10th Edition by Kendall Kenneth and Kendall Julie
Because it focuses on processes that transform data into useful information,
structured analysis is called a(n) ____ technique. - ANSWER: process-centered
Structured analysis is a traditional systems development technique that uses a series
of phases, called the ____, to plan, analyze, design, implement, and support an
information system - ANSWER: SDLC
In a typical company organizational model, middle managers ____. - ANSWER:
provide direction, necessary resources, and performance feedback to supervisors
and team leaders
In object-oriented design, built-in processes called ____ can change an object's
properties. - ANSWER: Methods
____ enabled computer-to-computer transfer of data between companies, usually
over private telecommunications networks. - ANSWER: EDI
____ provides vital protection and maintenance services for system software and
hardware, including enterprise computing systems, networks, transaction processing
systems, and corporate IT infrastructure. - ANSWER: Systems support and secuirty
Systems analysts use a ____ to graphically represent company operations and
information needs. - ANSWER: business process model
____ refers to the combination of hardware, software, and services that people use
to manage, communicate, and share information. - ANSWER: Information
Technology
Over 40 years ago, a concept called Moore's Law accurately predicted that computer
processing power would double about every ____. - ANSWER: 24 Months
Which of the following is one of the main sectors of e-commerce? - ANSWER: B2C
Examples of company-wide applications, called ____, include order processing
systems, payroll systems, and company communications networks. - ANSWER:
enterprise applications
For complex operations, analysts apply computer-based modeling tools that use a
standard language called ____. - ANSWER: business process modeling notation
(BPMN)
,A ____, or requirements model, describes the information that a system must
provide. - ANSWER: business model
____ software controls the flow of data, provides data security, and manages
network operations. - ANSWER: System
User productivity systems ____. - ANSWER: include e-mail, voice mail, fax, video and
Web conferencing, word processing, automated calendars, database management,
spreadsheets, desktop publishing, presentation graphics, company intranets, and
integrated mobile computing systems
Whereas structured analysis treats processes and data as separate components,
____ combines data and the processes that act on the data into things called objects.
- ANSWER: 0-0
In object-oriented analysis, an object is a member of a(n) ____, which is a collection
of similar objects. - ANSWER: class
Business support systems ____. - ANSWER: provide job-related information support
to users at all levels of a company
A(n) ____ investigates, analyzes, designs, develops, installs, evaluates, and maintains
a company's information systems. - ANSWER: systems analyst
TP systems are inefficient because they process a set of transaction-related
commands individually rather than as a group. - ANSWER: False
In the systems planning phase, a key part of the preliminary investigation is a
feasibility study that reviews anticipated costs and benefits and recommends a
course of action based on operational, technical, economic, and time factors. -
ANSWER: True
Because they focus on a longer time frame, middle managers need less detailed
information than top managers, but somewhat more than supervisors who oversee
day-to-day operations. - ANSWER: False
The responsibilities of a systems analyst at a small firm are exactly the same as those
at a large corporation. - ANSWER: False
A scalable design can expand to meet new business requirements and volumes. -
ANSWER: True
When using a ____ diagram to investigate causes of a problem, an analyst first states
the problem and then draws a main bone with sub-bones that represent possible
causes of the problem. - ANSWER: fishbone
, Strategic planning starts with a ____ that reflects the firm's vision, purpose, and
values.. - ANSWER: Mission Statement
In a preliminary investigation report, the ____ contain(s) a brief description of the
system, the name of the person or group performing the investigation, and the name
of the person or group who initiated the investigation. - ANSWER: Introduction
____ is an example of a discretionary project. - ANSWER: Creating a new report for a
user
Systems development typically starts with a ____. - ANSWER: systems request,
followed by a preliminary investigation, which includes a feasibility study
To avoid the problem of project creep, ____. - ANSWER: define project scope as
clearly as possible
A feasibility study includes tests for ____ feasibility, which means that a proposed
system will be used effectively after it has been developed. - ANSWER: operational
A(n) ____ is an example of an intangible benefit. - ANSWER: user-friendly system
that improves employee job satisfaction
A feasibility study includes tests for ____ feasibility, which refers to the practical
resources needed to develop, purchase, install, or operate the system. - ANSWER:
technical
A survey is ____, generally takes less time, and can involve a broad cross-section of
people. - ANSWER: not as flexible as a series of interviews, but it is less expensive
A systems request form should ____. - ANSWER: have clear instructions
Of the measures of feasibility in the accompanying figure, issues that relate to ____
include "Has management established a firm timetable for the project?" and "Will a
project manager be appointed?" - ANSWER: schedule feasibility
Projects where management has no choice in implementing them are called ____
projects. - ANSWER: nondiscretionary
Determining the project ____ means to define the boundaries, or extent, of a project
— being as specific as possible. - ANSWER: scope
Many companies implement ____ systems that integrate all customer-related events
and transactions. - ANSWER: CRM
Hardware-based security controls include ____. - ANSWER: None