Testbank 305
Testbank 305
Testbank 305
TRUE/FALSE
1. An information system often includes the software, the database, and the related manual
processes.
4. A systems development project is always a formal activity with a beginning and an end.
6. Agile refers to the flexibility that programmers have in taking on various assignments.
11. The System Vision Document is usually developed before the project actually begins.
13. A Work Breakdown Structure is the first step in building a project schedule.
14. During analysis activities the project team build two types of diagrams: Use Case diagram and
Package diagram.
15. The purpose of a workflow diagram is to document the internal steps of a use case.
17. The database is designed using information from the class diagram.
18. All the classes in the Design Class Diagram are used to define the database tables.
20. Usually the final step in a given iteration is to deploy part of the system.
21. One approach to the SDLC can be described using five core processes.
22. An iteration normally only includes three or four of the core processes.
23. Sometimes the activities within Core Process one are completed before the actual project starts.
MULTIPLE CHOICE
1. An information system consists of
a. software, database, c. software, hardware,
and manual and database
processes
b. software, hardware, d. applications, screens,
and network and database
ANS: A PTS: 1 REF: p4
2. A person that functions as an architect to plan, capture the vision, and understand the needs for a
new system is often called a ____________________.
a. programmer analyst c. systems analyst
b. software engineer d. software developer
ANS: C PTS: 1 REF: p5
3. Those activities that enable a person to describe in the detail the system that solves the need is
called __________________.
a. architectural design c. systems analysis
b. systems design d. high-level design
ANS: B PTS: 1 REF: p5
8. Determine the major subsystems and assigning them to an iteration is done in which Core
Process?
a. 1 d. 4
b. 2 e. 5
c. 3 f. 6
ANS: B PTS: 1 REF: p11
9. Determining team members and assigning responsibilities is done in which Core Process?
a. 1 d. 4
b. 2 e. 5
c. 3 f. 6
ANS: B PTS: 1 REF: p11
10. Two of the primary elements that are included in a Work Breakdown Structure include:
a. subsystem iteration c. list of tasks and
assignments and assigned resources
estimated effort
b. sequence of tasks and d. list of tasks and
estimated effort estimated effort
ANS: D PTS: 1 REF: p12
11. The primary difference between a work breakdown structure and a work sequence draft is that the
work sequence draft shows ___________________.
a. the additionally c. the day to day
deployment tasks assignments
b. the estimated effort d. the sequence of tasks
of tasks
ANS: D PTS: 1 REF: p13
15. The diagram that is most effective in describing the internal steps of a use case is _______.
a. a package diagram c. a use case diagram
b. a workflow diagram d. a class diagram
ANS: B PTS: 1 REF: p17-18
16. Performing in-depth fact finding to understand details is done as part of which Core Process?
a. 1 d. 4
b. 2 e. 5
c. 3 f. 6
ANS: C PTS: 1 REF: p16
17. In a workflow diagram, the arrows that cross the center line are used to identify what?
a. Relationships c. User key strokes
between objects
b. Actor and use case d. Screens and Reports
relationships
ANS: D PTS: 1 REF: p17
19. Detailed design is the thought process of how to program each _______.
a. use case c. package
b. screen or report d. subsystem
ANS: A PTS: 1 REF: p21
21. To design the database schema, information from which diagram is the most important?
a. network diagram c. design class diagram
b. package diagram d. class diagram
ANS: D PTS: 1 REF: p20
23. A diagram that shows the overall structure of a system as it exists after it is deployed is called
what?
a. Architectural c. System and
configuration subsystem diagram
diagram
b. Architectural class d. Design class diagram
diagram
ANS: A PTS: 1 REF: p21
27. What is the single activity that usually requires the most time during a project?
a. Programming c. Meeting with users
b. Acceptance testing d. Design the screens
and reports
ANS: A PTS: 1 REF: p13
MULTIPLE RESPONSE
1. Which two answers identify the two middle core processes, i.e. core process 3 and 4? (choose
two)
a. Design the c. Build and test the
components system
b. Plan and monitor the d. Understand the
project details of the problem
ANS: A, D PTS: 1 REF: p6
3. What are the three parts of a System Vision Document ? (choose three)
a. Solution description d. Problem description
b. Estimated project e. System capabilities
costs
c. Project timetable or f. Business benefits
schedule
ANS: D, E, F PTS: 1 REF: p10
4. A work sequence draft provides three benefits to a project. Which of the following are included
in those benefits?
a. Assign resources to d. Add missing tasks
tasks
b. Provide task e. Anticipate resource
descriptions needs
c. Measure progress f. Schedule user
involvement
ANS: C, E PTS: 1 REF: p14
5. What are the first two models, e.g. diagrams that affect the entire system, that are built during the
Core Process to discover and understand the details?
a. Workflow diagram d. Class diagram
b. Work sequence e. Package diagram
diagram
c. Use case diagram f. Screen layouts
ANS: C, D PTS: 1 REF: p14
6. The final objective of systems design includes which of the following? (choose two)
a. To define the d. To define methods of
database classes
b. To define the user e. To define class
screens & reports attributes
c. To define the f. To define the
network structure interactions between
classes
ANS: D, F PTS: 1 REF: p20
COMPLETION
ANS:
app
App
PTS: 2 REF: p4
2. Those skills, steps, guides, and tools that support and lead up to the actual programming of the
system are referred to as ___________________.
ANS:
SA&D
systems analysis and design
Systems Analysis and Design
PTS: 2 REF: p5
3. A planned undertaking that has a beginning and an end and produces some result is called a
_________________.
ANS: project
PTS: 2 REF: p5
4. What is the term that is used to describe all the activities to build, launch, and maintain an
information system?
ANS:
SDLC
Systems Development Life Cycle
Systems development life cycle
systems development life cycle
PTS: 2 REF: p6
5. A development process where the system is grown piece by piece is called ____________.
PTS: 2 REF: p8
6. The primary output of Core Process one and which is used to get project approval is called
___________________.
ANS:
System Vision Document
system vision document
7. A document that identifies and lists all of the tasks to be completed within an iteration is called a
___________________.
ANS:
work breakdown structure
Work Breakdown Structure
8. A diagram that shows the method signatures in each class is called the _______.
ANS:
design class diagram
DCD
9. What is the name of the diagram that is often used to show the different layers of the system
(view layer, etc.)?
ANS:
Package Diagram
package diagram
10. What do we call the type of testing that the users perform to ensure that the system meets the
business requirements?
ANS:
User acceptance testing
User Acceptance Testing
Acceptance testing
Acceptance Testing
ESSAY
ANS:
1. Identify the problem
2. Plan and monitor the project
3. Discover and understand the problem (analysis)
4. Design the system components
5. Build, text, and integrate system components
6. Complete system test and deploy the system
2. List the three components that are included in a System Vision Document.
ANS:
1. Problem description
2. System capabilities
3. Business benefits
3. List the four steps required to conduct system test or user test.
ANS:
1. Create the test data
2. Conduct the test
3. Document the errors and issues
4. Fix the errors.
TRUE/FALSE
2. The reason an analyst uses many different models is that each relates to a different aspect of the
system.
3. Textual models are used to represent precise aspects of the system that can be best represented by
using formulas.
4. Sometimes a narrative description is the best form to use for recording information.
5. A key reason that modeling is important in system development is the complexity of describing
information systems.
6. Before gathering detailed information, and analyst identifies every type of stakeholder.
7. In the RMO CSMS project, customers are not considered stakeholders because it is not feasible to
interview them or use them in the project activities.
8. Core Process 3 involves defining in great detail what the information system needs to accomplish
in order to provide the organization with the desired benefits.
9. Beginning analysts often underestimate how much there is to learn about the work the users
perform.
10. A fact finding user interview can usually be completed in one comprehensive session.
12. The first and most important step in preparing for an interview is to determine who should be
involved.
13. Asking about error conditions usually is done in later interviews after the analyst understands and
documents the basic processing requirements.
14. A good way to remember the details of an interview is to use a tape recorder.
15. Reviewing existing documentation is a good idea for analysts because it is a dependable source of
accurate policies and procedures.
16. When observing business processes, it is not necessary to observe all the processes at the same
level of detail.
17. It is a good idea to observe user processes so that the analyst will know exactly how to build the
functions into the new system.
18. The term “I’ll know it when I see it” applies to one valid way to get requirements definition.
19. A decision point within an activity diagram may be shown with an activity symbol.
20. A synchronization bar in an activity diagram allows multiple agents or actors to participate in a
workflow in separate rows.
MULTIPLE CHOICE
1. The term technology architecture refers to
a. the software c. the combination of
resources which information systems
make up the and the hardware
information systems infrastructure
b. the hardware, d. the configuration of
network, and system the old technology
software and new technology
within an
organization
ANS: B PTS: 1 REF: p37
5. _______ requirements are based on the procedures and rules that the organization uses to run its
business.
a. Physical c. Logical
b. Functional d. System
ANS: B PTS: 1 REF: p42
6. _______ requirements are characteristics of the system other than the business procedures it must
support.
a. System c. Nonfunctional
b. Physical d. Implementation
ANS: C PTS: 1 REF: p43
9. _______ requirements are most often documented in graphical and textual models.
a. Security c. Technical
b. Nonfunctional d. Functional
ANS: D PTS: 1 REF: p45
10. Diagrams and schematic representations of some aspect of a system are examples of a ______
model.
a. logical c. mathematical
b. graphical d. textual
ANS: B PTS: 1 REF: p46
12. A series of formulas that describe technical aspects of a system is a(n) model.
a. textual c. graphical
b. descriptive d. mathematical
ANS: D PTS: 1 REF: p46
14. The term _______ refers to all the people who have an interest in the successful implementation
of the system.
a. users c. managers
b. clients d. stakeholders
ANS: D PTS: 1 REF: p47
15. Persons who regularly interact with the system as part of their jobs are called _______.
a. user stakeholders c. operational
stakeholders
b. client stakeholders d. executive
stakeholders
ANS: C PTS: 1 REF: p47
16. What type of stakeholders are those that do not use the system on day to day tasks, but use
information, such as reports, from the system.
a. Business stakeholders c. External stakeholders
b. Client stakeholders d. Executive
stakeholders
ANS: D PTS: 1 REF: p47
17. What do we call the person or group who provides funding for the development of the new
system?
a. Oversight committee c. Board of directors
b. Client d. Department head
ANS: B PTS: 1 REF: p47
18. The group that provides direction for the configuration of the new system in the existing
computing environment are called _______.
