You are on page 1of 23

Chapter 10: Information Systems Analysis and Design

TRUE/FALSE 1. Most information systems rely on computers and communications networks to store, process, and transmit information with far more efficiency than would be possible with manual systems. ANS: T PTS: 1 REF: 556

2. An information system must support the needs of people who engage in many different organizational activities. ANS: T PTS: 1 REF: 557

3. A semi-structured problem is more routine than a structured problem. ANS: F PTS: 1 REF: 558

4. A small business might require several information systems be integrated into an enterprise information system to support a variety of business activities. ANS: F PTS: 1 REF: 559

5. A batch system uses a commit or rollback strategy to ensure each transaction is processed correctly. ANS: F PTS: 1 REF: 560

6. A DSS can be used to tackle diverse problems because it contains a good selection of decision support tools. ANS: T PTS: 1 REF: 563

7. As illustrated in the accompanying figure, a neural network is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for the knowledge base. ANS: F PTS: 1 REF: 565 1|P a ge

8. The accompanying figure represents the basic flow of information in an expert system and summarizes its capabilities. ANS: T PTS: 1 REF: 564|565

9. A modified waterfall SDLC does not allow for overlap between SDLC phases. ANS: F PTS: 1 REF: 566

10. In the SDLC, the goal of the activities in the planning phase is to create a list of requirements for the new or revised information system. ANS: F PTS: 1 REF: 567

11. MRP is an ongoing iterative process that helps businesses rethink and radically redesign practices to improve performance. ANS: F PTS: 1 REF: 569

12. In the accompanying figure, the Enroll student item represents an external entity. ANS: F PTS: 1 REF: 572

13. In the accompanying figure, the Student item represents a data store. ANS: F PTS: 1 REF: 572

14. Many projects fail because of constant, unmanaged demand for changes, a phenomenon often referred to as feature creep. ANS: T PTS: 1 REF: 582

15. During the implementation phase of the SDLC, both new software and new hardware may be purchased to construct the new information system. ANS: T PTS: 1 REF: 583

16. After unit and integration testing are completed, system testing is used to ensure that all hardware and software components work together correctly. ANS: T PTS: 1 REF: 584

17. Direct conversion avoids some of the risk of parallel conversion because the old system remains in service while some or all of the new system is activated. ANS: F PTS: 1 REF: 586 2|P a ge

18. Acceptance testing is designed to verify that the new information system works as required. ANS: T PTS: 1 REF: 586

19. The cutover phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance, and correcting problems. ANS: F PTS: 1 REF: 587

20. The maintenance phase of the SDLC is the least expensive part of the cycle. ANS: F PTS: 1 REF: 588

MODIFIED TRUE/FALSE 1. Nonprofit organizations are formed to accomplish social, political, or charitable goals that do not include amassing profit. _________________________ ANS: T PTS: 1 REF: 556

2. Tactical planning emphasizes long-range and future goals. _________________________ ANS: F, Strategic PTS: 1 REF: 557

3. Despite new tools and the data they provide, many semi-structured and structured problems continue to be resolved based on "guesstimates." _________________________ ANS: F unstructured semi-structured PTS: 1 REF: 559

4. Some information systems store or provide access to internal information generated by sources outside the organization. _________________________ ANS: F, external PTS: 1 REF: 559

5. Most modern transaction processing systems use batch processing, which is an interactive method in which each transaction is processed as it is entered. _________________________ ANS: F online OLTP online transaction PTS: 1 REF: 560

3|P a ge

6. OLTP uses a commit or rollback strategy to ensure that each transaction is processed correctly. _________________________ ANS: T PTS: 1 REF: 560

7. Data collected by a transaction processing system (TPS) can be used by a(n) DSS (Decision Support System) to create reports that managers can use to make routine business decisions in response to structured problems. _________________________ ANS: F MIS management information system management information system (MIS) MIS (management information system) PTS: 1 REF: 561

8. In a system like the one shown in the accompanying figure, a technique called Boolean logic can be used to deal with imprecise data by asking for a level of confidence. _________________________ ANS: F, fuzzy PTS: 1 REF: 564

