Professional Documents
Culture Documents
Mis215 Final
Mis215 Final
Object Modeling
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part.
2
O-O methodology is popular because it integrates
easily with object-oriented programming languages
such as Java, Smalltalk, VB.Net, Python, and Perl
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Object-Oriented Terms and Concepts
◦ Unified modeling language (UML)
Method of visualizing and documenting an information
system
◦ Attributes: Characteristics that describe an object
◦ Methods: Tasks or functions that the object performs
◦ Message: Command to perform a specific function
◦ A class is a group of similar objects
Instance: Specific member of a class
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 4
Objects
◦ Represented as a
rectangle
The object name is at
the top, followed by
the object’s attributes
and methods
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 5
FIGURE 6-2 The PARENT object includes four attributes and two methods.
Mary Smith, Ahmed Ali, and Anthony Greene are instances of the PARENT
object.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 6
FIGURE 6-3 The CHILD object includes five attributes and five methods. James Smith,
Amelia Ali, and Misty Greene are instances of the CHILD object.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Attributes
◦ Describe the characteristics of an object
◦ The number of attributes required depends on:
Business requirements of the information system
Requirements of users
◦ Objects possess a state
State: Describes the object’s current status
Example: student can be a future student, a current
student, or a past student
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 8
Methods
◦ Specific tasks that an object can perform
◦ Identify functions performed
◦ Describe the functions performed
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 9
Message
◦ A command that tells an object to perform a certain
method
◦ Polymorphism: Concept that a message gives
different meanings to different objects
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Message (cont.)
objects send and receive messages but do not alter the
internal methods of other objects.
◦ Encapsulation: Idea that all data and methods are
self-contained.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Classes
◦ An object belongs to a group or category called a
class
All objects within a class share common attributes and
methods
◦ Subclasses: Categories within a class
◦ A class can belonging to a general category called
Super-class
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 12
FIGURE 6-7 The VEHICLE class
includes common attributes and
methods. CAR, TRUCK, MINIVAN, and
SCHOOL BUS are instances of the
VEHICLE class.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 13
FIGURE 6-9 At the fitness center, the PERSON superclass includes common
attributes and methods. EMPLOYEE is a class within the PERSON superclass.
INSTRUCTOR is a subclass within the EMPLOYEE class.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 14
UML uses a set of symbols to represent
graphically the various components and
relationships within a system
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 15
Use Case Modeling (Cont.)
◦ UML symbol for a use case is an oval with a label that
describes the action or event
◦ The actor is shown as a stick figure, with a label that
identifies the actor’s role
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 16
FIGURE 6-14 The
ADD NEW
STUDENT use
case description
documents the
process used to
add a current
student into an
existing class.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Use Case Diagrams
◦ A visual summary of several related use cases
within a system or subsystem
◦ The first step is to identify the system boundary
which is represented by a rectangle
System boundary: Shows what is included in the
system (inside the rectangle) and what is not included
in the system (outside the rectangle)
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 18
FIGURE 6-16 A use case
diagram to handle work at
an auto service
department.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Class Diagrams
◦ Show the object classes and relationships involved
in a use case
◦ Each class appears as a rectangle, with the class
name at the top, followed by the class’s attributes
and methods
◦ Lines show relationships between classes and have
labels identifying the action that relates the two
classes
◦ Includes a concept called cardinality
Cardinality: Describes how instances of one class
relate to instances of another class
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 20
FIGURE 6-17 Examples of UML notations that indicate the nature of the relationship between
instances of one class and instances of another class.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 21
FIGURE 6-18 Class diagram
for a sales order use case
(attributes and methods
omitted for clarity).
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 22
Sequence Diagrams
◦ Dynamic model of a use case, showing the
interaction among classes during a specified time
period
◦ Graphically document the use case by showing the
classes, the messages, and the timing of the
messages
◦ Include symbols that represent classes, lifelines,
messages, and focuses
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Classes
◦ Send or receive messages
Shown at the top of the sequence diagram
Lifelines
◦ Represent the time during which the
object above it is able to interact with
the other objects in the use case
◦ An X marks the end of the lifeline
Messages
◦ Include additional information about
the contents
Focuses
◦ Indicate when an object sends or
FIGURE 6-19 A sequence diagram with two classes.
receives message
Notice the X that indicates the end of the CLASS 2 lifeline.
Also notice that each message is represented by a line
with a label that describes the message, and that each
class has a focus that shows the period when messages
are sent or received
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 24
FIGURE 6-20 The sequence diagram for the ADD NEW STUDENT use case.
The use case description for ADD NEW STUDENT is shown in Figure 6 14.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Activity Diagrams
◦ Show actions and events as they occur
◦ Show the order in which the actions take place and
identify the outcomes
FIGURE 6-22 An
activity diagram shows
the actions and events
involved in withdrawing
cash from an ATM.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 26
FIGURE 6-23 The
Bizagi Modeler tool
supports business
modeling and simulation
using the standard BPM
notation.
Source: bizagi.com
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 27
CASE Tools
◦ Provide an overall framework for documenting the
system components
Object modeling requires many types of diagrams to
represent proposed systems
CASE tools speed up the process
◦ Ensure consistency and provide common links
Once objects are described and used in one part of the
design, they can be reused multiple times without
further effort
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Develop an object relationship diagram that
provides an overview of the system
Support each diagram or object definition
with clear and relevant documentation that
can be accessed easily
◦ Organize use cases and use case diagrams so they
can be linked to the appropriate class, state
transition, sequence, and activity diagrams
Maintain accuracy
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Chapter 7
Development Strategies
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part.
FIGURE 4-2
2
Earlier, certain work functions in the company
required:
◦ Development of software by in-house efforts
◦ Employing the services of external entities
Today, organizations have following choices
for software acquisition
◦ Application service providers (ASP)
◦ Web-hosted software options
◦ Firms that offer enterprise-wide software solutions
Selecting the best development path is an
important decision
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Transfer of information systems development,
operation, or maintenance to an outside firm
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 4
Outsourcing Fees
◦ Fixed fee model: Uses a set fee based on a specified
level of service and user support
◦ Subscription model: Has a variable fee based on the
number of users or workstations that have access
to the application
◦ Usage model or transaction model: Charges a
variable fee based on the volume of transactions or
operations performed by the application
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 5
Outsourcing Issues and Concerns
◦ Mission-critical IT systems are outsourced if the
result is a cost-attractive and reliable business
solution
◦ Overseas outsourcing can raise issues with control,
culture communication, and security
◦ Reviewing the outsourcing firm’s history and
financial condition is vital
◦ Outsourcing clients can be affected by mergers and
acquisitions
◦ Employee job security is a major concern
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 6
Offshore Outsourcing
◦ Called global outsourcing
◦ Shifting IT development, support, and operations to
other countries
◦ Reason - Lower bottom-line costs
◦ Risks and concerns
Impact on the economy
Project control
Security issues
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Software development options
◦ Develop own systems
◦ Purchase, possibly customize, and implement a
software package
Most important consideration is the total
cost of ownership (TCO)
Companies can develop user applications
based on commercial software packages
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 8
Make or Buy Decision
◦ Refers to the choice between developing and
purchasing
◦ A company’s IT department makes, builds, and
develops in-house software
◦ A software
package is
obtained from
a vendor or
application
service provider FIGURE 7-8 Instead of outsourcing, a company can choose to
develop a system in-house, or purchase and possibly customize a
commercial package.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 9
Make or Buy Decision (cont.)