a. Technical c. System programmers
stakeholders
b. Support staff d. Operational
stakeholders
ANS: A PTS: 1 REF: p47
19. Clients play what role in the development of the new system?
a. Develop the project c. Define business
plan processes
b. Fund the project d. Lead the project team
ANS: B PTS: 1 REF: p47
20. Questionnaires can be useful in information gathering when users _____.
a. are widely distributed c. are not well-informed
geographically
b. need prompting to d. do not have time for
respond to questions interviews
ANS: A PTS: 1 REF: p54
21. Questions that have a simple, definitive answer are called _______ questions.
a. true/false c. open-ended
b. close-ended d. multiple choice
ANS: B PTS: 1 REF: p51
22. Which of the following is normally the most time-consuming and resource-expensive operation?
a. Building prototypes c. Researching vendor
solutions
b. Observing business d. Interview
processes stakeholders
ANS: D PTS: 1 REF: p49
28. Asking many detailed, probing questions during an initial interview usually _______.
a. makes the users c. can wait until follow-
uncomfortable up interviews
b. is necessary to d. indicates that the
understand the analyst does not
business process understand the
business
ANS: B PTS: 1 REF: p52
33. One of the dangers in researching vendor solutions is that users and analysts _______.
a. may discover and c. may discover
desire too many different methods to
unimportant “bells perform business
and whistles” processes
b. may not understand d. may want to buy one
the vendor solution of these solutions
prematurely
ANS: D PTS: 1 REF: p57
34. The term “I’ll know it when I see it” refers to what method of requirements definition.
a. Questionnaires c. Observing business
procedures
b. User interviews d. Collecting active user
comments
ANS: D PTS: 1 REF: p57
35. One way to show multiple, independent alternative paths within an activity diagram is with a
_______.
a. synchronization bar c. decision diamond
b. swimlane d. activity oval
ANS: C PTS: 1 REF: p58
MULTIPLE RESPONSE
1. The “+” in FURPS+ includes which of the following types of requirements? (choose two)
a. Supportability d. Nonfunctional
requirements requirements
b. Performance e. Design constraints
constraints
c. Reliability constraints f. User interface
requirements
ANS: A, E PTS: 2 REF: p43-44
2. Which are the major business themes that guide analysts in fact finding activities? (chose 3)
a. What are the business d. What are the
processes? objectives of a
business process?
(What should it
accomplish?)
b. Who performs the e. What is produced by
business processes? the business process?
c. How are the business f. What information is
processes performed? needed?
ANS: A, C, F PTS: 2 REF: p50
3. What are the two primary benefits of reviewing the documentation of existing inputs, outputs, and
procedures. (choose 2)
a. Have a repository of d. Help build models of
existing existing procedures
documentation
b. Obtain a preliminary e. Ensure complete
understanding documentation of
procedures
c. Encourages the users f. Serve as visual aids
to prepare for in interview
interviews discussions
ANS: B, F PTS: 2 REF: p55
4. Two benefits of researching vendor solutions include _______ and ______. (Choose two)
a. encouraging the users d. speeding up the
to buy a vendor development project
solution immediately
b. helping analysts e. informing senior
discover state of the management about
art solutions competitors
c. helping users f. reducing the risk of
generate new ideas implementing a new
for business functions system
ANS: B, C PTS: 1 REF: p56-57
5. Which two of the following are activities of Core Process 3? (choose two)
a. Gather detailed d. Define test data
information
b. Plan the project e. Develop user-
iterations interface dialogs
c. Build an iteration f. Develop architectural
schedule structure
ANS: A, E PTS: 2 REF: p40
COMPLETION
1. Core Process 3 is called “Discover and understand details.” Another term that is used to describe
these activities is _______ activities.
ANS:
analysis
Analysis
systems analysis
Systems Analysis
ANS:
usability
Usability
usability requirements
Usability requirements
ANS:
reliability requirements
Reliability requirements
reliability
Reliability
ANS:
Usability
usability
6. _______ requirements describe the dependability of a system such as service outages and
incorrect processing.
ANS:
Reliability
reliability
ANS:
Performance
performance
8. _______ requirements describe how access to the software application will be controlled and data
will be protected.
ANS:
Security
security
ANS:
Implementation
implementation
PTS: 2 REF: p44
10. _______ requirements describe interactions between systems, e.g. the method of communication
between one system and another system.
ANS:
Interface
interface
11. _______ requirements describe how a system is configured, monitored, maintained, and updated.
ANS:
Supportability
supportability
12. Use case diagrams, class diagrams, sequence diagrams are all examples of standard modeling
method?
ANS:
UML
Unified Modeling Language
Unified modeling language
13. Persons who have an interest in the successful implementation of the new system are called
_______.
ANS: stakeholders
14. Persons within an organization who have a significant interest in its operation are _______
stakeholders.
ANS: internal
15. Persons outside an organization’s control who interact with the system or who have an interest in
its operation are called _______ stakeholders.
ANS: external
ANS: closed-ended
ANS: open-ended
18. The most important and first step in preparing for an interview with a user is to establish the
____________________ of the interview.
ANS: objective
19. A _______ is the sequence of processing steps that completely handles one business transaction.
ANS: workflow
ANS:
activity diagram
workflow diagram
21. One way to show concurrent paths within an activity diagram is with a _______.
22. In order to show all the activities of a single agent or organizational unit together, a activity
diagram contains what construct?
ANS:
swimlane
swimlane heading
Swimlane
Swimlane heading
ANS:
1. Gather detailed information
2. Define requirements
3. Prioritize requirements
4. Develop user-interface dialogs
5. Evaluate requirements with users
ANS:
F = Functional requirements
U = Usability requirements
R = Reliability requirements
P = Performance requirements
S = Security requirements
+ = Other constraints including Design constraints, Implementation requirements, interface
requirements, physical requirements, supportability requirements.
ANS:
1. Interview users
2. Distribute questionnaires
3. Review documents
4. Observer users
5. Research vendor solutions
6. Collect active user comments
4. List five steps in the activity to interview users and other stakeholders.
ANS:
1. Prepare detailed questions
2. Meet with users
3. Discuss answers and procedures
4. Document answers
5. Follow-up on open issues
5. List the three major question themes that guide analysts in fact finding activities.
ANS:
1. What are the business processes?
2. How are the business processes performed?
3. What information is required?
TRUE/FALSE
1. The CRUD technique is often used to validate and enhance the list of use cases.
2. During the interviews in the user goal technique, the analyst should not try to influence the users
in discussing their work methods.
3. Before using the user goal technique the analyst must first identify and classify all the types of
system users.
4. One benefit of the event decomposition technique is that it helps to identify use cases at the right
level of detail.
6. The end product of the event decomposition technique is a list of use cases at the right level of
analysis.
7. When describing an external event, there is no need to worry about the person or thing causing
the event.
11. When a customer buys an item of merchandise using his store credit account, a separate event is
required to pay the store.
12. During analysis the analyst should be sure to identify system control events such as the user
logging in or out.
14. The CRUD technique is most useful as a cross-check along with other techniques.
15. When using the CRUD technique, data ownership by foreign systems is an important
consideration.
16. One way to determine whether an occurrence is an event or part of the interaction before or after
an event is by asking if any long pauses or intervals occur.
17. A state event is an event that occurs when something happens outside the system that triggers the
need for processing.
18. Real-time systems require the system to react immediately to things that are going on in the
environment.
19. The focus on external events is inappropriate when working with end users because discussing
events tends to confuse the issues.
20. The analyst begins identifying state events by asking about the specific deadlines that the system
must accommodate.
21. One technique used to help decide which events apply to controls is to assume that technology is
perfect.
22. An actor is a person that plays a particular role within a business process.
25. Another name for the “includes” relationship is the “uses” relationship.
MULTIPLE CHOICE
1. One technique to identify use cases is to ask users what they want to achieve with a particular
business procedure. This technique is called the ______ technique.
a. business procedure c. workflow
b. event decomposition d. user goal
ANS: D PTS: 1 REF: p69
3. Something that occurs at a specific time and place and should be remember by the system is
called a(n) _______.
a. use case c. user goal
b. elementary business d. event
process
ANS: D PTS: 1 REF: p71
4. The user goal technique normally begins by identifying, listing, and classifying _______ .
a. the system users c. the business
processes
b. the business events d. the system
stakeholders
ANS: A PTS: 1 REF: p69
5. The source of using the concept of events to define functional requirements was first emphasized
with _______ systems.
a. business c. real-time
b. operating d. batch
ANS: C PTS: 1 REF: p72
6. The type of event that occurs outside of the system is called a(n) _______.
a. outside event c. business event
b. external event d. temporal event
ANS: B PTS: 1 REF: p72
8. An occurrence at a specific time and place, which can be described and is worth remember, is
called a(n) _______.
a. business process c. requirement
b. event d. business transaction
ANS: B PTS: 1 REF: p71
9. A(n) _______ event occurs when something happens inside the system that triggers the need for
processing.
a. logical c. external
b. state d. temporal
ANS: B PTS: 1 REF: p73
13. The way to determine whether an occurrence is an event or part of the interaction before or after
the event is to ask the following question: _______?
a. Is the user finished c. Is all the data input?
with the task?
b. Is the system at rest? d. Is all the printing
completed?
ANS: B PTS: 1 REF: p74
15. Checks or safety procedures are put in place to protect the integrity of the system is referred to as
_______.
a. perfect technology c. system controls
assumption
b. risk control d. technology protection
assumption
ANS: C PTS: 1 REF: p75
16. The _______ indicates that events should be included during analysis only if the system would be
required to respond under ideal conditions.
a. perfect technology c. perfect processing
assumption control
b. ideal technology d. ideal processing
assumptions control
ANS: A PTS: 1 REF: p76
17. In using the event decomposition technique, which of the following is NOT a type of event that is
considered?
a. Event initiated by an c. Event initiated by a
external agent system change
b. Event initiated by a d. Event initiated by a
point in time user login
ANS: D PTS: 1 REF: p76
18. An important step in using the CRUD technique is to _______.
a. identify the system c. identify the business
controls events
b. identify the external d. identify the data
agents entities
ANS: D PTS: 1 REF: p78
21. The boundary between the automated portion of the system and the users of the system is called
the _______.
a. software boundary c. system boundary
b. application boundary d. automation boundary
ANS: D PTS: 1 REF: p81
22. In UML notation, the guillemets character is used to show what kind of notation?
a. classes c. relationships
b. subordinates d. stereotypes
ANS: D PTS: 1 REF: p83
23. The UML notation for the “includes” relationship is a(n) _______.
a. a solid arrow c. a straight line
b. a dashed arrow d. a dashed line
ANS: B PTS: 1 REF: p84
24. In UML notation the includes relationship connects two use cases. The use case that is
“included” use case is the one which _______ .
a. is connected to the c. cannot be determined
tail of an arrow
b. is connected to the d. is not connected to an
head of an arrow actor
ANS: B PTS: 1 REF: p83-84
25. The technique used to identify use cases based on external, temporal, and state events is the
_______.
a. user goals technique c. event decomposition
technique
b. list of nouns d. CRUD technique
technique
ANS: C PTS: 1 REF: p73-74
26. The level of analysis to use when identifying user goals is the _______.
a. external event level c. temporal event level
b. elementary business d. elementary activity
process level level
ANS: B PTS: 1 REF: p70-71
“As a student, I want to register for a class in order to fulfill education requirements” is an
example of a(n) _________________.