9. A system like the one shown in the accompanying figure, is a computer system designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules. _________________________ ANS: T PTS: 1 REF: 564

10. A(n) iterative waterfall SDLC allows overlap between the phases. _________________________ ANS: F, modified waterfall PTS: 1 REF: 566

4|P a ge

11. Planning management software helps managers track and visualize the complex interactions between tasks. _________________________ ANS: F, Project PTS: 1 REF: 571

12. In the accompanying figure, the third item in the series is an example of a process. _________________________ ANS: F, second PTS: 1 REF: 572

13. In the accompanying figure, the arrow symbolizes a data flow. _________________________ ANS: T PTS: 1 REF: 572

14. In the design phase of the SDLC, the project team must figure out why the new system will fulfill the requirements specified in the System Requirements Report. _________________________ ANS: F, how PTS: 1 REF: 576

5|P a ge

15. The excerpt from an application specification shown in the accompanying figure describes in detail how the information systems software should process a particular task involving inventory data. _________________________ ANS: T MULTIPLE CHOICE 1. A(n) ____ is a group of people working together to accomplish a goal. a. business c. organization b. mission d. aggregate ANS: C PTS: 1 REF: 556 PTS: 1 REF: 581

2. Every organization has a goal or plan that is often referred to as its ____. a. Web site c. master directive b. mission d. organizing principle ANS: B PTS: 1 REF: 556

3. A(n) ____ depicts the hierarchy of employees in a typical organization. a. mission statement c. roster b. strategy table d. organizational chart ANS: D PTS: 1 REF: 557

4. ____ are the people who directly carry out the organization's mission by, for example, assembling products, selling merchandise, or answering phones. a. Managers c. Workers b. CEOs d. Associates ANS: C PTS: 1 REF: 557

5. The purpose of ____ planning is to set incremental goals that can be achieved in a year or less. a. tactical c. operational b. strategic d. futuristic ANS: A PTS: 1 REF: 557

6. As a low-level manager at your company, you are responsible for activities that make the day-to-day operation of the business run smoothly, like ordering office supplies and creating work schedules. What type of planning are you responsible for? a. operational planning c. strategic planning b. tactical planning d. analysis ANS: A PTS: 1 REF: 557

7. Which of the following best describes the process referred to as operational planning? a. Planning an organization's long-range goals for profitability. b. Identifying incremental goals that can be achieved in a year or less. c. Completing activities that make day-to-day systems run smoothly. d. Planning an organization's long-range goals for market share. ANS: C PTS: 1 REF: 557

6|P a ge

8. As a buyer for a local dress store, you are responsible for choosing next seasons stock. Today you decided to include a selection of Asian-inspired dresses in your fall line based upon fashion trends and your own intuition. What type of problem did you handle? a. A structured problem. c. An unstructured problem. b. A schedule problem. d. A semi-structured problem. ANS: C PTS: 1 REF: 558

9. Some information systems store or provide access to ____ generated by sources outside the organization. a. external information c. internal information b. online information d. real-time information ANS: A PTS: 1 REF: 559

10. ____ systems use a commit or rollback strategy to ensure that each transaction is processed correctly. a. TQM c. OLTP b. ERP d. JIT ANS: C PTS: 1 REF: 560

11. As a manager, you are responsible for managing inventory. Every month you receive a low inventory report that lists stock items that have fallen below a minimum reorder point. This report is a type of ____. a. executive report c. summary report b. ad hoc report d. exception report ANS: D PTS: 1 REF: 561

12. A(n) ____ report is a customized report, generated to supply specific information not available in scheduled reports. a. additional c. ad hoc b. exception d. detailed ANS: C PTS: 1 REF: 561

13. A(n) ____ report combines, groups, or totals data. a. exception c. ad hoc b. aggregate d. summary ANS: D PTS: 1 REF: 561

14. Ad hoc reports are sometimes referred to as ____ reports. a. summary c. scheduled b. exception d. demand ANS: D PTS: 1 REF: 561