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 10
FIGURE 7-10 Companies consider various factors when comparing in-
house development with the purchase of a software package.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Chapter 8
User Interface Design
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 1
duplicated, or posted to a publicly accessible website, in whole or in part.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 2
duplicated, or posted to a publicly accessible website, in whole or in part.
Goal of systems design - To build a system
that is effective, reliable, and maintainable
◦ A system is:
Effective if it supports business requirements and
meets user needs
Reliable if it handles input errors, processing errors,
hardware failures, or human mistakes
Maintainable if it is flexible, scalable, and easily
modified
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 3
duplicated, or posted to a publicly accessible website, in whole or in part.
Will It Succeed?
◦ Suggestions for successful design (basic principles)
Think like a user
Carefully examine any point where users provide input or
receive output
Anticipate future needs and provide flexibility
Anticipate possible expansion example: 1999, Y2K
Offer several alternatives example: salary system
Manage data effectively
System should enter and verify data as soon as possible
Input data must be close to its source
A secure system must include audit trails
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 4
duplicated, or posted to a publicly accessible website, in whole or in part.
Users can design their own output
◦ System designers are more aware of user needs and
desires
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 5
duplicated, or posted to a publicly accessible website, in whole or in part.
Describes how users interact with a computer
system
◦ Comprises features that affect two-way
communications between the user and the
computer
Central to usability
◦ In a user-centered
system, the distinction
blurs between input,
output, and the
interface itself FIGURE 8-2 Apple has long been a leader in creating
elegant user interfaces for its products.
Source: Apple
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 6
duplicated, or posted to a publicly accessible website, in whole or in part.
Human-Computer Interaction (HCI)
◦ Describes the relationship between computers and
people who use them to perform their jobs
◦ Early user interfaces – used Complex commands
graphical user interface (GUI)
◦ Transparent user interface: Does not distract the
user and calls no attention to itself.
◦ System Analyst Objective –
To create a user-friendly design
that is easy to learn and use
Figure 8-3 HCI is essential to employee productivity,
whether the work is done in a traditional office setting or
on a construction site like the one shown in this figure.
Goodluz/Shutterstock.com
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 7
duplicated, or posted to a publicly accessible website, in whole or in part.
Understand the Business
◦ The interface designer must understand:
The underlying business functions
How the system supports individual, departmental,
and enterprise goals ( example check FDD)
Maximize Graphical Effectiveness
◦ A well-designed interface enables rapid learning
Think Like a User
◦ The designer must see the system from a user’s
perspective
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 8
duplicated, or posted to a publicly accessible website, in whole or in part.
Use Models and Prototypes
◦ Designers can present initial screen designs to
users in the form of a storyboard
Users should test the design and provide feedback
Focus on Usability
◦ Include main options in the
opening screen
◦ Offer a reasonable number
of choices that a user easily
can comprehend
FIGURE 8-5 The opening screen displays the main options
for a student registration system. A user can click an option to
see lower-level actions and menu choices.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 9
duplicated, or posted to a publicly accessible website, in whole or in part.
Invite Feedback
◦ Monitor system usage and solicit user suggestions
◦ Determine if system features are being used as
intended by observing and surveying users
Document Everything
◦ Document all screen designs for later use by
programmers
◦ User-approved sketches and storyboards can be
used to document the user interface
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 10
duplicated, or posted to a publicly accessible website, in whole or in part.
— the best interface is the one that
works best for the users.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 11
duplicated, or posted to a publicly accessible website, in whole or in part.
Create an Interface That Is Easy to Learn and Use
◦ Select familiar images that users can understand
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 12
duplicated, or posted to a publicly accessible website, in whole or in part.
At this point, keep in mind that the deeper a
project is into the systems design process, the
more expensive it will be to make changes and
correct mistakes
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 13
duplicated, or posted to a publicly accessible website, in whole or in part.
Modular Design
◦ Individual components, called modules, connect to
a higher-level program or process
Modules are designed to perform a single function
Prototyping
◦ Involves a repetitive sequence of analysis, design,
modeling, and testing
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 14
duplicated, or posted to a publicly accessible website, in whole or in part.
Systems analysts generally use two
prototyping methods:
◦ System prototyping
Produces a full-featured, working model of the
information system
◦ Design or throwaway
prototyping
Used to verify user
requirements and is
discarded
FIGURE 8-21 The end product of system
prototyping is a working model of the information
system, ready for implementation.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 15
duplicated, or posted to a publicly accessible website, in whole or in part.
Prototyping (Cont.)
◦ Benefits
Users and systems developers can avoid
misunderstandings
System developers can create accurate specifications
for the finished system based on the prototype
Managers can evaluate a working model more
effectively than a paper specification
Helps in developing testing and training procedures
Reduces the risk and potential financial exposure that
occur when a finished system fails to support business
needs
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 16
duplicated, or posted to a publicly accessible website, in whole or in part.
Prototyping (Cont.)
◦ Potential problems
Rapid pace of development can create quality problems
which may not be discovered until the finished system is
operational
System requirements, such as reliability and
maintainability, cannot be tested adequately using a
prototype
In complex systems, the prototype can become unwieldy
and difficult to manage
Clients may want to adopt the prototype with few to no
changes, leading to increased maintenance costs later in
the SDLC
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied or 17
duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter 11+12
Managing Systems Implementation+
Managing Systems Support and
Security
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part.