Selected Answer: c.
use case
Answers: a.
user story
b.
elementary business process
c.
use case
d.
external event
MULTIPLE RESPONSE
1. Two primary techniques to identify use cases are _______ and _______. (Choose two)
a. user goal technique d. event decomposition
technique
b. CRUD technique e. business function
technique
c. system response f. user procedure
technique technique
ANS: A, D PTS: 1 REF: p69
COMPLETION
1. An activity that the system performs in response to a user request is called a(n) _______.
2. A technique that is best used to validate the list of existing use cases is called the _______
technique.
ANS: CRUD
3. A(n) _______ is a task that is performed by one person in response to a business event, adds
value, and leaves the system in a stable condition.
ANS:
elementary business process
EBP
ANS: event
5. An external agent or person that interacts with the system by supplying data is called a(n)
_______.
ANS: actor
6. An event that occurs simply by reaching a point in time is called a(n) _______ event.
ANS: temporal
7. The _______ states that events should be included during analysis only if the system would be
required to respond under perfect technology conditions.
8. Checks and safety procedures that are put in place to protect the integrity of the system are called
_______ .
9. An acronym for updating, deleting, reporting and creating of data is called _______.
ANS: CRUD
10. A UML model that is used to show use cases and their relationships to actors is called a(n)
_______.
11. The _______ is the dividing line between the computerized portion of the system and the users
who operate the system.
12. The _______ technique is a technique to identify use cases by determining specific goals or
objectives must be completed by a user.
ANS:
user goal
user goal technique
13. The _______ technique is a technique to identify use cases by determining the external business
events to which the system must respond.
ANS:
event decomposition
event decomposition technique
14. An event that occurs outside the system is called a(n) _______.
15. An event that occurs when something inside the system triggers the need for processing, but
usually as a consequence of external activity is called a _______ event.
ANS:
state
state event
ESSAY
ANS:
1. Identify external events
2. Name a use case for each external event
3. Identify temporal events
4. Name a use case for each temporal event
5. Identify state events
6 Name a use case for each state event
7. Remove and perfect technology assumption events
ANS:
1. Identify all the data entities
2. For each data entity ensure that there are use cases to CRUD
3. Add any new required use cases
4. For integrated applications, do not add use cases that are covered in other applications
ANS:
1. Identify all the stakeholders who need to see a use case diagram.
2. Determine what is important for each stakeholder.
3. Organize the use cases for each communication need. Draw the use case diagrams.
4. Carefully name each diagram as it pertains to each stakeholder and user.
ANS:
An external event is an event that occurs outside the system and is usually initiated by an external
agent or actor. A second type of event is the temporal, which occurs as a result of reaching a point
in time. A third type of even is a state event. This event occurs when something happens inside
the system that triggers the need for processing.
5. Describe two techniques for identifying use cases. Which is the most comprehensive approach?
ANS:
Two techniques for identifying use cases are the user goal technique and the event decomposition
technique. The user goal technique involves identifying all actors or users of the system and
asking, “What are their goals in using the system?” Goals are identified at the elementary
business process (EBP) level of analysis. The event decomposition technique involves asking,
“What events does the system need to respond to?” External events, temporal events, and state
events are identified. The use case is what the system does to react to or respond to each event.
The event table is used to catalog information about each event and the resulting use case. The
event decomposition technique is the most comprehensive technique. Both techniques involve the
idea of an elementary business process (EBS) being a system process in response to a business
event. A third technique discussed in chapter 7 is the CRUD technique, where the analyst
identifies for each domain class the create, read or report, update, and delete use cases required.
In practice, multiple approaches should be used to cross check each other to assure all use cases
are identified.
TRUE/FALSE
1. Two techniques to identify things in the problem domain are the noun technique and the verb
technique.
2. When identifying things in the problem domain, an analyst should focus primarily on tangible
things about which information is required.
3. When using the brainstorming technique it is often helpful to think about each use case and
talking to users.
5. When using the noun technique, the analyst begins by listing all the nouns that the users mention.
7. The ERD crows feet cardinality constraint indicates a mandatory many relationship.
8. In UML a zero to many multiplicity constraint is shown with a “O” and crows feet on the line.
11. An abstract class is used to describe a “thing” that is abstract, i.e. not tangible.
ANS: F PTS: 1 REF: p106
13. In generalization/specialization the objects in a subclass are always also contained in the parent
class.
MULTIPLE CHOICE
1. The specific area of the user’s business need that is within the scope of the new system is called
the _______.
a. use cases c. functional
requirements
b. user specifications d. problem domain
ANS: D PTS: 1 REF: p92
2. One technique to find the “things” that need to be included in the new system begins by starting
with a user and the use cases and then try to identify the necessary informational “things.” This
technique is called the _______.
a. domain analysis c. brainstorming
technique technique
b. check list technique d. noun technique
ANS: C PTS: 1 REF: p94
3. One technique for finding “things” that need to be in the new system is done by the analyst starts
making lists of “things.” He may do this from information and even without talking to the users
extensively. This technique is called the _______.
a. domain analysis c. brainstorming
technique technique
b. check list technique d. noun technique
ANS: D PTS: 1 REF: p94
4. When making a list of nouns to determine what are the important “things” for the new system,
there are three question that should be asked about each noun. Which of the following is one of
those questions?
a. Is it a tangible item?
b. Is it an abstract item?
c. Who needs information about this item?
d. Should it be researched further?
ANS: D PTS: 1 REF: p94-95
9. The number of associations that occur among specific things in an entity relationship diagram is
called ____.
10. A synonym for cardinality (used with UML class diagrams) is ____.
a. relationship c. unary relationship
b. multiplicity d. inheritance
ANS: B PTS: 1 REF: p97
11. ____ is used to describe the relationship between two things of the same type, such as one person
being married to another person.
a. Binary association c. Cardinality
b. Unary association d. N-ary association
ANS: B PTS: 1 REF: p98
12. A synonym for cardinality (used with UML class diagrams) is _______.
a. relationship c. inheritance
b. multiplicity d. n-ary relationship
ANS: B PTS: 1 REF: p97
13. An attribute that contains a collection of related attributes is called a(n) _______.
a. class attribute c. compound attribute
b. key attribute d. association attribute
ANS: C PTS: 1 REF: p96
14. A measure of the number of links between one object and another object in a relationship is
called the _______.
a. linkups c. associations
b. aggregations d. cardinality
ANS: D PTS: 1 REF: p97
15. In the traditional approach to system development, the system stores information about ____.
a. objects c. attributes
b. data stores d. data entities
ANS: D PTS: 1 REF: p98
17. A relationship that has a cardinality constraint of one or more is a(n) _______ relationship.
a. mandatory c. unary
b. optional d. binary
ANS: A PTS: 1 REF: p97
18.
The above cardinality constraint on the Order data entity indicates that there can be _____ .
a. zero or many orders
b. one or many orders
c. many orders
d. cannot be determined without the other side of
the relationship
ANS: B PTS: 1 REF: p99
Descriptive properties of things in the problem domain are often documented as what?
Selected Answer: c.
objects
Answers: a.
data entities
b.
attributes
c.
objects
d.
relationships
19.
The association shown on the above image is a(n) ________ association.
a. unary c. n-ary
b. binary d. undefined
ANS: A PTS: 1 REF: p98
21. A relationship between a “sports team” and the players, coaches, and sponsor would be described
as what kind of relationship?
a. Aggregation c. Generalization/Specia
lization
b. Composition d. Binary
ANS: A PTS: 1 REF: p106
22. Which of the following relationships would NOT be an appropriate way to describe a relationship
between an employee and his/her manager?
a. Unary relationship
b. Binary relationship
c. Generalization/Specialization relationship
d. Association relationship
ANS: D PTS: 1 REF: p102
The symbol that is used to initiate concurrent paths in a state machine diagram is what?
Selected Answer: d.
multiple states
Answers: a.
concurrency bar
b.
synchronization bar
c.
concurrent paths
d.
multiple states
26. _____ is based on the idea that people classify things in terms of similarities and differences.
a. Aggregation c. Multiplicity
b. Composition d. Generalization/Specia
lization
ANS: D PTS: 1 REF: p104
27. A concept that allows subclasses to share the characteristics of their superclasses is called ____.
a. aggregation c. multiplicity
b. composition d. inheritance
ANS: D PTS: 1 REF: p104
28. A class that represents a many-to-many association between two other classes is called a(n) ____
class.
a. problem domain c. aggregated
b. superclass d. association
ANS: D PTS: 1 REF: p102
29. If we modeled a “sale” and the “sale items” with a whole-part relationship, it would best be
described as a _______ relationship.
a. aggregate c. inherited
b. composite d. abstract
ANS: B PTS: 1 REF: p107
30. In a generalization/specialization relationship, it would not make sense for a class at the bottom of
the hierarchy to be a(n) ______ class.
a. composite c. concrete
b. association d. abstract
ANS: D PTS: 1 REF: p106
32.
This notation indicates what type of association?
a. Aggregation c. Association
b. Composition d. Generalization/Specia
lization
ANS: D PTS: 1 REF: p104
MULTIPLE RESPONSE
1. When analyzing the list of nouns to determine whether to include a particular noun as an
important “thing,” which of the following questions should be asked about the noun? (choose
two)
a. If assumptions change will it be important?
b. Is it tangible?
c. Is it unique?
d. Is it an attribute of some other thing?
e. Are there multiple instances of it?
f. Is it identifiable?
ANS: C, E PTS: 2 REF: p94
2. When analyzing the list of nouns to determine whether to exclude a particular noun as an
important “thing,” which of the following questions should be asked about the noun? (choose
two)
a. Is it in the domain?
b. Is it a synonym of an existing thing?
c. Is it a tangible item?
d. Is it identifiable?
e. Is it a persistent item?
f. Is it an output from the system?
ANS: B, F PTS: 2 REF: p94-95
COMPLETION
1. The specific area of the user’s business need that is within the scope of the new system is called
the _______.
2. A technique to identify problem domain objects in which developers and users work together in
an open group setting is called the _______ .
ANS:
brainstorming technique
brainstorming
3. The technique for finding problem domain objects by finding and listing all the nouns in a dialog
or description is called the _______.
ANS:
noun technique
noun
ANS: attribute
5. An attribute for an object which can be used to uniquely identify that object is called a(n)
_______.
ANS:
key
identifier
6. A term in UML that describes a naturally occurring relationship between specific things is called
a(n) _______.