15. You are reviewing a cash-flow model of your business, which is designed to provide a numerical representation of a realistic situation. What type of tool are you using? a. an MIS table c. a decision model b. a decision query d. a neural network ANS: C PTS: 1 REF: 562

7|P a ge

16. A(n) ____ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios. a. DSS c. TPS b. BPR d. MIS ANS: A PTS: 1 REF: 562

17. A ____ is a numerical representation of a realistic situation, such as a cash-flow model of a business that shows how income adds to cash accounts and expenses deplete those accounts. a. decision master c. decision model b. decision matrix d. decision index ANS: C PTS: 1 REF: 562

18. A ____ is a question or set of instructions describing data that must be gathered to make a decision. a. decision model c. decision scale b. decision query d. decision request ANS: B PTS: 1 REF: 562

19. A DSS typically includes modeling tools to help managers create a numerical representation of a situation and explore "what-if" alternatives. Which of the following is an example of such a tool? a. spreadsheet c. expert system b. database d. Web site ANS: A PTS: 1 REF: 563

20. In an expert system, a(n) ____ engine analyzes the available data by following the rules in its knowledge base. a. inference c. reference b. difference d. expert ANS: A PTS: 1 REF: 564

8|P a ge

21. A system like the one shown in the accompanying figure, is characterized by its ability to ____. a. list transactions b. produce routine reports c. replicate the reasoning of a human expert d. provide information for structured, routine decisions ANS: C PTS: 1 REF: 565

22. A system like the one shown in the accompanying figure, is characterized by all of the following EXCEPT ____. a. its ability to replicate the reasoning of a human expert b. its ability to generate its own programs c. its ability to work with external and internal data d. its ability to produce a recommendation or decision ANS: B PTS: 1 REF: 565

23. A systems analyst is responsible for all of the following EXCEPT ____. a. analyzing information requirements b. supervising the implementation of new information systems c. creating a development methodology d. creating specifications for application software ANS: C PTS: 1 REF: 567

24. A Project Development Plan includes all of the following EXCEPT ____. a. description of project scope b. justification for the project c. performance reviews of all project team participants d. schedule for the project ANS: C PTS: 1 REF: 567

25. The ____ technique is based on the idea that the best information systems are designed when end users and systems analysts work together as equal partners. a. MRP c. RFP b. EID d. JAD ANS: D PTS: 1 REF: 567

26. In a JAD ____, users and analysts jointly identify problems and look for solutions. a. session c. mission b. group d. department ANS: A PTS: 1 REF: 567

27. In the Planning Phase of the SDLC, a(n) ____ is assigned to analyze and develop the information system. a. RFP team c. mission team b. project team d. beta team ANS: B PTS: 1 REF: 567

9|P a ge

28. In the PIECES framework, a ____ exists when an information system does not respond quickly enough to users, or takes too long to complete processing tasks. a. response problem c. control problem b. processing problem d. performance problem ANS: D PTS: 1 REF: 569

29. ____ is a method for analyzing the time needed to complete each project task and identifying the minimum amount of time needed to complete the total project. a. Just in Time (JIT) b. Work Breakdown Structure (WBS) c. Program Evaluation Review Technique (PERT) d. Manufacturing Resource Planning (MRP) ANS: C PTS: 1 REF: 570

30. A ____ breaks a complex task into a series of subtasks. a. Work Breakdown Structure (WBS) c. legend b. PERT diagram d. Gantt chart ANS: A PTS: 1 REF: 570

31. A ____ uses bars to show the timing of development tasks as they occur over time. a. progress chart c. WBS chart b. Gantt chart d. PERT chart ANS: B PTS: 1 REF: 570

32. ____ elements are arranged to show which tasks must be completed before subsequent dependent tasks can begin. a. PERT chart c. Gantt chart b. WBS chart d. Beta chart ANS: A PTS: 1 REF: 570

33. The goal of the ____ of the SDLC is to produce a list of requirements for a new or revised information system. a. planning phase c. design phase b. analysis phase d. implementation phase ANS: B PTS: 1 REF: 571