CH 11
Managing Systems Implementation
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Introduction :
Testing
Training
Data conversion
System changeover
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Each program is tested to ensure that it
functions correctly
◦ Program is compiled using a CASE tool or language
compiler, which helps detect syntax errors
Integration Testing
◦ Testing two or more programs that depend on each
other to make sure that the programs work
together properly
◦ For example :
◦ Program 1 Check customer credit status
◦ Program 2 Update data in customer account
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 6
System Testing (Acceptance Tests)
◦ Objectives
Perform a final test of all programs
Verify that the system will handle all data properly
Ensure that the IT staff has the documentation and
instructions needed to operate the system properly
Demonstrate that users can interact with the system
successfully
Verify that all system components are integrated
properly
Confirm that the information system can handle
predicted volumes of data in a timely and efficient
manner
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Prepare a separate operational and test
environment
Provide training for users, managers, and IT
staff
Perform data conversion and system
changeover
Present a final report to management
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 8
Operational or production environment
◦ Environment for the actual system operation
Test environment
◦ Environment that analysts and programmers use to
develop and maintain programs
◦ A separate test environment is necessary to
maintain system security and integrity and protect
the operational environment
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 9
FIGURE 11-25 The test environment versus the operational environment. Notice that
access to the test environment is limited to IT staff, while the operational environment is
restricted to users.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Training Plan
◦ Identify who should receive training and what
training is required
Organization should be observed carefully to
determine how the system will support business
operations, and who will be involved or affected
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Vendor Training
◦ Required if the system includes the purchase of
hardware or software
Scope is limited to a standard version of the vendor’s
software or hardware
Outside Training
◦ Viable alternative if vendor
training is not practical
Interactive Training
◦ Effective training is interactive, self-paced, and
multimedia-based
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Process in which existing data is loaded on to
a new system
Data Conversion Strategies
◦ Automate the data conversion process if possible
◦ Old systems may be able to export data in ASCII or
ODBC (Open Database Connectivity) formats
ODBC drivers are a form of middleware
◦ If a standard format is not available, develop a
program to extract the data and convert it to an
acceptable format
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 14
Data Conversion Security and Controls
◦ Ensure that all system control measures are in place
and operational
◦ to protect data from unauthorized access and to
help prevent erroneous input
◦ Ensure that error-free data is fed into the new
system
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 15
Process of putting the new information
system online and retiring the old system
Can be rapid or slow, depending on the
method
Types
◦ Direct cutover
◦ Parallel operation
◦ Pilot operation
◦ Phased operation
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 16
Direct Cutover
◦ Enables changeover when the new system becomes
operational
◦ Least expensive changeover method
IT group has to operate and maintain only one system
at a time
◦ Involves more risk than other changeover methods
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Parallel Operation
◦ Both the old and the new information systems
operate fully for a specified period
◦ Advantage - Lower level of risk
The old system can be used as a backup
◦ Disadvantage – Most costly change over method
◦ Not practical if the old and new systems are
incompatible
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Phased Operation
◦ Implements the new system in stages, or modules
◦ Combines direct cutover and parallel operation to
reduce risks and costs
Only a part of the system is given to all users
◦ Risk of errors or failures is limited to the
implemented module only
◦ Less expensive than full parallel operation
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 20
FIGURE 11-31 Relative risk and cost characteristics of the four changeover methods.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 22
Introduction :
Maintenance Tasks
Security Overview
Backup and Recovery
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Figure 12-3 The total cost of operating an information system includes operational and maintenance
costs. Operational costs (green) are relatively constant, while maintenance costs (purple) vary over
time.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 24
Figure 12-5 Information systems maintenance depends on the type
of maintenance and the age of the system.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Corrective Maintenance
◦ Diagnoses and corrects errors in an operational
system
◦ Standard procedures are set for minor errors
◦ Worst-case situation is a system failure
Requires a patch
When the system is operational again, the maintenance
team determines the cause, analyzes the problem, and
designs a permanent solution
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 26
Adaptive Maintenance
◦ Adds enhancements to an operational system and
makes the system easier to use
◦ Procedure for minor adaptive maintenance is similar
to routine corrective maintenance
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Perfective Maintenance
◦ Changing an operational system to make it more
efficient, reliable, and maintainable
◦ Cost-effective during the middle of the system’s
operational life
◦ The more a program changes, the more likely it is
to become inefficient and difficult to maintain
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Preventive Maintenance
◦ Requires analysis of areas where trouble is likely to
occur
◦ IT department initiates preventive maintenance
◦ Results in:
Increased user satisfaction
Decreased downtime
Reduced TCO
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Security is a vital part of every computer
system
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Risk Management: Involves:
◦ Risk identification
List and classify assets and
analyze possible threats
Identify vulnerabilities and how
they might be exploited
◦ Risk assessment
Risks need to be calculated and
prioritized
◦ Risk control
Strategies - Avoidance,
mitigation, transference, and Figure 12-19 Risk management requires
acceptance continuous risk identification, assessment,
and control.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 31
Figure 12-20 System
threats can be grouped
into several broad
categories.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 32
Figure 12-21 IT security professionals have names for various types of
attackers.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Figure 12-22 Attacks can take many forms, as this table shows. IT security managers must
be able to detect these attacks and respond with suitable countermeasures.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Figure 12-22 Attacks can take many forms, as this table shows. IT security managers must
be able to detect these attacks and respond with suitable countermeasures.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Figure 12-22 Attacks can take many forms, as this table shows. IT security managers must be able to
detect these attacks and respond with suitable countermeasures.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 36
System security
involves six
separated but
interrelated levels
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 37
Backup Policies
1. Backup media: Includes tape, hard drives optical
and online storage
Offsiting: Storing backup away from the business
location
Cloud-based storage is growing rapidly
2. Types - Full, differential, incremental, and
continuous
3. Retention periods: Backups are stored for a
specific time beyond which they are either
destroyed or reused
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 38
Figure 12-34 Comparison of
full, differential, incremental,
and continuous backup
methods.
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Business Continuity Issues
◦ A disaster recovery plan should be created along
with a test plan
Often part of a business continuity plan (BCP)
BCP: Defines how critical business functions can continue
during a major disruption
Specifies the use of a hot site, which requires data
replication
Copyright ©2017 Cengage Learning. All Rights Reserved. May not be scanned, copied
or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Name: Class: Date:
b. shareware
c. middleware
d. public domain software
ANSWER: c
23. When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.
a. product
b. process
c. service
d. outsource
ANSWER: c
26. The _____ environment enhances interactive experiences, including wikis and blogs, and social networking
applications.
a. outsourcing
b. Software as a Service
c. Web 2.0
d. command-line
ANSWER: c
27. _____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable
computing resources that can be rapidly provisioned and released with minimal management effort or service provider
interaction.
a. Utility computing
b. Mainframe computing
c. Grid computing
d. Cloud computing
ANSWER: d
30. A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or
subscription fee.