ANS: association
7. In UML notation for object-oriented approach the term _______ is used instead of cardinality.
ANS: multiplicity
8. _______ is used to describe the actual range of linkups allowed in an association (the minimum
and maximum values).
ANS:
Multiplicity constraints
Cardinality constraints
9. The diagram consisting of data entities and their relationships is called a(n) _______ .
ANS:
entity relationship diagram
entity-relationship diagram
ERD
10. When words are concatenated together to form a single word and the first letter of each is
capitalized it is called _______ notation.
ANS:
camelback
camelback notation
camelcase
camelcase notation
12. A UML class that never has any objects within the class is called a(n) _______.
ANS:
abstract class
abstract
PTS: 2 REF: p106
13. A UML class that is allowed to have a set of actual objects within it is called a(n) _______.
ANS:
concrete class
concrete
14. In a relationship where there are superclasses and subclasses, the relationship is called a(n)
_______ relationship.
ANS:
generalization/specialization
generalization specialization
generalization-specialization
15. The idea that the attributes of a superclass are also attributes of a subclass is called ______.
ANS: inheritance
16. The general relationship between classes in which one class is a part or component of another
class is called a(n) _______ relationship.
ANS:
whole-part
whole part
whole/part
17. A type of relationship where between classes where the objects in one class are a part of the
objects in another class BUT they can also exist as separate objects alone.
ANS:
aggregation
aggregate relationship
aggregate
18. A type of relationship where between classes where the objects in one class are a part of the
objects in another class AND they can only exist as part of the totality.
ANS:
composition
composite relationship
composite
19. A drawing which shows individual objects and their links with other objects, and which is used to
help understand the problem domain classes is called a(n) _______ .
ESSAY
1. List the steps to follow when using the brainstorming technique for finding things.
ANS:
1. Identify a user and a set of use cases
2. Brainstorm with the user to identify necessary things
3. Use the identified things to ask addition questions about things
4. Expand to all other users and use cases
5. Merge the results and eliminate duplicates
2. Describe the difference between the noun technique and the brainstorming technique to find
problem domain objects.
ANS:
The brainstorming technique is more top-down where the analyst is thinking and categorizing
objects from the beginning. The noun technique is more bottom-up where the analyst makes lists
and later analyzes to refine and merge the nouns.
3. Using the noun technique for finding “things” for the new system, what are the three questions
you should ask about each noun you have identified? Explain what each question entails.
ANS:
1. Should it should be included - Is it unique? Is it within the scope? Are there multiple instances
of it?
2. Should it be excluded -- Is it a synonym for an existing noun? Is it only an input? Is it only an
output?
3. Should it be research further -- Is it an attribute? Will it become important in the future?
2. Two difference scenarios of a use case would normally be described in a single fully developed
use case description.
4. Activity diagrams are not helpful when the flow of activities is too complex.
5. An activity diagram and the flow of activities in a fully developed use case description serve the
same purpose.
6. Since an activity diagram is not object-oriented (e.g. no objects), it is not a standard model of the
object-oriented Unified Modeling Language (UML).
7. In a system sequence diagram the order of the messages is determined by numbering the
messages.
9. A true/false condition on a sequence diagram indicates whether the message can be processed or
not.
10. A loop frame and an asterisk mean the same thing in a sequence diagram.
12. An Opt frame and an Alt frame do essentially the same thing.
13. An Opt frame and a true/false condition on a message serve essentially the same purpose.
14. Activity diagrams are not helpful in developing system sequence diagrams (SSDs).
15. In the object-oriented approach to systems development, the flow of information is achieved by
sending messages either to and from actors or back and forth between internal objects.
16. In an interaction diagram, messages are sent and received by individual objects, not by classes.
17. In a sequence diagram, a message is considered to be an action that is invoked on the destination
object.
18. Activity diagrams cannot be used to describe processes that involve automated system activities.
19. In an activity diagram, a separate use case may used as part of the workflow.
MULTIPLE CHOICE
2. A unique set of internal activities within a use case which represents a unique path through the
use case is called a(n) _______.
a. workflow c. scenario
b. sequence of activities d. critical path
ANS: C PTS: 1 REF: p121
3. In a fully developed use case description the postcondition data describes what conditions?
a. The status condition c. The condition of the
of the use case. actor.
b. The existence of d. The data that is
domain model output by the system.
objects.
ANS: B PTS: 1 REF: p123
4. In a fully developed use case description the exception conditions represent what?
a. What conditions might cause the system to
crash.
b. What conditions prevent the system from
successfully completing the use case.
c. What conditions will confuse the actor.
d. Where the system might have “bugs” and
produce erroneous results.
ANS: B PTS: 1 REF: p123
5. In a fully developed use case description, the flow of activities is most similar to what?
a. An activity diagram c. A state chart diagram
b. A class diagram d. A system sequence
diagram
ANS: A PTS: 1 REF: p123
6. Numbering exception conditions, which often uses hierarchical numbering, in a fully developed
use case description is helpful to _______.
a. tie exception conditions to other diagrams or
descriptions
b. show which exception conditions are
subordinate to other exceptions
c. provide an identifier for each exception
condition
d. tie the exception condition to a processing
step
ANS: D PTS: 1 REF: p124
7. In a fully developed use case description normally the preconditions describe what?
a. What objects must exist prior to the use case
executes.
b. What data the actor must have before the use
case executes.
c. Who the actors are that invoke the use case.
d. What business conditions must occur before
the use case is invoked.
ANS: A PTS: 1 REF: p124
8.
Which is correct?
a. A c. C
b. B d. D
ANS: B PTS: 1 REF: p105, 107, 126
9. Which of the following is the best model to use to document the inputs and the outputs to a
system?
a. State chart diagram c. Activity diagram
b. Fully developed use d. System sequence
case description diagram
ANS: D PTS: 1 REF: p126
15. If the True/False condition on a message evaluates to false in a sequence diagram, which of the
following is correct?
a. The message is false. c. The message is not
processed.
b. The message has no d. The message is not
return value. sent.
ANS: D PTS: 1 REF: p129
16. Which of the following documents information about classes that are part of the problem domain
of the user?
17. For real-world objects the state of an object is the same as its _______ .
a. lifeline c. attribute values
b. status condition d. persistence
ANS: B PTS: 1 REF: p133
18. In a transition label in a state machine the syntax is A(B)[C]/D. The D stands for what?
a. transition name c. action expression
b. true/false condition d. input parameters
ANS: C PTS: 1 REF: p134
23. To document ____, draw a composite state with the lower portion divided into multiple
compartments for each concurrent path of behavior.
a. simple nested states c. concurrent behavior
of different objects
b. concurrent behavior d. simple paths
of a single object
ANS: B PTS: 1 REF: p135-146
26. Which of the following is NOT a step in the development of a state machine diagram?
a. List all the status conditions for an object.
b. Identify state exiting transitions.
c. Expand the name of each state to identify
concurrent activities.
d. Sequence the state-transition fragments.
ANS: C PTS: 1 REF: p137-138
27. A state machine diagram is used to document the states and transitions of a(n) ________.
a. Business process c. Message
b. Use case d. Object
ANS: D PTS: 1 REF: p132-134
28. The ____ are the primary models from which other models draw information.
a. statechart diagram and the problem domain
class diagram.
b. system sequence diagram and the activity
diagram
c. use case diagram and the problem domain
class diagram
d. use case description and the use case diagram
ANS: C PTS: 1 REF: p143
29. Which of the following is NOT an advantage of object-oriented modeling with several models is
that _____.
a. developing new models allows the analyst to
discard unnecessary diagrams.
b. developing new models ensures a consistency
in the requirements.
c. developing new models helps correct
previously drawn diagrams
d. developing new models helps gain deeper
understanding of user requirements.
ANS: A PTS: 1 REF: p143
A good way to ensure that all the use cases have been identified is through _______________.
Selected Answer: b.
the integration of UML models and comparing the results
Answers: a.
the brainstorming technique
b.
the integration of UML models and comparing the results
c.
the noun technique
d.
the CRUD technique
On an activity diagram, which of the following is NOT a valid use of a synchronization bar?
Selected Answer: b.
To initiate a loop
Answers: a.
To initiate concurrent paths
b.
To initiate a loop
c.
To initiate alternative paths
d.
To initiate concurrent paths by separate actors
MULTIPLE RESPONSE
COMPLETION
1. A textual model that describes the processing details of a use case is called a(n) ________.
ANS: use case description
2. Use cases may have different “paths” or sequence of steps through the use case. These different
paths are called _______ .
ANS:
scenarios
scenario
instance
instances
use case instance
use case instances
3. A certain set of values or statuses that must exist before a use case begins is called a(n) _______.
ANS:
precondition
pre-condition
4. A certain set of values or statuses that must exist after a use case completes its processing is
called a(n) _______.
ANS:
postcondition
post-condition
5. The diagram model that is useful to document the flow of activities on a fully developed use case
description is called a(n) _______ diagram.
ANS: activity
6. A diagram that shows the messages between an actor and the system is called a(n) _______.
ANS:
system sequence diagram
system-sequence diagram
7. Vertical dashed lines on a system sequence diagram are used to depict a(n) what?
ANS:
lifeline
object lifeline
ANS: message
ANS: object
10. On a sequence diagram when multiple messages are included within a repeating loop a(n)
_______ is used to document it.
11. On a sequence diagram a short notation that indicates a repeating message is a(n) _______.
ANS:
asterisk
*
ANS:
parameter-list
parameter list
parameters
input parameters
ANS:
return-value
return-values
return value
return values
ANS:
alt frame
alt-frame
15. A condition during an object’s life when it satisfies some criterion is called a(n) _______.
ANS: state
16. The movement of an object from one state to another is done through the process of a(n)
_______.
ANS: transition
17. A UML diagram that shows the life of an object in states and transitions is called a(n) _______.
ANS:
state machine diagram
state-machine diagram
state machine
state-machine
18. When an object moves from one state to another the ending state is called a(n) _______ .
ANS:
destination state
destination
19. The beginning state of an object when its states are diagrammed is called a(n) _______.
ANS:
pseudostate
pseudo-state
ANS:
concurrency
concurrent state
concurrent states
21. In a state-machine diagram when one state is high-level in that it contains other states of an
object, it is called a(n) ______.
ESSAY
ANS:
A system sequence diagram (SSD) is used to describe the flow of information into and out of the
automated system. Thus, an SSD documents the inputs and the outputs and identifies the
interaction between actors and the system.
ANS:
Loop frame
Opt frame
Alt frame
TRUE/FALSE
1. The objective of the design phase is to define, organize, and structure the components of the final
solution system that will serve as a blue print for construction.