34. In the accompanying figure, the ____ item represents a filing cabinet, disk, or tape that holds data. a. first c. third b. second d. fourth ANS: C PTS: 1 REF: 572

10 | P a g e

35. In the ____ of the SDLC, the project team must decide how the new system will fulfill the requirements specified in the System Requirements Report. a. design phase c. analysis phase b. planning phase d. implementation phase ANS: A PTS: 1 REF: 576

36. With ____, processing tasks are shared by servers and workstations. a. automated processing c. amortized processing b. turnkey processing d. distributed processing ANS: D PTS: 1 REF: 577

37. A ____ processing model is one in which data is processed on a centrally located computer. a. fundamental c. main b. distributed d. centralized ANS: D PTS: 1 REF: 577

38. Which of the following would be a reason an organization would choose to use a programming language to create an information system from scratch? a. This approach does not require development time and expertise. b. The software produced might not exactly match business needs. c. This approach can be used to make a solution tailored to system requirements. d. This option would limit developers in the way they implement some system features. ANS: C PTS: 1 REF: 578

39. Which of the following is TRUE with regard to turnkey systems? a. They require maximum effort to select and set up equipment and software. b. They require time and expertise to evaluate. c. They require more time than programming languages. d. They can be exactly tailored to meet system requirements. ANS: B PTS: 1 REF: 578

40. ____ might be chosen during the Design Phase of the SDLC because it requires little or no programming, and thus requires minimal development time. a. Industrial software c. Custom software b. Commercial software d. Trade software ANS: B PTS: 1 REF: 578

41. A(n) ____ is a request for a formal price quotation on a list of hardware and software. a. RFP c. RFQ b. BDG d. SDLC ANS: C PTS: 1 REF: 580

42. A project team submits an RFQ to vendors when it knows all of the following EXCEPT ____. a. make of the equipment needed c. titles of the software packages needed b. model of the equipment needed d. price of the software needed ANS: D PTS: 1 REF: 580

11 | P a g e

43. A(n) ____ is issued by a project team when it wants vendors to recommend hardware and software for the solution they have chosen. a. RFP c. RFD b. RFQ d. RFT ANS: A PTS: 1 REF: 580

44. Which of the following should be considered when reviewing a vendors RFP? a. The vendors reliability. c. The vendors financial stability. b. The vendors expertise. d. All of the above. ANS: D PTS: 1 REF: 581

45. The accompanying figure shows an excerpt from a project teams ____. a. application mapping c. application index b. application specification d. application glossary ANS: B PTS: 1 REF: 581

46. In terms of software, ____ serve as a blueprint for the new system. a. hardware requirements c. turnkey systems b. custom software d. application specifications ANS: D PTS: 1 REF: 581

47. In the design phase of the SDLC, the project team ____. a. chooses a solution b. selects hardware and software c. designs detailed application specifications d. all of the above ANS: D PTS: 1 REF: 582

12 | P a g e

48. Many projects fail because of constant, unmanaged demand for changes, even before the system is implemented. This failure to constrain change is often referred to as ____. a. concatenation c. feature creep b. preapproval d. redevelopment ANS: C PTS: 1 REF: 582

49. ____ is the process of modifying a commercial application to reflect the needs of a particular organization. a. Software customization c. Software tailoring b. Software regeneration d. Software alteration ANS: A PTS: 1 REF: 583

50. ____ testing is performed to ensure that software modules operate together correctly. a. Incorporation c. Integration b. Assimilation d. Amalgamation ANS: C PTS: 1 REF: 584

51. You are planning to migrate your business from its current information system to a new, more efficient information system. Your business has several branches, each of which has its own independent information processing system. What type of conversion would be appropriate in this situation? a. pilot conversion c. direct conversion b. parallel conversion d. acceptance conversion ANS: A PTS: 1 REF: 586

52. Which quality of service (QoS) metric is defined as the number of errors occurring in a particular time interval for a particular function? a. response time c. user levels b. accuracy d. capacity ANS: B PTS: 1 REF: 587

53. Which quality of service (QoS) metric is defined as the amount of time a system is not available for processing? a. capacity c. downtime b. accessibility d. throughput ANS: C PTS: 1 REF: 587

