyst. Question 2. Question : (TCO 2) Discuss the six major categories of feasibility. Question 3. Question : (TCO 3) Identify and describe the traditional methods for determining requirements. Question 4. Question : (TCO 4) What is gap analysis? Why is gap analysis useful? Question 5. Question : (TCO 5) Contrast data modeling to process modeling and logic modeling. Question 6. Question : (TCO 6) Suppose that an analysis team did not generate alternative design strategies for consideration by a project steering committee or client. What might the consequences be of having only one design strategy? What might happen during the oral presentation of project progress if only one design strategy is offered? Question 7. Question : (TCO 7) Describe the three-step process for designing dialogues. Question 8. Question : (TCO 8) What is meant by Agile Methodologies? Identify the three key principles that the Agile Methodologies share. Question 9. Question : (TCO 9) Describe four types of installation. Question 10. Question : (TCO 9) Describe four types of maintenance.
Back to list
Older 1. Which of the following is generally viewed as the first Internet worm to have caused significant damage and to have “brought the Internet down”? A. Melissa B. The “Love Bug” C. The Morris worm D. Code Red 2. Which of the following individuals was convicted of various computer crimes and was known for his ability to conduct successful social engineering attacks? A. Kevin Mitnick B. Vladimir Levin C. Timothy Lloyd D. David Smith 3. Which virus/worm was credited with reaching global proportions in less than ten minutes? A. Code Red B. The Morris worm C. Melissa D. Slammer 4. An attacker who feels that using animals to make fur coats is unethical and thus defaces the web site of a company that sells fur coats is an example of: A. Information warfare B. Hacktivisim C. Cyber crusading D. Elite hacking 5. What is the most common form of authentication used? A. Smart card B. Tokens C. Username/password D. Retinal scan 6. The Components of CIA triangle are A. Corporate secrecy, Integrity, and Availability B. Confidentiality, Integrity, and Access C. Confidentiality, Integrity, and Availability D. Confidentiality, Information Security, and Availability 7. Which of the following concepts requires users and system processes to use the minimal amount of permission necessary to function? A. Layer defense B. Diversified defense C. Simple Security Rule D. Least privilege 8. The Bell-LaPadula security model is an example of a security model that is based on: A. The integrity of the data B. The availability of the data C. The confidentiality of the data D. The authenticity of the data 9. The term used to describe the requirement that different portions of a critical process must be performed by different people is: A. Least privilege B. Defense in depth C. Separation of duties D. Job rotation 10. Hiding information to prevent disclosure is an example of: A. Security through obscurity B. Certificate-based security C. Discretionary data security D. D. Defense in depth 11. The concept of blocking an action unless it is specifically authorized is: A. Implicit deny B. Least privilege C. Simple Security Rule D. D. Hierarchical defense model 12. Which of the following correctly defines qualitative risk management? A. The process of objectively determining the impact of an event that affects a project,program, or business. B. The process of subjectively determining the impact of an event that affects a project,program, or business. C. The loss that results when a vulnerability is exploited by a threat. D. To reduce the likelihood of a threat occurring. 13. Which of the following correctly defines risk? A. The risks still remaining after an iteration of risk management. B. The loss that results when a vulnerability is exploited by a threat. C. Any circumstance or event with the potential to cause harm to an asset. D. The possibility of suffering harm or loss. 14. Single loss expectancy (SLE) can best be defined by which of the following equations? A. SLE = annualized loss expectancy * annualized rate of occurrence B. SLE = asset value * exposure factor C. SLE = asset value * annualized rate of occurrence D. SLE = annualized loss expectancy * exposure factor 15. Which of the following correctly defines a Gantt chart? A. A method of identifying items that are related and then identifying the principle that ties them together into a group B. A management tool for diagramming schedules, events, and activity duration C. A single-page form used to document new risks as they occur D. A diagram depicting interdependencies between project activities, showing the sequence and duration of each activity 16. Which of the following correctly defines residual risk? A. The risks still remaining after an iteration of risk management B. The possibility of suffering a loss C. The result of a vulnerability being exploited by a threat that results in a loss D. D. Characteristics of an asset that can be exploited by a threat to cause harm 17. Which of the following statements about risk is true? A. A manager can accept the risk, which will reduce the risk. B. The risk itself doesn’t really change. However, actions can be taken to reduce the impact of the risk. C. A manager can transfer the risk, which will reduce the risk. D. A manager can take steps to increase the risk.