2. Designing the application architecture involves specifying in detail how some system activities
will actually be carried out.
ANS: F PTS: 1 REF: p158
3. The key question to answer with the design of the user interface activity is, “Have we specified in
detail how all users will interact with the system?”
5. It is usually important to distinguish when developers are doing architectural design and when
they are doing detailed design.
6. In user interface design the detailed screen layouts should be done after the communication
protocols and devices have been decided.
7. During analysis, analysts build models to represent the real world and to understand the desired
business processes with the information used in those processes.
8. It is just as important to have heavy user involvement during analysis as it is during design.
9. Cowboy coding is one of the newer techniques programming, often used with Agile techniques.
10. The majority of new systems today must be integrated into existing networks without disrupting
existing applications.
11. Basically, design involves decomposition -- breaking a complex problem into smaller, more
understandable components.
12. The output of the design activities is a set of diagrams and documents that describe the solution
system.
13. A big part of designing the environment is identifying and defining all the types of computing
devices that will be required.
14. One of the disadvantages of three-layer architecture is that is usually requires multiple computers.
16. The most serious problem with Web based deployment of applications is security.
17. Since most newer Web applications use dynamic pages, content delivery networks are going out
of use.
18. When building systems for Web deployment it is often necessary to build two separate user
interface systems.
MULTIPLE CHOICE
1. Which one of the six core process can be considered as a “bridge” process.
a. Identify the problem and obtain approval.
b. Discover and understand the details.
c. Design system components.
d. Build, test and integrate system components.
ANS: C PTS: 1 REF: p155
3. Which is not one of the elements that is normally considered in systems design?
a. Application software c. Security and controls
b. System interface d. Object class methods
ANS: D PTS: 1 REF: p157
4. Which statement is NOT a correct term for the broad design of the overall system?
a. Architectural design c. General design
b. Conceptual design d. Object-oriented
design
ANS: D PTS: 1 REF: p158
6. Low-level design that includes the design of the program modules and algorithm logic is referred
to as ____ design.
a. detail c. functional
b. module d. component
ANS: A PTS: 1 REF: p158
9. The key design question, “Have we specified in detail how the users will interact with the system
to carry out all the use cases?” is associated with which design activity?
a. Design user c. Design application
interfaces software
b. Design system d. Design use cases
interfaces
ANS: A PTS: 1 REF: p162
10. Which of the following terms describes computer software that implements communication
protocols on the network and helps different systems communicate?
a. Nodes and locations c. Distributed
diagram architecture
b. Virtual environment d. Middleware
ANS: D PTS: 1 REF: p163
11. The first step in defining a solution in the development of a new software system is to define
what?
a. The application c. The programming
architecture language
b. The computing d. The details of the
environment business problem
ANS: B PTS: 1 REF: p163
12. Which if the following is NOT considered part of designing the application architecture and
software?
a. Multilayer design c. Detailed design
b. Subsystem definition d. Program security
design
ANS: D PTS: 1 REF: p163-164
13. Which of the following really is both an analysis (discovery) and a design process (solution).
a. Environment design c. Database design
b. System interface d. User interface design
design
ANS: D PTS: 1 REF: p165
14. Identifying Extensible Markup Language (XML) tags is often used in what design activity?
a. Web page design c. System interface
design
b. User interface design d. Application software
design
ANS: C PTS: 1 REF: p166
16. The domain model is always used as an input to which design activity?
a. Report layout design c. Database design
b. Security and controls d. User interface design
design
ANS: C PTS: 1 REF: p166
18. Which design activity that pervades all other design activities?
a. Environment design c. Security and controls
design
b. Database design d. Interface design
ANS: C PTS: 1 REF: p167
19. Limiting user access to the system is considered what type of design?
a. User interface design c. System interface
design
b. Security and controls d. Application software
design design
ANS: B PTS: 1 REF: p167
20. What is the difference between a “client” computer and a “server” computer?
a. Location on the c. The services that
network each performs
b. Computing power d. The connectivity to
that each has the Internet
ANS: C PTS: 1 REF: p168
21. What is the difference between a browser based system and a desktop application system?
a. Desktop system never uses a network and
browser base always does.
b. Browser system always uses the Internet and
desktop does not.
c. User interface is different between a desktop
and browser based.
d. Browser based is always three-layer and
desktop is not.
ANS: C PTS: 1 REF: p168-169
22. Which is NOT one of the primary advantages of deploying a system via a Web implementation.
a. Easy to program with HTML
b. Wide availability of the Web
c. Low-cost connectivity
d. Standard development and deployment
practices
ANS: A PTS: 1 REF: p172
23. Which is NOT one of the problematic areas of Web based applications?
a. Security of applications
b. Complexity of Internet servers and Web
development
c. Configuration to handle high peak loads
d. Rapid change of Web standards and
functionality
ANS: B PTS: 1 REF: p172
MULTIPLE RESPONSE
1. Which of the following are NOT critical issues in considering a hosting alternative. (choose two)
a. Reliability d. Staff
b. Cost e. Growth
c. Security f. Computing
equipment
ANS: B PTS: 2 REF: p175
COMPLETION
1. What kind of model is used to show how the application is deployed across networks and
computers.
ANS:
network diagram
Network diagram
network model
2. The process of design which is the broad design of the overall system structure is called _______.
ANS:
architectural design
general design
conceptual design
3. Low-level design that includes the design of the specific program details is called ______.
ANS:
detail design
detailed design
4. When designing the ____________________, the first steps are to identify the general form and
structure of the user dialog based on the major inputs and outputs.
5. A computer network in which the cabling and hardware are confined to a single location is called
what _____?
ANS:
local area network (LAN)
LAN
local area network
6. What term do we use to describe a computer network architecture with central computers and
users’ computers.
ANS:
client-server architecture
client server architecture
7. What de we call the predominant language used for constructing web pages?
ANS:
Hypertext Markup Language (HTML)
Hypertext Markup Language
HTML
Hyper-text markup language
8. What is the term that defines the foundation protocol of the Internet and is used to provide
reliable deliver of messages between computers.
ANS:
TCP/IP
Transmission Control Protocol/Internet Protocol
Transmission Control Protocol/Internet Protocol (TCP/IP)
ANS:
View layer
view layer
10. What is the term used to describe the programs that implement the rules and processing of the
software solution?
ANS:
business logic layer
domain layer
11. What do we call the combination of Hypertext Transfer Protocol and Transport Layer Security?
ANS:
Hypertext Transfer Protocol Secure
HTTPS
12. An advanced version of Secure Sockets Layer protocol which is used to transmit information over
the Internet securely is called ______.
ANS:
Transport Layer Security (TLS)
Transport Layer Security
TLS
13. What is the term used to define a set of server computers that are used to deliver static content
such as videos, but that are not part of the primary application servers?
ANS:
Content delivery network (CDN)
Content delivery network
CDN
14. The process of providing physical servers at a secure location and selling those services is called
_______.
ANS: hosting
ANS: colocation
16. What do we call a method to partition the services of a physical Web server so it appears as
multiple, independent Internet servers?
17. What is the term used to describe a virtual environment for servers in which the resources include
computing, storage, and Internet access and appear to have unlimited availability.
ANS:
cloud computing
Cloud computing
18. The part of a contract between a business and a hosting company that guarantees a specific level
of availability is called the _______.
ANS:
service level agreement (SLA)
service level agreement
Service level agreement
SLA
19. What is the term used to describe a closed network with security and closed access but which is
built on top of a public network like the Internet?
ANS:
Virtual Private Network (VPN)
Virtual private network
VPN
20. What kind of a connection is it when independent computers communicate but without the need
for a centralized server?
ANS:
peer-to-peer connection
peer to peer connection
peer-to-peer
peer to peer
ESSAY
1. List the six primary areas that must be designed as part of systems design.
ANS:
1. Design the environment
2. Design the application software
3. Design the database
4. Design the user interface
5. Design the system interface
6. Design security and controls
2. List six of the eight primary design models that are used for systems design (used in this text).
ANS:
1. Package diagrams
2. Nodes and locations diagrams
3. Design class diagrams
4. Sequence diagrams
5. Database schema
6. User-interface screens and reports
7. System security and controls
8. Communication diagrams
3. List and describe the six primary analysis models (used in this text).
ANS:
1. Class diagrams -- the classes in the problem domain
2. Use case diagrams -- an overview of the use cases and agents for the system
3. System sequence diagrams -- defines the messages between the agent and the system for a use
case
4. Use case descriptions -- detailed information about a use case including pre-conditions, post-
conditions, flow of logic, exception conditions, etc.
5. State machine diagrams -- description of the various status conditions of an object and how it
transitions from state to state.
6. Activity diagrams -- Workflow diagram showing the steps in a business process and the
interaction between actors and the system.
ANS:
1. View layer -- the user interface. It includes the screen and presentation programming.
2. Domain layer (business logic layer) -- the programs that process the business rules.
3. Data layer -- the programs and DBMS that accesses the database.
6. Describe the three potential problems of implementing an application through the Web.
ANS:
1. Security —Web servers are a well-defined target for security breaches because Web standards
are open and widely known. Wide-scale interconnection of networks and the use of Internet and
Web standards make servers accessible to a global pool of hackers.
2. Throughput —When high loads occur, throughput and response time can suffer significantly.
3. Changing standards —Web standards change rapidly.
7. When considering a hosting alternative, there are five areas that must be considered. Describe
each.
ANS:
1. Reliability —The hardware environment must be completely reliable because customers and
other outside parties usually have a very low tolerance for systems that aren’t available.
2. Security —The systems? —hardware and software? —must be secure.
3. Physical facilities —To ensure reliability and security, special rooms or even special buildings
are often required. In addition, Internet connectivity frequently requires multiple access routes to
the Internet backbone. Electrical power must be secure, which often means having backup
generators on-site.
4. Staff —To ensure reliability and security, a well-qualified technical staff needs to be on-site
24/7.
5. Growth —External systems often grow dramatically as a business expands, increasing the
number of servers needed to respond to the traffic.
TRUE/FALSE
2. User interface design is frequently added to the system after the business rules and business logic
has been designed.
3. To implement the dialog metaphor requires voice communication and voice recognition
capabilities on the computer.
4. A good example of an error message might be, “The account information is missing critical data.
Please re-enter.”
5. Users need to feel that they can explore options and take actions that can be canceled without
difficulty.
6. A persons ability to remember things is not an important consideration for user-interface design.
9. Adequate feedback from a system to user data entry helps reduce errors.
10. Menus should only include options that are activities from the list of use cases.
12. An initial grouping of cases by actor and subsystem is a good starting point for menu design.
15. The design of a desktop system and a Web based system have similar performance issues that
must be considered.