54. A ____ metric is a technique for measuring a specific characteristic by monitoring system performance and analyzing responses to user satisfaction surveys. a. PIECES c. programming b. quality of service (QoS) d. satisfaction ANS: B PTS: 1 REF: 587

55. Three key concepts ensure good quality of service from a computer system. They include all of the following EXCEPT ____. a. reliability c. availability b. cost d. serviceability ANS: B PTS: 1 REF: 587

13 | P a g e

56. Computer systems are ____ when they can be counted on to function correctly. a. available c. reliable b. serviceable d. high-performing ANS: C PTS: 1 REF: 587

57. ____ refers to the ability of the system to be continuously accessible to all the people who use it. a. Serviceability c. Reliability b. Availability d. Performance ANS: B PTS: 1 REF: 587

58. Systems exhibit ____ when they are easily upgraded or repaired. a. availability c. accessibility b. serviceability d. reliability ANS: B PTS: 1 REF: 587

59. Which quality of service (QoS) metric is defined as the amount of data processed in a particular time interval? a. throughput c. downtime b. accuracy d. capacity ANS: A PTS: 1 REF: 587

60. A(n) ____ installs new versions of operating system software and modifies operating system settings to ensure maximum performance. a. applications programmer c. systems programmer b. system operator d. database analyst ANS: C PTS: 1 REF: 588

61. Many organizations establish a ____ to handle end-user problems. a. user desk c. system desk b. help desk d. processing desk ANS: B PTS: 1 REF: 588

62. A common threat to the data stored on a corporate information system is an act of war, which includes all of the following EXCEPT ____. a. bombings c. cyberterrorism b. viruses d. human error ANS: D PTS: 1 REF: 591

63. Multilevel authentication is an example of a security measure in the ____ category. a. corrective procedure c. preventative countermeasure b. deterrent d. detection activity ANS: B PTS: 1 REF: 592

64. Antivirus software is an example of a security measure in the ____ category. a. detection activity c. preventative countermeasure b. deterrent d. corrective procedure ANS: A PTS: 1 REF: 592

14 | P a g e

65. To avoid downtime, one of the most basic requirements for a data center is a ____. a. UPS c. detection system b. power grid d. security sampler ANS: A PTS: 1 REF: 593

66. The key to a ____ is an e-mail that looks like it originated from a legitimate company. a. pharming scam c. thieving scam b. phishing scam d. mining scam ANS: B PTS: 1 REF: 594

67. An enterprise-wide disaster recovery plan should do all of the following EXCEPT ____. a. minimize immediate damage and prevent additional losses b. ensure the safety of people on the premises c. temporarily suspend critical business operations d. facilitate effective coordination of recovery tasks ANS: C PTS: 1 REF: 594

68. In the corporate world, a ____ symbolizes a company, its products or services. This typically includes a name, trademark, and logo. a. brand c. mission b. reputation d. definition ANS: A PTS: 1 REF: 594

69. All of the following are guidelines to help corporations deal with identity theft EXCEPT ____. a. monitor domain name registration c. keep scams from happening to customers b. educate customers d. manage URLs ANS: C PTS: 1 REF: 595

70. With current ____ technologies, corporations have no way to lock down their branding elements. a. HTTP c. URI b. FTP d. UML ANS: A PTS: 1 REF: 595

Case-Based Critical Thinking Questions Case 10-1 In order to become more efficient, your company has restructured its management team. You are to convey these changes to the rest of the company. 71. What is the best way to communicate the new organizational structure to employees in your organization? a. Create an organizational chart and send it to the employees. b. Send an e-mail message with everyones name and new position in a list. c. Send a broadcast phone message listing everyones new position. d. Let the management team members introduce themselves to all the employees. ANS: A PTS: 1 REF: 557 TOP: Critical Thinking

15 | P a g e

72. Due to the reorganization, Joe Smith will now supervise other employees, approve new products, and authorize new construction. Joe Smith is now a(n) ____. a. accountant c. manager b. worker d. vice-president ANS: C PTS: 1 REF: 557 TOP: Critical Thinking