a. software delivery service
b. manufacturer outsourcing
c. manufacturer outsourcing
d. application service provider
ANSWER: d
31. Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing,
and customer relationship management.
a. application service provider (ASP)
b. internet business services (IBS)
c. outsource hosting provider (OHP)
d. fixed outsourcing services (FOS)
ANSWER: b
32. When determining outsourcing fees, a _____ uses a set fee based on a specified level of service and user support.
a. fixed fee model
b. usage model
c. subscription model
d. transaction model
ANSWER: a
33. When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have
access to the application.
a. fixed fee model
b. usage model
c. subscription model
d. transaction model
ANSWER: c
35. A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations
performed by the application.
a. method model
b. administrative model
c. usage model
d. interpolated model
ANSWER: c
36. In the context of in-house software development options, the choice between developing versus purchasing software
often is called a _____ decision.
a. build or make
b. subscription
c. transactional
d. build or buy
ANSWER: d
37. The software that a company’s IT department makes, builds, and develops is called _____.
a. in-house software
b. internal software
c. external software
d. indexed software
ANSWER: a
38. Which of the following is a software collection obtained from a vendor or application service provider?
a. software package
b. software cluster
c. software metric
d. software aggregate
ANSWER: a
39. In the context of in-house software development options, companies that develop software for sale are called _____.
a. software stockers
b. software distributers
c. software vendors
d. software dealers
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:
d. user agent
ANSWER: c
46. The _____ must include users, who will participate in the selection process and feel a sense of ownership in the new
system.
a. development and testing team
b. evaluation and selection team
c. maintenance team
d. quality audit team
ANSWER: b
47. In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user
support.
a. service desk
b. evaluation team
c. planning center
d. planning center
ANSWER: a
48. _____ determines how long it takes an information system to spend for itself through reduced costs and increased
benefits.
a. Net present value (NPV)
b. Acquisition process
c. Return on investment (ROI)
d. Payback analysis
ANSWER: d
49. _____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project.
a. Net present value (NPV)
b. Acquisition process
c. Return on investment (ROI)
d. Payback analysis
ANSWER: c
50. The _____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits
adjusted to reflect the point in time at which they occur.
a. net present value (NPV)
b. acquisition process
c. return on investment (ROI)
d. payback analysis
ANSWER: a
51. Nearly _____ percent of total costs occur after the purchase of hardware and software.
a. 15
b. 45
Copyright Cengage Learning. Powered by Cognero. Page 8
Name: Class: Date:
c. 80
d. 95
ANSWER: c
52. A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features
required.
a. request for quotation (RFQ)
b. present net value (PNV)
c. request for proposal (RFP)
d. return on investment (ROI)
ANSWER: a
53. When companies use a _____, they already know the specific products or service they want and need to obtain price
estimates or bids from vendors.
a. request for quotation (RFQ)
b. net present value (NPV)
c. request for proposal (RFP)
d. return on investment (ROI)
ANSWER: a
54. Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and
exchange ideas.
a. newsgroups
b. benchmarks
c. report generators
d. service desks
ANSWER: a
55. A _____ measures the time a package takes to process a certain number of transactions.
a. newsgroup
b. parameter
c. benchmark
d. middleware
ANSWER: c
56. _____ is an example of a nonprofit organization that publishes standards and reports for its members and the general
public.
a. The National Institute of Standards and Technology (NIST)
b. Microsoft
c. The Transaction Processing Performance Council (TPC)
d. Oracle
ANSWER: c
57. A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings.
a. fixed fee model
Copyright Cengage Learning. Powered by Cognero. Page 9
Name: Class: Date:
b. usage model
c. evaluation model
d. subscription model
ANSWER: c
58. When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under
certain terms and conditions.
a. fixed fee model
b. request for proposal
c. software license
d. supplemental maintenance agreement
ANSWER: c
59. If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor.
a. fixed fee model
b. request for proposal
c. software license
d. supplemental maintenance agreement
ANSWER: d
60. The _____ contains the prerequisites for the new system, describes the alternatives that were considered, and makes a
specific recommendation to management.
a. software requirements specification
b. request for quoting document
c. software license
d. maintenance agreement
ANSWER: a
61. _____ is the starting point for measuring the performance, accuracy, and completeness of the finished system before
entering the systems design phase.
a. Software requirements specification
b. Request for quoting document
c. Software license
d. Maintenance agreement
ANSWER: a
62. A _____ defines what must take place, not how it will be accomplished.
a. logical design
b. physical design
c. quantitative design
d. qualitative design
ANSWER: a
63. A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and
sorting procedures, the format of reports, and so on.
Copyright Cengage Learning. Powered by Cognero. Page 10
Name: Class: Date:
a. logical design
b. physical design
c. quantitative design
d. qualitative design
ANSWER: b
CASE
Critical Thinking Questions
Case 7-1
Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the
recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in
order to solidify their understanding.
64. Which of the following is a reason Priscilla would offer as a reason for in-house software development?
a. The client is looking to spend the least possible time in implementation.
b. The client wants to be able to use fewer technical development staff members.
c. The client has a number of very distinctive security requirements.
d. The client wishes to receive future upgrade from the vendors.
ANSWER: c
65. Which of the following is a reason Priscilla will share with the new analysts, with regard to a client that wants to
purchase a software package?
a. The client wants to develop internal resources and capabilities.
b. The client is looking for the lowest possible costs.
c. The client has unique business requirements that must be satisfied by this software application.
d. The client has some existing technology in place whose requirements must be met by the new software.
ANSWER: b
67. Tom has two candidates for the new system. Which one of the following is a strategy he can pursue for making the
Copyright Cengage Learning. Powered by Cognero. Page 11
Name: Class: Date:
Multiple Response
Matching
Identify the letter of the choice that best matches the phrase or definition.
a. Cloud computing
b. Internet Business Services (IBS)
c. Managed hosting
d. .NET
e. Screen generators
f. Physical design
Copyright Cengage Learning. Powered by Cognero. Page 12
Name: Class: Date:
g. Logical design
h. Web 2.0
i. Benchmark testing
j. Systems requirement document
71. This can be viewed as an online Software as a Service (SaaS) and data environment supported by supercomputer
technology.
ANSWER: a
72. This describes a second generation of the web that will enable people to collaborate, interact, and share information
much more effectively.
ANSWER: h
74. This is attractive to customers because it offers online data center support, mainframe computing power for mission-
critical functions, and universal access via the Internet.