18. Highly automated input devices such as scanners can capture many system inputs.
19. XML is a definition language that allows users add new constructs to the language.
MULTIPLE CHOICE
2. A metaphor of human-computer interaction (HCI) in which the user interacts directly with objects
on the display screen, is referred to as ____.
a. desktop metaphor c. document metaphor
b. direct manipulation d. dialog metaphor
metaphor
ANS: B PTS: 1 REF: p191
3. An approach where the visual display is organized into regions and includes an arrangement of
common tool icons is called a ____.
a. desktop metaphor c. document metaphor
b. direct manipulation d. dialog metaphor
ANS: A PTS: 1 REF: p191
5. Software (such as typical tax preparation software) which in essence interviews the user is
following which user interface metaphor?
a. Collaboration c. Interview metaphor
metaphor
b. Document metaphor d. Dialog metaphor
ANS: D PTS: 1 REF: p192
8. A key principle of human-computer interaction (HCI) that states that all controls should be
noticeable and provide an indication that the control is responding to the user's action, is called
____.
a. informative feedback c. consistency
b. affordance d. visibility
ANS: D PTS: 1 REF: p193
9. A key principle of human-computer interaction (HCI), that states that the appearance of any
control should suggest its functionality, is called ____.
a. informative feedback c. consistency
b. affordance d. visibility
ANS: B PTS: 1 REF: p193
10. Since it is not always clear that Web page objects are clickable, or when a control has recognized
the click, designers should be careful to apply the principle of ____.
a. affordance c. shortcuts
b. consistency d. visibility
ANS: D PTS: 1 REF: p193
11. Each dialog within the system should be organized with a clear sequence–a beginning, middle,
and end. This describes which of the eight golden rules for designing interactive interfaces?
a. Offer informative feedback
b. Permit easy reversal of actions
c. Support internal locus of control
d. Design dialogs to yield closure.
ANS: D PTS: 1 REF: p195
12. Operating systems deliberately include an electronic “click” sound for keyboard and mouse
activities. This describes which of the eight golden rules for designing interactive interfaces?
a. Offer informative feedback
b. Offer simple error handling
c. Support internal locus of control
d. Strive for consistency
ANS: A PTS: 1 REF: p195
13. “When subsequent processing is delayed by more than a second or two, users may repeatedly
press controls or reenter information, resulting in processing errors and user frustration” is an
example of what?
a. Lack of error c. Lack of closure
handling
b. Lack of feedback d. Lack of consistency
ANS: B PTS: 1 REF: p195
14. Designers should be sure to include cancel buttons on all dialog boxes which allow the user to
back up. This is an example of what?
a. Easy reversal of actions
b. Reduce short term memory load
c. Good error handling
d. Dialog that yields closure
ANS: A PTS: 1 REF: p196
15. Users should not be required to keep track of information that they have previously entered. This
is an example of what?
a. Easy reversal of c. Good error handling
actions
b. Reduce short term d. Dialogs that yields
memory load closure
ANS: B PTS: 1 REF: p196
16. A good design heuristic for menu design is to limit the menu choices to _____ choices.
a. four to nine c. three to seven
b. never more than d. five to ten
seven
ANS: D PTS: 1 REF: p197
17. One way to ensure consistency across the web pages of a web site is to implement the pages using
_______.
a. Device specific pages
b. Menu items that are grouped appropriately
c. Cascading style sheets
d. Browser specific coding
ANS: C PTS: 1 REF: p204
19. Which of the following is NOT an input device used to reduce input errors?
a. Magnetic card strip c. Touch screen
reader
b. Electronic keyboard d. Bar code reader
ANS: B PTS: 1 REF: p210
21. Which of the following is NOT an example of a technique to reduce input errors?
a. Design input codes with special meanings
b. Avoid human involvement
c. User electronic data capture devices
d. Capture data close to the source
ANS: A PTS: 1 REF: p210
22. Reports that are not predefined by a programmer, but are designed as needed, are called ____
reports.
a. one-time c. business
b. quick and dirty d. ad hoc
ANS: D PTS: 1 REF: p216
23. A report that contains only information about nonstandard or out-of-bound conditions is a(n)
____ report.
a. runtime c. exception
b. error d. executive
ANS: C PTS: 1 REF: p213
24. A report that is used primarily for strategic decision making is called a(n) ____ report.
a. executive c. exception
b. key item d. summary
ANS: A PTS: 1 REF: p213
25. An external output that includes a portion that is returned to the system as an input is a(n) ____.
a. output-input c. return document
document
b. turn-around d. tear off and return
document document
ANS: B PTS: 1 REF: p213
26. A report that is printed to be used by persons outside of the organization is called a(n) ____.
a. outside report c. external output
b. non-sensitive output d. company report
ANS: C PTS: 1 REF: p213
27. The ability to link a summary field to the supporting detail, and to dynamically view that detail on
a screen, is called ____.
a. exploding report c. dynamic reporting
b. windowing a field d. drill down
ANS: D PTS: 1 REF: p213
28. The major advantage of screen output versus printed output is that screen output ____.
a. can be updated c. has more information
dynamically
b. is more user friendly d. is more secure
ANS: A PTS: 1 REF: p215
29. Electronic reports can provide a(n) ____ on the report to activate a lower-level report, which
provides more detailed information.
a. cursor link c. mouseover
b. activation key d. hot spot hyperlink
ANS: D PTS: 1 REF: p216
30. One effective way to present large volumes of data is to summarize it and present it ____.
a. in tabular form c. with control totals
b. in graphical chart or d. on a computer screen
diagram
ANS: B PTS: 1 REF: p217-218
31. Two of the most common graphical charting techniques are ____.
a. vertical charts and horizontal charts
b. line charts and series charts
c. bar charts and pie charts
d. printed charts and screen charts
ANS: C PTS: 1 REF: p217
MULTIPLE RESPONSE
1. Which of the following are techniques used by developers to evaluate the effectiveness and
usability of user interface designs. (Choose two)
a. Focus early on users and how they work
b. Statistically analyze test and use data
c. Use iterative techniques
d. Involve users in design meetings
e. Use formal modeling techniques
f. Conduct focus groups
ANS: B, F PTS: 2 REF: p190
2. When the layout and the formats is being designed for the screens for desktop systems (non Web
systems), there are several critical issues. Which of the following are considered to be important
considerations? (choose two)
a. Performance and load speed
b. LAN Connectivity
c. Consistency across screens
d. Input validation
e. Screen size
f. Fonts and colors
ANS: C, F PTS: 1 REF: p202
3. When the user interface is being designed for Web based systems, there are several important
considerations. Which of the following are included in those particularly important issues?
(Choose two)
a. Web Connectivity
b. Performance and load speed
c. Pictures, Video and Sound
d. Programming language
e. Server speeds and capabilities
f. HTML standards
ANS: B, C PTS: 1 REF: p205
4. When designing the user interface for handheld devices there are several important issues critical
for only those devices. Which of the following are considered to be important issues? (Choose
two)
a. Battery power consumption
b. Memory limitations
c. Custom apps versus Web apps
d. Speed and throughput
e. Screen size
f. 3G or 4G network
ANS: D, E PTS: 1 REF: p207
COMPLETION
1. The _______ describe the inputs and outputs that require no or minimal human intervention.
ANS:
system interfaces
system interface
2. The _______ are inputs and outputs that directly involve a system user.
ANS:
user interfaces
user interface
3. The ____________________ is everything the end user comes into contact with while using the
system–physically, perceptually, and conceptually.
4. What is the term used for design techniques that embody the view that the user interface is the
entire system.
ANS:
user-centered design
user centered design
User-centered design
5. The degree to which a system is easy to learn and to use is called _______.
ANS:
usability
useability
6. When the appearance of a specific control suggests its function, that is called _______.
ANS: affordance
7. When a control provides immediate feedback to a user, such as when a button shows it has been
clicked, that is called _______.
ANS: visibility
8. A technique to create a sequence of sketches of the display screen during a dialog is called _____.
ANS:
storyboarding
storyboard
9. A type of text box input control that only contains a set of predefined data values is called a
______.
10. A type of text box that contains a set of predefined values but also allows the user to enter new
values is called a ______.
11. A type of input control where the user can select only one item from a group of items.
12. A type of input control that allows the user to select multiple items within a group of items is
called _______.
ANS:
check boxes
check box
13. What is the term used to describe a Web page encoding standard that enables the page look-and-
feel to dynamically change?
ANS:
Cascading style sheets
Cascading style sheets (CSS)
CSS
14. Software that adapts the user interface to the special needs of persons with disabilities, such as the
visual or hearing impaired, is called _______.
ANS:
assistive technologies
assistive technology
15. What is the term used to describe the character sequences such as <name> that serve as the
endpoints for a defined group of textual characters?
ANS:
XML tags
XML
16. A user-interface output design technique that allows a user to select a summary field and view the
supporting details is called _______.
ANS:
drill down
drill-down
ESSAY
1. List and briefly describe at least four of the eight important User-Interface Design Concepts for
the overall design of the user interface.
ANS:
1. Affordance and Visibility -- This means that controls should be visible and their shape should
be similar to the function they perform (affordance). They should also provide visible feedback
as things occur. For example a small diskette means “save” and it changes color after a document
has been saved.
2. Consistency - User interface screens or pages should have the same look and feel across all
screens/pages. The location of similar function buttons or icons should be consistent across the
entire application.
3. Shortcuts -- Power users soon like to be able to work rapidly by having shortcuts. One
powerful way is to allow users to set up their own shortcut keys.
4. Feedback -- Icons and buttons should give and indication when they are working and when
they have completed a task.
5. Dialogs that yield closure -- Let the user know when something is complete. Give a message
such as “credit card accepted” or “transaction complete.”
6. Error handling -- Provide clear error messages and if possible some hint or instruction on how
to fix the error for input types of errors.
7. Easy reversal of actions -- All users make mistakes and need to be able to “back up.” Note:
some Apple functions to automatic save, so that without an “undo” function it is hard to revert
back.
8. Reducing Short-Term Memory load -- A user should never have to write something down to
remember it from page to page. Carry information over when necessary and make it visible for
the users.
2. 2. When designing user interface pages there are four special considerations for Web Browser
User Interfaces. Briefly discuss each of these special considerations.
ANS:
1. Consistency -- Although it is true of all user interface screens, it is especially important for
Web pages. The difficulty lies in that different browsers will display the same page differently.
Tools such as CSS files can assist in formatting pages consistently.
2. Performance considerations -- Since all pages must be transmitted across the Internet, the
bandwidth and amount of information sent can cause degradation and poor response time for the
user. Designers must balance between powerful, user friendly pages, and keeping the amount of
data sent to a minimum.
