Professional Documents
Culture Documents
CSC33 1 Midterm Exam Answers: Print Name: - Dr. Lee - Signature: - Score
CSC33 1 Midterm Exam Answers: Print Name: - Dr. Lee - Signature: - Score
CSC33 1 Midterm Exam Answers: Print Name: - Dr. Lee - Signature: - Score
Part I: True/False (remove the incorrect answer, 50%, 0.5% for each question)
1-20 : Chapter 1, 21-40: Chapter 2, 41-60: Chapter 3, 61-80: Chapter 4,
81-100: Chapter 5.
T 1. Traditionally, a company either developed its own information systems, called in-
house applications, or purchased systems called software packages from outside
vendors.
F 3. In an information system, data is information that has been transformed into output
that is valuable to users.
F 4. In an information system, information consists of basic facts that are the system’s
raw material.
T 10. A business process describes a specific set of transactions, events, tasks, and results.
F 11. Product-oriented companies primarily offer information or services or sell goods
produced by others.
F 13. Although the business-to-business (B2B) sector is more familiar to retail customers,
the volume of business-to-consumer (B2C) transactions is many times greater.
T 14. IBM claims that its WebSphere strategy is best for Web-based application
development, while Microsoft counters with a broad vision called .NET that
redefines that company’s approach to Web-based application development.
T 15. In many large companies, applications called enterprise resource planning (ERP)
systems provide cost-effective support for users and managers throughout the
company.
F 16. TP systems are inefficient because they process a set of transaction related
commands individually rather than as a group.
T 17. New business support systems that produced valuable information, in addition to
performing manual tasks, were called management information systems (MIS)
because managers were the primary users.
T 18. The decision support capability of a business support system can help users make
decisions; for example, a truck fleet dispatcher can run a series of what-if scenarios
to determine the impact of increased shipments or bad weather.
F 19. In a knowledge management system, a knowledge base consists of logical rules that
identify data patterns and relationships.
F 20. A knowledge management system uses inference rules, which consist of a large
database that allows users to find information by entering keywords or questions in
normal English phrases.
F 21. A strong business case suggests that a company should pursue other options, above
the alternative, because it would be in the firm’s best interest to do so.
T 22. Strategic planning looks beyond day-to-day activities and focuses on a horizon that
is 3, 5, or even 10 years in the future.
T 25. Today, systems development is much more team-oriented than in the past.
T 26. A systems request might propose enhancements for an existing system, the
correction of problems, or the development of an entirely new information system.
F 27. Systems requests seldom are aimed at improving service to customers or users
within a company.
T 28. Performance limitations result when a system that was designed for a specific
hardware configuration becomes obsolete when new hardware is introduced.
T 29. A system must have effective controls to ensure that data is secure and accurate.
F 30. Hardware-based security controls include passwords, various levels of user access,
and coding data.
T 32. Internal and external factors affect every business decision that a company makes,
and IT systems are no exception.
F 33. A strategic plan that stresses technology tends to create an unfavorable climate for
IT projects that extends throughout an organization.
T 34. As users rely more heavily on information systems to perform their jobs, they are
likely to request even more IT services and support.
T 35. Errors or problems in existing systems can trigger requests for systems projects.
T 36. The purpose of a JIT (just-in-time) system is to provide the right product in the right
place at the right time.
F 37. Information systems that interact with customers usually receive low priority.
T 40. With Microsoft Project, a project manager can use a map to define project tasks, list
activities and participants, plan the sequence of work, estimate project milestone
dates, and track all costs.
T 41. Each activity within the systems analysis phase has an end product and one or more
milestones.
F 42. Greater user involvement in the system development process usually results in
poorer communication, slower development times, and less satisfied users.
F 44. While RAD typically focuses only on fact-finding and requirements determination,
JAD provides a fast-track approach to a full spectrum of system development tasks,
including planning, design, construction, and implementation.
T 45. IT professionals recognize that successful systems must be user-oriented, and users
need to be involved, formally or informally, at every stage of systems development.
F 46. Because of the limited range of input and interaction among participants, few
companies believe that a JAD group produces the best definition of a new system.
F 48. Compared with traditional methods, the entire RAD process is expanded and, as a
result, the new system is built, delivered, and placed in operation much later.