ANSWER: b
76. This is a good way to measure relative performance of two or more competing products in a standard environment.
ANSWER: i
77. This is like a contract that identifies what the system developers must deliver to users.
ANSWER: j
78. Some user applications use this to allow users to design their own data entry forms.
ANSWER: e
80. This is a design that does not address the actual methods of implementation.
ANSWER: g
Essay
company must turn over sensitive data to an external service provider and trust the provider to maintain
security, confidentiality, and quality. Also, before outsourcing, a company must carefully review issues
relating to insurance, potential liability, licensing and information ownership, warranties, and disaster
recovery.
Most important, a company considering outsourcing must realize that the solution can be only as good as the
outsourcing firm that provides the service. A dynamic economy can give rise to business failures and
uncertainty about the future. In this climate, it is especially important to review the history and financial
condition of an outsourcing firm before making a commitment.
Mergers and acquisitions also can affect outsourcing clients. For example, after their merger, Compaq and
Hewlett-Packard restructured and streamlined the products and services offered by the new company. Even
with large, financially healthy firms such as these, a merger or acquisition can have some impact on clients
and customers. If stability is important, an outsourcing client should consider these issues.
Outsourcing can be especially attractive to a company whose volume fluctuates widely, such as a defense
contractor. In other situations, a company might decide to outsource application development tasks to an IT
consulting firm if the company lacks the time or expertise to handle the work on its own. Outsourcing
relieves a company of the responsibility of adding IT staff in busy times and downsizing when the workload
lightens. A major disadvantage of outsourcing is that it raises employee concerns about job security. Talented
IT people usually prefer positions where the firm is committed to in-house IT development — if they do not
feel secure, they might decide to work directly for the service provider.
1. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as
part of a team.
a. True
b. False
ANSWER: True
2. Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.
a. True
b. False
ANSWER: True
3. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar
errors.
a. True
b. False
ANSWER: True
4. Commercial software packages must undergo unit and integration testing similar to that of in-house developed systems,
although system testing usually is not performed.
a. True
b. False
ANSWER: False
5. The skill set required to develop documentation usually is the same as that required to develop a system.
a. True
b. False
ANSWER: False
6. Effective online documentation is an important productivity tool because it empowers users and reduces the time that
IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.
a. True
b. False
ANSWER: True
7. Most webinars are web-based broadcasts that allow a user to download multimedia files to a PC or portable device.
a. True
b. False
ANSWER: False
8. Data conversion is easier when a new system replaces a manual system because all data can be entered manually,
unless it must be scanned.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:
9. To minimize the need to require information from two different systems, cyclical information systems usually are
converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.
a. True
b. False
ANSWER: True
10. Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system
at any given time.
a. True
b. False
ANSWER: False
11. The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies
with user objectives, and produces the anticipated benefits.
a. True
b. False
ANSWER: True
13. If modules are loosely coupled, one module is linked to internal logic contained in another module.
ANSWER: False - tightly coupled
14. Podcasts can be prescheduled, made available on demand, or delivered as automatic updates.
ANSWER: True
Multiple Choice
15. The main objective of _____ is to avoid problems or to identify them as soon as possible.
a. direct cutover
b. quality assurance
c. application development
d. cohesion
ANSWER: b
16. To achieve better, faster, and less expensive methods of software development, _____ designed the Capability
Maturity Model (CMM), which improves quality, reduces development time, and cut costs.
a. International Organization for Standardization (ISO)
b. Software Engineering Institute (SEI)
c. Open Database Connectivity (ODBC)
d. Center for the Application of Information Technologies (CAIT)
ANSWER: b
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:
17. The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and
systems development into a much larger framework.
a. the Department of Defense (DoD) model
b. the Thousand-Yard Model
c. Open Database Connectivity (ODBC) model
d. Capability Maturity Model Integration (CMMI)
ANSWER: d
18. _____ requires that a software supplier document all testing and maintain records of test results.
a. International Organization for Standardization (ISO)
b. Software Engineering Institute (SEI)
c. Open Database Connectivity (ODBC)
d. Center for the Application of Information Technologies (CAIT)
ANSWER: a
19. _____ is the process of constructing the programs and code modules that serves as the building blocks of an
information system.
a. Application structuring
b. Application analysis
c. Application development
d. Application virtualization
ANSWER: c
20. A _____ consists of related program code organized into small units that are easy to understand and maintain.
a. node
b. stub
c. decision tree
d. module
ANSWER: d
21. _____ graphically represent the logical rules and interaction between program modules using a series of symbols
connected by arrows.
a. Training plans
b. Acceptance tests
c. Flowcharts
d. Simulations
ANSWER: c
22. Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed
structure.
a. top-down approach
b. test plan
c. training plan
d. integrated approach
Copyright Cengage Learning. Powered by Cognero. Page 3
Name: Class: Date:
ANSWER: a
23. A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with
arrows and other symbols that provide additional information.
a. flowchart
b. data module
c. structure chart
d. subordinate module
ANSWER: c
24. In the given figure, a higher-level module, called a _____, directs lower-level modules.
a. library module
b. data module
c. subordinate module
d. control module
ANSWER: d
26. The given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a
Copyright Cengage Learning. Powered by Cognero. Page 4
Name: Class: Date:
27. In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another.
a. pilot
b. status flag
c. open loop
d. unit plan
ANSWER: b
28. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which
subordinate modules will be invoked.
a. method
b. condition
c. class
d. attribute
ANSWER: b
29. In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated.
a. pie
b. status flag
c. loop
d. freeform
ANSWER: c
32. In sequence, the four steps typically followed to create a structure chart are _____.
Copyright Cengage Learning. Powered by Cognero. Page 5
Name: Class: Date:
a. reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and
conditions; and analyzing the structure chart and the data dictionary
b. identifying modules and relationships; adding couples, loops, and conditions; analyzing the structure chart and
the data dictionary; and reviewing the data flow diagrams (DFDs)
c. adding couples, loops, and conditions; analyzing the structure chart and the data dictionary; reviewing the data
flow diagrams (DFDs); and identifying modules and relationships
d. analyzing the structure chart and the data dictionary; reviewing the data flow diagrams (DFDs); identifying
modules and relationships; and adding couples, loops, and conditions
ANSWER: a
33. A class diagram includes the class _____, which represent the program logic.
a. attributes
b. events
c. methods
d. characters
ANSWER: c
34. A class diagram includes the class _____, which describe the characteristics of objects in the class.
a. methods
b. keys
c. events
d. attributes
ANSWER: d
35. In _____, two programmers work on the same task on the same computer; one drives while the other navigates.
a. pair programming
b. multitasking
c. dual tasking
d. driver programming
ANSWER: a
36. _____ is the process of reviewing a program code to spot logic errors, which produce incorrect results.