73. Amanda Roberts is now in charge of planning the organizations long-range goals for profitability, market share, and membership levels. She is now a(n) ____. a. executive manager c. worker b. mid-level manager d. low-level manager ANS: A PTS: 1 REF: 557 TOP: Critical Thinking

Case-Based Critical Thinking Questions Case 10-2 You have been hired to create an information system for the TeaTime Tea House. You have met with the owner of the company to get a general idea of what they need, and have decided to use the modified waterfall SDLC model. 74. What is the first phase of the SDLC? a. planning b. design ANS: A PTS: 1

c. implementation d. analysis REF: 566 TOP: Critical Thinking

75. The company owner has requested a document that describes what you envision to be the objectives for the new information system. Which type of report will you create? a. a Design Report c. a System Requirements Report b. an Executive Report d. a System Development Report ANS: C PTS: 1 REF: 572 TOP: Critical Thinking

Case-Based Critical Thinking Questions Case 10-3 Cara and her sister Bella are the owners of Butterfly Ltd., a clothing boutique. It began as a small womens accessory business that was run out of their parents garage and has since expanded into a store in the local mall. Up to this point, Butterfly Ltd.s information system consisted of a series of databases stored on a laptop computer. Because the company is expanding so rapidly, Cara and Bella feel they need to convert their information system to a more efficient system that can better assist in data analysis. 76. Cara and Bella want to avoid the risks of a direct conversion to a new information system because they have no backup for their current system. Which type of conversion would allow them to continue to use the old system during the conversion process? a. pilot conversion c. logical conversion b. inline conversion d. parallel conversion ANS: D PTS: 1 REF: 586 TOP: Critical Thinking

77. Cara and Bella will know that the implementation phase is completed once the following occurs: a. Theyve undergone acceptance testing. c. Half the data is converted. b. Their computers freeze. d. None of the data is converted. ANS: A PTS: 1 REF: 586 TOP: Critical Thinking 16 | P a g e

Case-Based Critical Thinking Questions Case 10-4 Jane works for a successful business that publishes a popular monthly magazine. She is responsible for ensuring that the business has the correct information systems in place to allow the business to operate efficiently and effectively. 78. The business needs a system to track employee hours, calculate deductions and taxes, generate paychecks, and produce data for year-end reports. Which type of system should Jane investigate to meet these needs? a. decision support system c. transaction processing system b. management information system d. expert system ANS: C PTS: 1 REF: 559 TOP: Critical Thinking

79. Management has asked Jane to find an information system that will help them solve semi-structured problems. Jane knows that such a system is called a(n) ____. a. decision support system c. transaction processing system b. management information system d. expert system ANS: A PTS: 1 REF: 562 TOP: Critical Thinking

80. Jane knows she must implement a step-by-step plan that describes the methods her business will use to secure data against disaster, and the guidelines that will be used to recover lost data if a disaster occurs. She will have to create a(n) ____. a. anti-catastrophe plan c. calamity recovery plan b. disaster recovery plan d. expert recovery system ANS: B COMPLETION 1. Any organization that seeks profit by providing goods and services is called a(n) ____________________. ANS: business PTS: 1 REF: 556 PTS: 1 REF: 593 TOP: Critical Thinking

2. Some information systems collect and store ____________________ information generated by the organization itself. ANS: internal PTS: 1 REF: 559

3. In an information system context, a(n) ____________________ is an exchange between two parties that is recorded and stored in a computer system. ANS: transaction PTS: 1 REF: 559

17 | P a g e

4. In ____________________ processing, a group of transactions is collected and held for processing until the end of a day or pay period, for example. ANS: batch PTS: 1 REF: 560

5. A(n) ____________________ system helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios. ANS: decision support PTS: 1 REF: 562

6. EIS stands for ____________________. ANS: executive information system PTS: 1 REF: 562

7. A(n) ____________________ usually includes data from an organizations transaction processing system, and it might include or access external data, such as stock market reports. ANS: DSS decision support system DSS (decision support system) decision support system (DSS) PTS: 1 REF: 563