F 49. The main objective of all RAD approaches is to extend development time and
expense by excluding users from every phase of systems development.
T 50. A risk of RAD is that a system might work well in the short term, but the corporate
and long-term objectives for the system might not be met.
T 51. System analysts use modeling and fact-finding interactively — first they build fact-
finding results into models, then they study the models to determine whether
additional fact-finding is needed.
T 53. UML provides various graphical tools and techniques, such as case diagrams and
sequence diagrams.
T 54. Because use cases depict a system through the eyes of a user, common business
language can be used to describe the transactions.
F 55. In a sequence diagram, the interaction proceeds from left to right along horizontal
arrows, while a vertical timeline represents messages from one object to another.
F 58. Because it will have a shorter useful life, a scalable system offers a poorer return on
the initial investment.
T 59. In determining total cost of ownership (TCO), one problem is that cost estimates
tend to understate costs such as user support and downtime productivity losses.
F 60. Although software cannot help to gather and analyze facts, many programs actually
perform fact-finding for a systems analyst.
F 61. The deliverable, or end product, of data and process modeling is a physical model
of the current system.
F 63. A physical model shows what the system must do, regardless of how it will be
implemented.
T 64. A data flow diagram (DFD) shows how the system transforms input data into useful
information.
F 65. A set of DFDs provides a logical model that shows how the system works, not what
the system does.
T 66. In a DFD, processes contain the business logic, also called business rules, that
transform the data and produce the required results.
F 67. Using Gane and Sarson symbols, a DFD represents processes as circles.
F 69. A DFD shows the structure and detailed contents of a data flow.
F 70. In a DFD, a process symbol can have only one outgoing data flow.
T 71. In a DFD, a data flow must have a process symbol on at least one end.
T 72. Spontaneous generation, black holes, and gray holes are logically impossible in a
DFD because a process must act on input, shown by an incoming data flow, and
produce output, represented by an outgoing data flow.
T 73. A DFD does not show the detailed contents of a data store — the specific structure
and data elements are defined in the data dictionary.
F 74. Two data stores can be connected by a data flow without an intervening process.
F 75. A DFD does not show the external entities that provide data to the system or receive
output from the system.
F 76. Systems analysts call an entity that supplies data to the system a sink, and an entity
that receives data from the system a source.
F 77. Data flows are shown in a context diagram because data stores are external to the
system.
T 78. What makes one system more complex than another is the number of components,
the number of levels, and the degree of interaction among its processes, entities,
data stores, and data flows.
T 79. The process name in a context diagram should be the name of the information
system.
F 80. A context diagram provides the most detailed view of an information system and
contains multiple process symbols.
T 81. The Software and Information Industry Association (SIIA) believes that the
acquisition of software as a service rather than a product will have a major impact
on the software industry.
T 82. Typically, customers purchase licenses that give them the right to use the software
under the terms of the license agreement.
T 84. Two Web-based development environments are IBM’s WebSphere and Microsoft’s
.NET.
T 85. In a traditional systems development environment, security issues usually are less
complex than with Web-based systems, because the system operates on a private
telecommunications network, rather than the Internet.
F 86. Internet-based development treats the Web as just a communications channel, rather
than as a platform.
F 88. An ASP provides a license to use the software, and nothing more.
T 89. Another term for IBS is managed hosting, because the operation is managed by the
outside firm, or host.
F 91. A major advantage of outsourcing is that it eliminates employee concerns about job
security.
T 92. A company considering outsourcing must realize that the solution can be only as
good as the outsourcing firm that provides the service.
F 93. Mergers and acquisitions typically have no impact on clients and customers of
large, financially healthy firms.
F 94. According to Gartner, a leading IT research and consulting firm, by 2005, three in
10 IT jobs at U.S. IT companies and four in 20 at non-IT companies will move
offshore.
T 95. The main reason for offshore outsourcing is the same as domestic outsourcing:
lower bottom-line costs.
F 96. A software package that can be used by many different types of organizations is
called a vertical application.
T 98. By designing a system in-house, companies can develop and train an IT staff that
understands the organization’s business functions and information support needs.