a. Desk checking
b. Direct cutover examination
c. Results walkthrough
d. Cohesion assurance
ANSWER: a
37. Many organizations require a more formal type of desk checking called _____.
a. a control module
b. integration testing
c. a structured walkthrough
d. a data couple
ANSWER: c
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:
39. The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate
abnormally, and logic errors that could have been missed during desk checking.
a. unit testing
b. integration testing
c. functional testing
d. global testing
ANSWER: a
40. During _____, programmers must test programs that interact with other programs and files separately before they are
integrated into the system.
a. unit testing
b. integrated testing
c. acceptance testing
d. functional testing
ANSWER: a
41. In a technique called _____, the programmer simulates each program outcome or result and displays a message to
indicate whether or not the program executed successfully.
a. modular testing
b. stub testing
c. acceptance testing
d. unit testing
ANSWER: b
42. Which of the following is specified by the detailed procedures in a test plan?
a. The result of the final test of all programs
b. How a separate operational and test environment is prepared
c. The test data to be used
d. Who will work with the new system and ensure that all necessary features have been included
ANSWER: c
43. Testing two or more programs that depend on each other is called _____.
a. integration testing
b. unit testing
c. acceptance testing
d. system testing
Copyright Cengage Learning. Powered by Cognero. Page 7
Name: Class: Date:
ANSWER: a
44. Successful completion of system testing is the key to user and management approval, which is why system tests
sometimes are called _____.
a. integrated tests
b. modular tests
c. unit tests
d. acceptance tests
ANSWER: d
45. After completing integration testing, a systems analyst must perform _____, which involves the entire information
system and includes all typical processing situations.
a. functional testing
b. unit testing
c. stub testing
d. system testing
ANSWER: d
47. System developers use _____ to document and trail program defects, code changes, and replacement code.
a. bug tracking software
b. the obstruction generator
c. fault promotion analysis
d. the defect distribution policy
ANSWER: a
c. contains all the information needed for users to process and distribute online and printed output
d. consists of instructions and information to users who will interact with the system
ANSWER: d
50. The environment for the actual system operation is called the _____.
a. production environment
b. exploratory environment
c. functional environment
d. globalized environment
ANSWER: a
51. When there are no system problems to be corrected or authorized enhancements to be made, access to the operational
environment is limited to _____ and must strictly be controlled.
a. systems analysts
b. users
c. programmers
d. managers
ANSWER: b
52. A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable
device.
a. webinar
b. tutorial
c. podcast
d. data frame
ANSWER: c
53. When developing a training program, which of the following guidelines should be kept in mind?
a. Train people individually.
b. Select the most effective place to conduct the training.
c. Develop a single training program for distinct employee groups.
d. Provide only hands-on experience training.
ANSWER: b
54. Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others.
a. structured walkthrough
b. train-the-trainer
c. direct cutover
d. top-down design
ANSWER: b
55. When training is complete, many organizations conduct a full-scale test, or _____, which is a dress rehearsal for users
and IT support staff.
a. a parallel operation
b. a pre-implementation evaluation
c. data conversion
d. simulation
ANSWER: d
56. During _____, existing data is loaded into the new system.
a. data visualization
b. data conversion
c. data collision
d. data normalization
ANSWER: b
57. _____ is the process of putting a new information system online and retiring the old system.
a. System integration
b. Online system documentation
c. System override
d. System changeover
ANSWER: d
59. As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new
system to occur immediately when the new system becomes operational.
a. phased operation
b. parallel operation
c. pilot operation
d. direct cutover
ANSWER: d
60. As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new
information systems operate fully for a specific period.
a. phased operation
b. parallel operation
c. pilot operation
d. direct cutover
ANSWER: b
62. As the accompanying figure illustrates, the _____ changeover method allows the new system to be implemented in
stages, or modules.
a. phased operation
b. parallel operation
c. pilot operation
d. direct cutover
ANSWER: a
63. At the end of the systems implementation phase, the final report to management should include _____.
a. final versions of all system documentation
b. hardware efficiency and platform performance
c. adequacy of system controls and security measures
d. quality and effectiveness of training
ANSWER: a
64. Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module
passes to another. What symbol is used for a data couple?
a. An arrow with a filled circle
b. An arrow with an empty circle
c. A line with a diamond on one end
d. A line with a diamond on both ends
ANSWER: b
65. Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate
modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition?
a. An arrow with a filled circle
b. An arrow with an empty circle
c. A line with a diamond on one end
d. A line with a diamond on both ends
ANSWER: c
67. Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together
correctly. What is one of the names of this type of testing?
a. Integration testing
b. System testing
c. Unit testing
d. Stub testing
ANSWER: a
Multiple Response
68. In a top-down design, the overall objectives of a system are broken down into _____ in a process called partitioning.
a. subsystems
b. flags
c. modules
d. pilot sites
ANSWER: a, c
ANSWER: a, c, d
Matching
Identify the letters of the choices that best match the sentence or definitions.
a. Training plan b. Phased
c. Data conversion d. Parallel
e. Release plan f. Pseudocode
g. Operational h. Top-down
i. Coding
71. This is not language-specific and can be used to describe a software module in plain English without requiring strict
syntax rules.
ANSWER: f
72. This approach is also called modular design, and it is similar to constructing a leveled set of data flow diagrams
(DFDs).
ANSWER: h
73. In agile application development, this specifies when user stories will be implemented.
ANSWER: e
74. A separate test environment is necessary to maintain system security and integrity and protect this kind of
environment.
ANSWER: g
76. Depending on the system, this can be done before, during, or after the operational environment is complete.
ANSWER: c
77. This kind of operation is an inappropriate changeover method when two systems perform different functions or if a
new system involves a new method of business operations.
ANSWER: d
78. With this kind of operation, part of the system is given to all users.
ANSWER: b
79. It is the process of turning program logic into specific instructions that a computer system can execute.
ANSWER: i
Essay
to identify the processes and methods, the program modules are identified and control-subordinate
relationships determined, symbols for couples and loops are added, and the structure chart is analyzed to
ensure that it is consistent with the system documentation.
STEP 1. REVIEW THE DFDS: The first step is to review all DFDs for accuracy and completeness,
especially if changes have occurred since the systems analysis phase. If object models were also developed,
they should be analyzed to identify the objects, the methods that each object must perform, and the
relationships among the objects. A method is similar to a functional primitive and requires code to implement
the necessary actions.
STEP 2. IDENTIFY MODULES AND RELATIONSHIPS: Working from the logical model, functional
primitives or object methods are transformed into program modules. When analyzing a set of DFDs,
remember that each DFD level represents a processing level. If DFDs are being used, one works way down
from the context diagram to the lower-level diagrams, identifying control modules and subordinate modules,
until the functional primitives are reached. If more cohesion is desired, processes can be divided into smaller
modules that handle a single task.