18 | P a g e

8. A system like the one in the accompanying figure is sometimes referred to as a(n) ____________________ system. ANS: knowledge-based expert PTS: 1 REF: 564

9. In the PIECES framework, a(n) ____________________ problem means that users do not receive the right information at the right time in a usable format. ANS: information PTS: 1 REF: 569

10. In the PIECES framework, a(n) ____________________ problem means that the system costs too much to operate or use. ANS: economics PTS: 1 REF: 569

11. In development of an information system, the ____________________ methodology focuses on the processes that take place within an information system. ANS: structured PTS: 1 REF: 570

12. The items in the accompanying figure are symbols from a(n) ____________________. ANS: DFD (data flow diagram) data flow diagram (DFD) data flow diagram DFD PTS: 1 REF: 572

13. The current standard for object-oriented documentation is called ____________________. ANS: UML Unified Modeling Language Unified Modeling Language (UML) UML (Unified Modeling Language) PTS: 1 REF: 573 19 | P a g e

14. In UML, a(n) ____________________ diagram documents the users of an information system and the functions they perform. ANS: use case PTS: 1 REF: 573

15. A(n) ____________________ diagram depicts the detailed sequence of interactions that take place for a use case. ANS: sequence PTS: 1 REF: 574

16. A(n) ____________________ tool is a software application that is designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs. ANS: CASE computer-aided software engineering computer-aided software engineering (CASE) CASE (computer-aided software engineering) PTS: 1 REF: 574

17. A spreadsheet can be used to produce a(n) ____________________ support worksheet for comparing potential solutions. ANS: decision PTS: 1 REF: 579

18. During the ____________________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system. ANS: implementation PTS: 1 REF: 583

19. A(n) ____________________ is a place where software testing can occur without disrupting the organizations regular information system. ANS: test area PTS: 1 REF: 584

20. Security ____________________ include stolen data, physical intrusions, and deliberate sabotage. ANS: breaches PTS: 1 REF: 591

20 | P a g e

MATCHING Identify the letter of the choice that best matches the phrase or definition. a. structured problem g. parallel conversion b. semi-structured problem h. pilot conversion c. unstructured problem i. decision model d. system conversion j. system requirements e. direct conversion k. project management software f. phased conversion l. rollback 1. Completely deactivates the old system and immediately activates the new system 2. Figuring out which of your customers should receive overdue notices is an example 3. Works well with larger modularized information systems because the new system is activated one module at a time 4. Keeps the old system in service while some or all of the new system is activated 5. Process of deactivating an old information system and activating a new one 6. Less routine than a structured problem due to a degree of uncertainty. For example, the amount of holiday inventory a retail business should order 7. Works well in organizations with several branches that have independent information processing systems 8. Experts agree on the problem but disagree on the solution; the solution is based on human intuition 9. A numerical representation of a realistic situation 10. The criteria for successfully solving the problem or problems identified in an information system 11. An effective tool for planning and scheduling 12. Returns records to their original state if one step fails in an online transaction processing system 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: E A F G D B H C I J K L PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 586 558 586 586 586 558 586 558 562 571 571 560

ESSAY 1. An integral part of any successful project is the correct identification of the problems in the organizations current information system. Explain how the PIECES framework can be used to classify problems in an information system. ANS:

21 | P a g e

Each letter of PIECES stands for a potential problem. A performance problem means that an information system does not respond quickly enough to users or takes too long to complete processing tasks. An information problem means that users do not receive the right information at the right time in a usable format. An economics problem means that the system costs too much to operate or use. A control problem means that information is available to unauthorized users or that authorized users are not given the authority to make decisions based on the information they receive. An efficiency problem means that too many resources are used to collect, process, store, and distribute information. A service problem means that the system is too difficult or inconvenient to use. PTS: 1 REF: 569 TOP: Critical Thinking