3. Pictures, video, sound -- Two issues here. These files tend to be very large so that there can be
considerable delay. To view or listen to pictures, video and sound often requires special plugins
for the browsers. Different browsers, i.e. PC versus Apple versus Unix often will have different
methods to display.
4. Users with disabilities -- Since Web based systems are meant for the general public, this
includes many people with disabilities. Additional consideration should be given to accommodate
the needs of these people and provide assistive technology capabilities when possible.
3. Briefly describe each of the four metaphors for designing the Human-Computer Interface.
ANS:
1. Direct manipulation metaphor - Manipulating objects on a display that look like physical
objects (pictures) or that represent them (icons)
2. Desktop metaphor - Organizing visual display into distinct regions, with a large empty
workspace in the middle and a collection of tool icons around the perimeter
3. Document metaphor - Visually representing the data in files as paper pages or forms. These
pages can be linked together by references (hyperlinks)
4. Dialog metaphor - The user and computer accomplishing a task by engaging in a conversation
or dialog by using text, voice, or tools, such as labeled buttons
TRUE/FALSE
2. A project that has high technical risk should use the predictive approach.
5. The SDLC development approach taught in the textbook is a variation of the spiral model.
7. The predictive waterfall SDLC explicitly includes a support phase, but the adaptive SDLCs do
not.
10. Anytime people need to either record or communicate information, it is useful to create a model.
12. The data flow diagram is used with the structured analysis system development technique.
13. Many systems being developed today combine traditional and object-oriented technology.
15. In Agile Development, contracts include options for the customer to cancel if the project is not
progressing, as measured by the incremental deliverables.
16. Agile Modeling emphasizes creating only models that are necessary.
17. In Agile Modeling, change is seen as the exception, not the norm.
18. Agile Modeling principles suggest that CASE tools should be used whenever possible.
19. An Agile Modeling practice used in incremental modeling is to create several models in parallel.
20. Maintaining simplicity in Agile Modeling eliminates the need for validating the models with
code.
MULTIPLE CHOICE
1. An approach to the SDLC that plans the project in advance and then progresses according to the
plan is called what?
a. A predictive c. An Agile approach
approach
b. An adaptive approach d. A project
management
approach
ANS: A PTS: 1 REF: p228
2. The _____ approach is an SDLC approach that assumes the output of each phase are frozen
before moving on to the next phase.
a. iterative c. waterfall model
b. spiral model d. prototyping
ANS: C PTS: 1 REF: p229
4. An approach to the SDLC where the phases overlap is often referred to as the _______ approach.
a. modified waterfall c. modified predictive
b. waterfall d. spiral
ANS: A PTS: 1 REF: p229
5. The term ____ refers to an approach that completes parts of a system in one or more iterations
and puts them into operation for users.
a. incremental c. bottom-up
development development
b. adaptive development d. predictive
development
ANS: A PTS: 1 REF: p232
6. The term “____” means that work activities are done once, then again, and yet again.
a. agile modeling c. waterfall approach
b. iteration d. incremental
development
ANS: B PTS: 1 REF: p231
7. Which of the following is NOT one of the major activities of the support phase?
a. Training the users c. Enhancing the system
b. Maintaining the d. Supporting the users
system
ANS: A PTS: 1 REF: p232
8. The objective of the ____ is to keep the system running productively during the years following
its initial installation.
a. version release c. maintenance phase
b. support phase d. deployment phase
ANS: B PTS: 1 REF: p232
9. A(n) _____ provides guidelines to follow for completing every activity in systems development,
including specific models, tools, and techniques.
a. predictive approach
b. object-oriented analysis
c. system development methodology
d. systems development life cycle
ANS: C PTS: 1 REF: p233
10. The term “_______” is used to separate out some aspect of the real world that is important to
understand when we build a model.
a. brainstorm c. analysis
b. synthesis d. abstraction
ANS: D PTS: 1 REF: p234
11. A(n) “_______” is a guideline to help an analyst complete a specific task and often includes step-
by-step instructions to do something such as how to create a model.
a. tool c. methodology
b. technique d. SDLC
ANS: B PTS: 1 REF: p235
13. A hierarchical program structure consisting of a boss or control module which calls submodules
is called what?
a. traditional program c. ordered program
structure structure
b. top-down d. bottom-up
programming programming
ANS: B PTS: 1 REF: p237-238
14. One main principle of structured design is that program modules should be designed so that they
are ____.
a. highly cohesive c. tightly structured
b. tightly coupled d. highly engineered
ANS: A PTS: 1 REF: p238
15. An important way to measure the quality of a module in structured programming is by assessing
its _____.
a. structured design c. internal constructs
b. top-down approach d. cohesion and
coupling
ANS: D PTS: 1 REF: p238
16. The key graphical model of the systems requirements used with structured analysis is the ____.
a. flowchart c. activity diagram
b. data flow diagram d. structure chart
ANS: B PTS: 1 REF: p239
17. A(n) ____ program is one that has one beginning and one ending.
a. iterative c. object-oriented
b. incremental d. structured
ANS: D PTS: 1 REF: p237
19. A graphical diagram whish shows the hierarchical organization of modules is called a(n)
_______.
a. Entity relationship c. structure chart
diagram (ERD)
b. top-down chart d. data flow diagram
ANS: C PTS: 1 REF: p238
20. _____ consists of writing statements in a programming language to define what each type of
object does.
a. OOP c. OOD
b. OOA d. OOS
ANS: A PTS: 1 REF: p241
21. A(n) _______ is used to show the interacting messages between objects that collaborate.
a. activity diagram c. sequence diagram
b. class diagram d. data flow diagram
ANS: C PTS: 1 REF: p242
22. Reuse is one of the primary benefits of using what type of development methodology?
a. Object-oriented c. Top-down
b. Structured d. Iterative
ANS: A PTS: 1 REF: p242
23. ____ is a philosophy and set of guidelines for developing software in an unknown, rapidly
changing environment.
a. Object-oriented c. Pair programming
development
b. Refactoring d. Agile development
ANS: D PTS: 1 REF: p244
28. A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of
users are not well understood.
a. predictive c. incremental
b. persistent d. adaptive
ANS: D PTS: 1 REF: p228
29. In Agile modeling what are the two important reasons for building models?
a. To understand what you are building and to
communicate the solution
b. To document a solution and to instruct other
developers
c. To communicate with the user and to obtain
feedback
d. To write good code and to design good
databases
ANS: A PTS: 1 REF: p246
COMPLETION
1. The term “____________________” refers to related system development activities, which are
grouped into categories of project planning, analysis, design, implementation, and support.
ANS:
phase
Phase
2. A method of executing the systems development life cycle (SDLC) which assumes rigid planning
and final decision making at each step, is called the ____________________ approach.
ANS:
waterfall
waterfall model
3. One of the earliest adaptive SDLC approaches that cycles over and over again through
development activities is called the _______.
ANS:
spiral model
spiral model approach
spiral approach
spiral
4. A development approach in which the complete system structure is built but with minimum
functionality is called the _______.
5. The availability of support staff to assist users with technical or processing problems is called the
_______.
6. Using a(n) ____________________ approach to the SDLC assumes requirements and needs for
the planned system are uncertain
ANS: adaptive
7. The “_______” refers to software development using structured analysis and structured design
models.
ANS:
structured approach
traditional approach
9. Name the programming approach where each module has one start point and one end point and
uses only sequence, decision, and iteration.
ANS:
Structured programming
structured programming
10. The primary structured analysis model that shows inputs, processes, storage, and outputs is called
the ______.
ANS:
data flow diagram
data flow diagram (DFD)
DFD
data-flow diagram
11. A thing in an information system that responds to messages by executing functions or methods is
called a(n) _______.
ANS: object
12. What is the term used to describe system development based on the view that a system is a set of
interacting objects that work together?
ANS:
object-oriented approach
object oriented approach
object-oriented development
object-oriented programming
13. What is the term used to describe an adaptive type of project that is both chaotic and controlled or
ordered?
ANS:
chaordic
Chaordic
14. What is the term used to describe a guiding philosophy in which only the models that are
necessary, with a valid need and the right level of detail, are created.
ANS:
Agile modeling
agile modeling
Agile
Agile Modeling (AM)
15. An SDLC approach that completes portions of the system in small increments across iterations
and integrates it into the whole is called _____.
ANS: incremental development
16. A set of tools that work together to provide a comprehensive development and programming
environment is called a(n) _____.
ANS:
integrated development environment
integrated development environment (IDE)
IDE
17. In the structured approach the concept of dividing a complex program into a hierarchy of program
modules is called _____.
ANS:
top-down programming
top down programming
ESSAY
1. List and briefly describe the three major activities that occur during the support phase.
ANS:
1. Maintaining the system - Fixing errors and problems
2. Enhancing the system - Adding new capabilities to the existing system
3. Supporting the users - Providing technical help to the users, often with a help desk.
2. Explain the difference between “An approach to the SDLC” and “An approach to software
construction.”
ANS:
An approach to the SDLC has to do with whether the project methodology is predictive or
adaptive and what specific project methodology is used.
3. List the three constructs that are used for structured programming.
ANS:
1. Sequence
2. Decision
3. Iteration
ANS:
Develop software as your primary goal
Enable the next effort as your secondary goal.
Minimize your modeling activity—few and simple.
Embrace change, and change incrementally.
Model with a purpose.
Build multiple models.
Build high-quality models and get feedback rapidly.
Focus on content rather than representation.
Learn from each other with open communication.
Know your models and how to use them.
Adapt to specific project needs.
TRUE/FALSE
1. A good project manager focuses his energy on the success of the project team and allows the
oversight committee to monitor and report project status.
2. A major reason that software development projects to fail is due to poor project management.
3. In 2009 almost over two-thirds of all software development projects had serious problems with
delivering satisfactory results on time.
5. Since the Agile philosophy embraces change, project scope management is not important for
Agile projects.
7. With Agile Time Management scheduling is only done on a micro level and not a macro level.
8. With Agile Cost Management it is important to control the costs, even more important than
estimating the costs to get project approval.
9. Agile project managers do not try to answer the question “How much will the project cost?”
10. In Agile projects the easiest portions of the system are built in the first few iterations.
12. It is usually impossible to make an accurate estimate of the time required to complete a
development project.
13. One important step in estimating the time required for a project is to try to identify all of the
functional requirements of a the new system.
14. One of the responsibilities of the project manager in getting a project approved is to try to predict
the value of business benefits.