T 100. Many firms feel that in-house IT resources and capabilities provide a competitive
advantage because an in-house team can respond quickly when business problems
or opportunities arise.
Part II: Short Answer (answer each question completely, 50%, 1% for each question)
1-10 : Chapter 1, 11-20: Chapter 2, 21-30: Chapter 3, 31-40: Chapter 4,
41-50: Chapter 5.
5. A(n) _system_ is a set of related components that produces specific results, such
as routing Internet traffic, manufacturing microchips, and controlling complex
events like a NASA launch.
10. _Groupware_ programs run on a company intranet and enable users to share data,
collaborate on projects, and work in teams.
11. The term _business case_ refers to the reasons, or justification, for a systems
development proposal.
14. A(n) _mission statement_ describes a company for its stakeholders and briefly
states the company’s overall purpose, products, services, and values.
16. After composing a mission statement, a company identifies a set of _goals_ that
will accomplish the mission.
18. _Critical success factors_ are vital objectives that must be achieved for an
enterprise to fulfill its mission.
19. _Critical business issues_ are the key problems, opportunities, and constraints that
affect and shape a firm’s decisions.
20. At some point in the systems development process, a(n) _case for action_ is
presented, which is a summary of the project request and a specific
recommendation.
21. One of the main activities in the systems analysis phase is _requirements
modeling_, which involves fact-finding to describe the current system and identify
requirements for the new system.
22. The deliverable, or end product of the systems analysis phase is a(n) _systems
requirements document_, which is an overall design for the new system.
23. _Analytical skills_ enable a systems analyst to identify a problem, evaluate the
key elements, and develop a useful solution.
24. A common technique that allows users to participate in various development tasks
is called _joint application development_, which is a team-oriented technique for
fact-finding and requirements modeling.
25. In addition to joint applications development, another popular user-oriented
method is _rapid application development_, which resembles a condensed version
of the entire SDLC with users involved every step of the way.
26. The _unified modeling language_ is a widely used method of visualizing and
documenting software systems design. (Chapter 3, #11)
27. A(n) _use case diagram_ is a UML technique that visually represents the
interaction between users and an information system.
28. In a use case diagram, the user becomes a(n) _actor_, with a specific role that
describes how he or she interacts with a system.
29. A(n) _sequence diagram_ is a UML technique that shows the timing of
transactions between objects as they occur.
31. Analysts use _ data and process _ modeling techniques to show how a system
transforms data into useful information.
32. A(n) _data flow diagram_ uses various symbols to show how the system
transforms input data into useful information.
33. In addition to the Gane and Sarson symbol set, another popular symbol set is the
_Yourdon_ symbol set.
34. In a typical company, _processes_ might include calculating sales trends, filing
online insurance claims, ordering inventory from a supplier’s system, or verifying
e-mail addresses for Web customers.
36. To show the detail inside a black box, create DFD _diagram 0_, which zooms in
on the context diagram and shows major processes, data flows, and data stores.
(Chapter 4, #16)
37. A(n) _diverging data flow_ is a data flow in which the same data travels to two or
more different locations.
38. When a set of DFDs is created for a system, a(n) _functional primitive_ is a
process that consists of a single function that is not exploded further.
39. _Leveling_ is the process of drawing a series of increasingly detailed diagrams,
until all functional primitives are identified.
40. _Balancing_ maintains consistency among DFDs by ensuring that input and
output data flows align properly.
41. The _Software and Information Industry Association_ is an industry group that
focuses on the digital economy.
42. As Internet-based systems become more popular, developers will focus on _web-
based application development_, where the Web becomes an integral part of the
application, rather than just a communication channel.
45. A firm that offers outsourcing solutions is called a(n) _service provider_.
46. A(n) _application service provider_ is a firm that delivers a software application,
or access to an application, by charging a usage or subscription fee.
47. Some firms offer _Internet business services__, which provide powerful Web-
based support for transactions such as order processing, billing, and customer
relationship management.
48. A(n) _usage model or transaction model_ is an outsourcing fee model that charges
a variable fee based on the volume of transactions or operations performed by the
application.
49. The choice between developing versus purchasing software often is called a(n)
_make-or-buy or build-or-buy_ decision.
50. The software that a company’s IT department makes, builds, and develops is
called _in-house software_.