2. Denise is the head of a project team which will be developing an information system for a small healthcare provider. Her team is ready to begin the planning phase of the SDLC and will meet to discuss the planning tools that will be used to help with scheduling and project development. Which tools should Denise consider using for this project? ANS: Denise should consider the following tools: PERT (Program Evaluation and Review Technique), which is a method for analyzing the time needed to complete each project task and identifying the minimum time needed to complete the total project. A PERT diagram uses arrows to map the sequence of tasks in a project. WBS (work breakdown structure), which breaks a complex task into a series of subtasks. The hierarchy of tasks is typically shown as a hierarchical diagram, but it can also be formatted as a simple outline. A WBS can be activity-oriented to list tasks, or deliverable-oriented to list project milestones. Gantt Chart, which uses bars to show the timing of development tasks as they occur over time. Each bar on the chart represents a task; the length of the bar indicates the expected duration of the task. PTS: 1 REF: 570 TOP: Critical Thinking

3. Describe in detail three common threats to the data stored on corporate information systems. ANS: Students will list and describe three of the following: As with personal computers, common threats to corporate information systems include natural disasters, power outages, software failures, hardware breakdowns, human error, security breaches, acts of war, and viruses. When disaster strikes the PC on your desktop, it is a major inconvenience, but just for one person. In contrast, threats to a corporate information system can affect thousands of people. Natural disasters include fires, floods, hurricanes, and other such unforeseeable events. A natural disaster can completely shut down a computer system, cut off service to customers, and potentially destroy the system completely. For example, when Hurricane Katrina tore through Louisiana, it left a swath of destruction in its wake. In many businesses, computer systems were drenched with rain and flood waters. During the storm, power outages knocked down several major Internet hosting services. Power remained out for weeks in some places, and businesses without generators scrambled to continue operating. Power outages can be caused by natural disasters, overloaded power grids, planned brownouts, and rolling blackouts. For example, the IS Departments of many California businesses had to contend with rolling blackouts in the early 2000s when power grids in the area could not keep up with rising power demands. 22 | P a g e

Hardware breakdowns can occur in any hardware component of a computer system. The risk of breakdown increases as a hardware component ages, but breakdowns can occur in brand-new hardware. Many devices are rated with a mean time between failures (MTBF) statistic. For example, an MTBF rating of 125,000 hours means that, on average, a device could function for 125,000 hours before failing. MTBF ratings are averages, however, so a server with a 125,000 MTBF rating might operate for only 10 hours before it fails. Human errors refer to mistakes made by computer operators. Common errors within an information system include entering inaccurate data and failing to follow required procedures. Poorly trained computer operators were blamed for the widespread North American blackout in the summer of 2003. Software failures can be caused by bugs or flawed software design. A tiny memory leak might be undetectable in a small computing system, but it can be disastrous on a system consisting of hundreds or thousands of computers. Other bugs may lead to security leaks. Hackers continue to discover bugs in Microsoft Windows and other software products that allow unauthorized access to servers. Security breaches include stolen data, physical intrusions, and deliberate sabotage. In one of the most publicized security cases, Omega Engineering Corporation, an instrumentation manufacturer for customers such as NASA and the U.S. Navy, fired a network administrator for performance problems. Before leaving work, the disgruntled employee wrote a six-line computer program that ultimately cost his former employer $10 million dollars in financial losses. The six-line program was a time bomb that erased information on the companys file server and destroyed data on all the backup tapes. The employee was eventually tried and convicted of computer sabotage, but Omega Engineering never regained its foothold in the market. Acts of war once affected only computer systems located on battle fronts. With a recent increase in terrorist incidents, however, civilian areas have become targets. Acts of war, such as bombing, can cause physical damage to computer systems. Cyberterrorism, which includes using viruses and worms to destroy data and otherwise disrupt computer-based operations, can target critical national infrastructures such as power grids and telecommunications systems. Viruses can damage just about any computer system. You might have experienced the nuisance of rooting out a virus from your personal computer. That inconvenience pales when compared to the potential effect of a virus on a corporate information system. The MyDoom worm, spread through e-mail, infected Web sites, and caused an estimated $250 million in damage when it infected millions of computers worldwide. PTS: 1 REF: 590|591 TOP: Critical Thinking

23 | P a g e

You might also like