STEP 3. ADD COUPLES, LOOPS, AND CONDITIONS: Next, couples, loops, and conditions are added
to the structure chart. If DFDs are being used, the data flows and the data dictionary can be reviewed to
identify the data elements that pass from one module to another. In addition to adding the data couples,
control couples are added where a module is sending a control parameter, or flag, to another module. Loops
and condition lines that indicate repetitive or alternative processing steps are also added. If an object model
was developed, the class diagrams and object relationship diagrams can be reviewed to be sure that the
interaction among the objects is fully understood.
STEP 4. ANALYZE THE STRUCTURE CHART AND THE DATA DICTIONARY:
At this point, the structure chart is ready for careful analysis. Each process, data element, or object method
should be checked to ensure that the chart reflects all previous documentation and that the logic is correct.
All modules should be strongly cohesive and loosely coupled. Often, several versions of the chart must be
drawn. Some CASE tools can help analyze the chart and identify problem areas.
1. As enterprise-wide information systems grow more complex, configuration management becomes trivial.
a. True
b. False
ANSWER: False
3. In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.
a. True
b. False
ANSWER: False
4. The hardening process that makes a system more secure is fully automatic.
a. True
b. False
ANSWER: False
5. In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.
a. True
b. False
ANSWER: False
6. One highly publicized form of social engineering is called post texting, which is a method of obtaining personal
information under false pretenses.
a. True
b. False
ANSWER: False
7. In dumpster diving attacks, an intruder raids desks or trash bins for valuable information.
a. True
b. False
ANSWER: False
8. Wrapping refers to the practice of storing backup media away from the main business location, in order to mitigate the
risk of a catastrophic disaster, such as a flood, fire, or earthquake.
a. True
b. False
ANSWER: False
9. Retention periods of backups can be a specific number of months or years, depending on legal requirements and
company policy.
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:
a. True
b. False
ANSWER: True
10. In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show
that a certain level of education has been achieved.
a. True
b. False
ANSWER: True
11. Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
ANSWER: False - increase
13. When network traffic is encrypted, it is invisible and its content and purpose are masked.
ANSWER: False - visible
Multiple Choice
14. The systems support and _____ phase begins when a system becomes operational and continues until the system
reaches the end of its useful life.
a. implementation
b. verification
c. security
d. testing
ANSWER: c
15. If significant changes take place in an existing system or if a new version is released, the IT department might develop
a _____.
a. user training package
b. user presence software
c. maintenance module
d. utility index
ANSWER: a
16. A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do
their jobs.
a. help desk
b. white spot
c. maintenance software module
d. utility point
ANSWER: a
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:
17. A help desk can boost its productivity by using _____, which allows IT staff to take over a user’s workstation and
provide support and troubleshooting.
a. high-level synthesis
b. wireless fidelity
c. word editing software
d. remote control software
ANSWER: d
18. _____ costs include expenses for items such as supplies, equipment rental, and software leases.
a. Operational
b. Corrective
c. Maintenance
d. Adaptive
ANSWER: a
19. _____ expenses vary significantly during a system’s operational life and include spending to support maintenance
activities.
a. Secure
b. Maintenance
c. Principal
d. Capital
ANSWER: b
20. _____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the
system to changing requirements; and making the system operate more efficiently.
a. Team building activities
b. Elicitation activities
c. Maintenance activities
d. Testing activities
ANSWER: c
21. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because
problems must be detected, investigated, and resolved by _____.
a. corrective maintenance
b. adaptive maintenance
c. perfective maintenance
d. obsolete maintenance
ANSWER: a
22. As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and
involve minor _____ maintenance.
a. corrective
b. adaptive
c. perfective
d. preventive
ANSWER: b
23. As shown in the accompanying figure, near the end of a system’s useful life, _____ when it becomes clear that a
company plans to replace the system.
a. adaptive, corrective, and perfective maintenance expenses all increase rapidly
b. perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease
c. adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
d. adaptive, corrective, and perfective maintenance expenses all decrease rapidly
ANSWER: c
27. Perfective maintenance usually is cost effective _____ a system’s operational life.
a. early in
b. during the middle of
c. during the end of
d. throughout
ANSWER: b
29. In maintenance management, _____ means examining the whole in order to learn about the individual elements.
a. synthesis
b. adoption
c. analysis
d. elucidation
ANSWER: c
30. In maintenance management, _____ involves studying the parts of a system to understand the overall system.
a. synthesis
b. adoption
c. fusion
d. elucidation
Copyright Cengage Learning. Powered by Cognero. Page 5
Name: Class: Date:
ANSWER: a
31. Many IT departments also use a job title of _____ to designate positions that require a combination of systems
analysis and programming skills.
a. tester/programmer
b. strategist/analyst
c. programmer/analyst
d. designer/debugger
ANSWER: c
32. _____ is a process for controlling changes in system requirements during software development.
a. Data management
b. Disk management
c. Configuration management
d. Email management
ANSWER: c
33. A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
a. tester
b. programmer
c. system validator
d. system administrator
ANSWER: d
34. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance
changes is version _____.
a. 2.1
b. 1.1
c. 0.1
d. 2.1
ANSWER: b
36. When a new version of a system is installed, the prior release is _____, or stored.
a. archived
b. deleted
c. discontinued
d. reinstalled
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:
ANSWER: a
37. A _____ is a formal reference point that measures system characteristics at a specific time.
a. feature line
b. baseline
c. product point
d. viewport
ANSWER: b
38. The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary
system requirements and design constraints.
a. functional baseline
b. extension baseline
c. allocated baseline
d. product baseline
ANSWER: a
39. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the
project, and includes testing and verification of all system requirements and features.
a. functional baseline
b. operational baseline
c. allocated baseline
d. product baseline
ANSWER: c
40. The _____ describes a system at the beginning of system operation and includes the results of performance and
acceptance tests for the operational system.
a. functional baseline
b. operational baseline
c. allocated baseline
d. product baseline
ANSWER: d
41. _____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and
applying corrective action.
a. Benchmark testing
b. Throughput management
c. Responsive testing
d. Fault management
ANSWER: d
42. To measure system performance, companies use _____, which uses a set of standard tests on one system to compare
its performance and capacity to that of other systems.
a. metric analysis
b. benchmark testing
Copyright Cengage Learning. Powered by Cognero. Page 7
Name: Class: Date:
c. threat analysis
d. allocation testing
ANSWER: b
43. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions
processed in a given time period, the number of records accessed, and the volume of online data.
a. metrics
b. wireframes
c. viewports
d. baselines
ANSWER: a
44. _____ is the overall time between a request for system activity and the delivery of the response.
a. Response time
b. Throughput time
c. Refresh rate
d. Base rate
ANSWER: a
45. _____ describes the amount of data that a system can transfer in a fixed time period.
a. Latency
b. Resolution
c. Dimensionality
d. Bandwidth
ANSWER: d
46. _____ measures actual system performance under specific circumstances and is affected by network loads and
hardware efficiency.
a. Throughput
b. Resolution
c. Dimensionality
d. Latency
ANSWER: a
47. _____ measures the time between submitting a request for information and the fulfillment of the request.
a. Bandwidth
b. Turnaround time
c. Throughput
d. Frequency
ANSWER: b
48. _____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the
resources needed to provide desired levels of service.
a. Restructuring
b. Capacity planning
c. Resource sizing
d. Reorganizing
ANSWER: b
49. _____ protects information from unauthorized disclosure and safeguards privacy.
a. Availability
b. Integrity
c. Confidentiality
d. Accessibility
ANSWER: c
50. _____ prevents unauthorized users from creating, modifying, or deleting information.
a. Availability
b. Integrity
c. Confidentiality
d. Evacuation
ANSWER: b
51. _____ ensures that authorized users have timely and reliable access to necessary information.
a. Availability
b. Integrity
c. Confidentiality
d. Concealability
ANSWER: a
52. The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.
a. security policy
b. risk policy
c. threat report
d. concealment report
ANSWER: a
d. Risk control
ANSWER: a
55. _____ develops safeguards that reduce risks and their impact.
a. Risk assessment
b. Risk verification
c. Risk identification
d. Risk control
ANSWER: d
59. In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.
a. proxy
b. risk
c. firewall
d. warning
ANSWER: b
60. _____, a risk control strategy, eliminates risks by adding protective safeguards.
a. Avoidance
b. Acceptance
c. Conveyance
d. Transference
ANSWER: d
Copyright Cengage Learning. Powered by Cognero. Page 10
Name: Class: Date:
61. A _____ is the main line of defense between a local network, or intranet, and the Internet.
a. malware
b. firewall
c. spyware
d. threat
ANSWER: b
62. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an
unauthorized attempt to increase permission levels.
a. privilege escalation attack
b. denial-of-service attack
c. malware penetration attack
d. identity management invasion
ANSWER: a
64. Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does
George categorize this threat?
a. Human error
b. Technical obsolescence
c. Service failure
d. Espionage
ANSWER: b
66. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate
user and requested that his password to his company account be changed. How does George categorize this incident?
a. Social engineering
b. Mail bombing
c. Spoofing
d. Privilege escalation
ANSWER: a
Multiple Response
68. A(n) _____ can prevent an unauthorized person from booting a computer by using a CD-ROM or USB device.
a. boot-level password
b. application-level password
c. BIOS-level password
d. power-on password
ANSWER: a, c, d
69. _____ is concerned with managerial policies and controls that ensure secure operations.
a. Procedural security
b. Network security
c. Operational security
d. Application security
ANSWER: a, c
Matching
Identify the letters of the choices that best match the phrases or definitions.
a. Private key encryption b. Public key encryption
c. Network interface d. Asset
e. Mitigation f. Transference
g. Attack h. Security
i. Keystroke logger j. Software reengineering
71. A risk control strategy that shifts risks to another asset or party
ANSWER: f
73. Protects the system and keeps it safe, free from danger, and reliable
ANSWER: h
74. Combination of hardware and software that allows computers to interact with a network
ANSWER: c
75. A risk control strategy that reduces the impact of a risk by careful planning and preparation
ANSWER: e
77. Uses analytical techniques to identify potential quality and performance improvements in an information system
ANSWER: j
78. Might include company hardware, software, data, networks, people, or procedures
ANSWER: d
79. Records everything that is typed into the keyboard, including passwords, while the system continues to function
normally
ANSWER: i
Essay
80. List at least eight different tasks a service desk staff member might have to perform during a typical day.
ANSWER: The different tasks performed by a service desk staff member are as follows:
• Show a user how to create a data query or report that displays specific business information
• Resolve network access or password problems
• Demonstrate an advanced feature of a system or a commercial package
• Help a user recover damaged data
• Offer tips for better operation
• Explain an undocumented software feature
• Show a user how to use web conferencing
• Explain how to access a company’s intranet or the Internet
• Assist a user in developing a simple database to track time spent on various projects
• Answer questions about software licensing and upgrades
• Provide information about system specifications and the cost of new hardware or software
• Recommend a system solution that integrates data from different locations to solve a business problem
• Provide hardware support by installing or reconfiguring devices such as scanners, printers, network cards,
wireless devices, optical drives, backup devices, and multimedia systems
Copyright Cengage Learning. Powered by Cognero. Page 13
Name: Class: Date:
• Show users how to maintain data consistency and integrity among a desktop computer, a notebook
computer, and a handheld computer or smartphone
• Troubleshoot software issues via remote control utilities
81. What is capacity planning? Include an explanation of what-if analysis in your answer.
ANSWER: Capacity planning is a process that monitors current activity and performance levels, anticipates future
activity, and forecasts the resources needed to provide desired levels of service.
The first step in capacity planning is to develop a current model based on the system’s present workload and
performance specifications. Then future demand and user requirements are projected over a one- to three-
year time period. The model is analyzed to see what is needed to maintain satisfactory performance and meet
requirements. To assist in the process, a technique called what-if analysis can be used.
What-if analysis varies one or more elements in a model in order to measure the effect on other elements. For
example, what-if analysis might be used to answer questions such as: How will response time be affected if
more client workstations were added to the network? Will the client/server system be able to handle the
growth in sales from the new website? What will be the effect on server throughput if more memory is
added?
Powerful spreadsheet tools can also assist in performing what-if analysis. For example, Microsoft Excel
contains a feature called Goal Seek that determines what changes are necessary in one value to produce a
specific result for another value.
During plan capacity, detailed information is needed about the number of transactions; the daily, weekly, or
monthly transaction patterns; the number of queries; and the number, type, and size of all generated reports.
If the system involves a LAN, network traffic levels must be estimated to determine whether or not the
existing hardware and software can handle the load. If the system uses a client/server design, performance
and connectivity specifications must be examined for each platform.
Most important, an accurate forecast of future business activities is needed. If new business functions or
requirements are predicted, contingency plans should be developed based on input from users and
management. The main objective is to ensure that the system meets all future demands and provides effective
support for business operations. Some firms handle their own capacity planning, while others purchase
software.