15. In adaptive, iterative projects there are usually two types of schedules created.
MULTIPLE CHOICE
2. Which of the following best describes the reason why projects fail?
a. Technological problems
b. System is too complex
c. Wrong development methodology
d. Undefined project management practices
ANS: D PTS: 1 REF: p256
3. According to the CHAOS report for 2009 what is the percent of projects that can be considered
completely successful?
a. 44% c. 24%
b. 32% d. 60%
ANS: B PTS: 1 REF: p255
4. The organization and direction of other people to achieve a planned result within a predetermined
schedule and budget is called what?
a. Project delivery c. Project human
management resource management
b. Project integration d. Project management
management
ANS: D PTS: 1 REF: p26
5. Which of the following is NOT one of the external responsibilities of a project manager?
a. Report project status c. Work with the client
b. Assess project risks d. Identify resource
needs
ANS: B PTS: 1 REF: p257
6. Which of the following is NOT one of the internal responsibilities of a project manager?
a. Develop the project schedule
b. Develop specifications
c. Assign work to team members
d. Monitor project milestones
ANS: B PTS: 1 REF: p257
10. Project Quality Management is different for Agile projects because they place heavy emphasis in
what additional area?
a. The quality of the testing process.
b. The quality of the project processes.
c. The quality of the deliverables.
d. The quality of the team members.
ANS: B PTS: 1 REF: p261-262
12. Which of the following is NOT a standard reason for initiating a system development project.
a. To respond to an opportunity
b. To reduce staffing requirements
c. To resolve a problem
d. To respond to an external directive
ANS: B PTS: 1 REF: p262
13. A ____ combines three components: the problem description, the business benefits, and the
system capabilities.
a. Project charter c. System vision
document
b. Proof-of-concept d. System scope
analysis document
ANS: C PTS: 1 REF: p263
14. Which of the following is NOT a common question asked by the client before giving project
approval?
a. How much will it cost?
b. How long will it take?
c. Who is the project manager?
d. What are the benefits?
ANS: C PTS: 1 REF: p265
15. Usually the highest cost for the development and deployment of a new system is _____.
a. License fees for new c. Computer and
software network equipment
b. Salaries of the d. Data center costs
development team
ANS: B PTS: 1 REF: p266
16. The time from the deployment of a new system until the break-even point is reached is sometimes
called the ______.
a. investment period c. return on investment
b. net present value d. payback period
ANS: D PTS: 1 REF: p268
18. Which is NOT one of the primary areas for risk and feasibility analysis?
a. Organizational risks c. Schedule risks
b. Deployment risks d. Resource risks
ANS: B PTS: 1 REF: p269
19. The fear of using a computer (computer phobia) is a type of _______ risk.
a. Technological risk c. Organizational risk
b. Resource (people) d. Deployment risk
risk
ANS: C PTS: 1 REF: p269
20. Missing milestones on a project may be an indication of project that has high _______ risk.
a. Schedule c. Deployment
b. Resource d. Technological
ANS: A PTS: 1 REF: p271
21. Which of the following is NOT one of the activities of the second core process to plan and
monitor the project.
a. Establish the work c. Evaluate work
environment processes
b. Build work schedules d. Estimate the project
length
ANS: D PTS: 1 REF: p271
22. Which is NOT an activity associated with establishing the project environment?
a. Record and communicate project information.
b. Establish the working environment.
c. Establish team processes and procedures.
d. Identify staffing requirements.
ANS: D PTS: 1 REF: p272
23. The creation of a work breakdown structure is helpful in the development of what?
a. Software testing plan.
b. Project iteration schedule.
c. Detailed work schedule.
d. Detailed effort estimates of work tasks.
ANS: C PTS: 1 REF: p277
24. Estimating the effort required and identifying task dependencies is usually part of the work to
create what?
a. The project iteration c. The project time
schedule estimate
b. The detailed work d. The critical path
schedule
ANS: B PTS: 1 REF: p277
25. When the project team asks “Are our working relationships with the user effective?” it is doing
what?
a. An end of iteration c. A performance
review review
b. An end of project d. A work breakdown
review structure
ANS: A PTS: 1 REF: p281
26. Which of the following is NOT one of the activities associated with staffing the project team?
a. Conducting team-building exercises.
b. Developing a resource plan.
c. Organizing work groups.
d. Setting up programming rules and guidelines.
ANS: D PTS: 1 REF: p279
27. Which is NOT a criterion that is used to determine how to define tasks for a work breakdown
structure.
a. How to know when the task is complete.
b. How to estimate the effort required.
c. A logical way to determine its predecessor.
d. It should take one to five days.
ANS: C PTS: 1 REF: p279
28. Given a project schedule with all tasks connected with one-way arrows and task durations. The
critical path is _____.
a. the longest path through the network
b. the shortest path through the network
c. neither the longest nor shortest path through
the network
d. it cannot be determined
ANS: A PTS: 1 REF: p279
29. The present value of $200,000 development costs in year 0 assuming a 10% discount rate is:
a. $180,000 c. $200,000
b. $190,000 d. $210,000
ANS: C PTS: 1 REF: p268
MULTIPLE RESPONSE
1. Which two of the following are activities belonging to the first core process?
a. Schedule the work
b. Perform risk and feasibility analysis
c. Choose the project manager
d. Establish the project environment
e. Evaluate the work processes
f. Quantify project approval factors
ANS: B, F PTS: 2 REF: p262
2. Which two of the following activities belong to the second core process of planning and
monitoring the project?
a. Establish the project environment
b. Estimate the project cost
c. Analyze project risk and feasibility
d. Determine project scope
e. Estimate the project length
f. Staff and allocate resources
ANS: A, F PTS: 2 REF: p271
3. Which two of the following questions (decision points) are important when monitoring project
progress?
a. Is the task on target?
b. Is the task too large?
c. Is the task clearly defined?
d. Is the variance significant?
e. Is the corrective action sufficient?
f. Is the status complete?
ANS: A, D PTS: 2 REF: p281
COMPLETION
1. The term “____________________” refers to the organization and direction of other people to
achieve a planned result within a predetermined schedule and budget.
2. The person or group that funds the project is called the _____ .
ANS: client
3. The person or group that work directly with the system are called _______ .
ANS:
user
users
4. The _______ consists of clients and key manager who review the progress and direct the project.
ANS: ceremony
ANS:
PMBOK
Project Management Body of Knowledge
7. A document to help define the scope of the new system is called a _____.
ANS:
system vision document
System vision document
System Vision Document
8. The benefits that accrue to an organization, usually measured in dollars, from the deployment of a
new system are called ______.
9. The required functions and capabilities of the new system that are developed in order to get
approval for the development project are called the _______.
10. The dollar value of benefits reduced by the dollar value of costs combined together and expressed
in current dollars is called the ______.
ANS:
net present value
NPV
Net Present Value
11. What is the name given to the process of comparing costs and benefits to see whether investing in
a new system will be beneficial?
ANS:
cost/benefit analysis
cost benefit analysis
cost-benefit analysis
Cost/benefit analysis
Cost Benefit Analysis
Cost-benefit analysis
12. The point in time at which dollar benefits offset the dollar costs is called the _______ .
ANS:
break-even point
break even point
13. What is the term that describes the time period after which the dollar benefits have offset the
dollar costs?
ANS:
payback period
pay back period
pay-back period
Payback period
Pay Back Period
Pay-back Period
ANS: intangible
15. The hierarchical list of activities of a project that is used to create work schedule is called the
_____.
ANS:
work breakdown structure
WBS
work breakdown structure (WBS)
16. A bar chart that portrays the schedule by the length of horizontal bars is called a _______.
17. The sequence of tasks in a schedule that cannot be delayed without delaying the project is called
the _______ .
ANS: critical path
18. The meeting held at the end of an iteration to determine what was successful and what can be
improved is called what?
ANS:
Retrospective
retrospective
A retrospective
ESSAY
1. List several (at least four) reasons why projects fail as determined by the CHAOS report.
ANS:
1. Undefined project management practices
2. Poor IT management and poor IT procedures
3. Inadequate executive support
4. Inexperienced project managers
5. Unclear business objectives
6. Inadequate user involvement
2. List several (at least four) of the internal responsibilities of a project manager.
ANS:
1. Develop the project schedule
2. Recruit and train team members
3. Assign work to teams and team members
4. Assess project risks
5. Monitor and control project deliverables and milestones
ANS:
1. Report the projects progress and status
2. Work with the client and other stakeholders
3. Identify resource needs and obtain resources
5. List the four activities of the first core process: Identify the problem and obtain approval.
ANS:
1. Identify the problem
2. Quantify project approval factors
3. Perform risk and feasibility analysis
4. Review with the client and obtain approval
6. List the three primary reasons for initiating a software development project.
ANS:
1. To respond to an opportunity
2. To resolve a problem
3. To respond to an external directive
7. List three primary criteria to obtain approval for a project. These criteria are often three key
questions asked by the client before giving approval.
ANS:
1. How long will it take? (What is the estimated time)
2. How much will it cost? (What is the estimated cost)
3. What will it do for us? (What are the estimated benefits.)
8. List four primary areas that are considered in risk and feasibility analysis.
ANS:
1. Organizational risk and feasibility
2. Technological risk and feasibility
3. Resource risk and feasibility (usually people resources)
4. Schedule risks and feasibility
ANS:
1. Establish the work environment.
2. Schedule the work.
3. Staff and allocate resources.
4. Evaluate work processes.
5. Monitor progress and make corrections.
10. List the three steps required to develop a detailed schedule of the work to be done within an
iteration.
ANS:
1. Develop a work breakdown structure.
2. Estimate effort and identify dependencies
3. Create the schedule with a Gantt chart.
TRUE/FALSE
1. “Just in time” systems design is a popular technique used in adaptive approaches to projects.
2. In object-oriented design, the design models are extensions of the analysis models.
3. One tenet of Agile philosophy is that while analysis models may be useful, it generally is not
necessary to develop design models.
4. The objective of object-oriented analysis is to identify the objects that must work together to
carry out each use case.
5. Software systems can generally be divided into three types of systems: single-user systems,
enterprise-level systems, and Web-based systems.
7. The objective of object-oriented detailed design is to identify and specify all the objects that must
work together to carry out each use case.
9. One big difference between an Internet based system and a Client/Server system is that an
Internet system maintains state information.
10. The interface for a component in a component diagram is denoted by a ball or a port.
11. Two layer architectures are interesting in theory, but are seldom if ever used.
12. The primary difference between a design class symbol and a problem domain class symbol is the
addition of method signatures.
13. Detailed Object-oriented design (OOD) is done on a use case-by-use case basis.
14. Developers do not typically add more classes to design class diagrams than were originally
defined in the domain model.
15. It is usually a bad idea to try to include user-interface classes to a CRC design.
MULTIPLE CHOICE
3. Which of the following is NOT one of the categories of difference between networked based
systems and Internet based systems.
a. State configuration c. Server configuration
b. Client configuration d. Connectivity
configuration
ANS: D PTS: 1 REF: p299
4. Ports and sockets are used to show the interface in what kind of UML diagram?
a. Deployment diagram c. Package diagram
b. Network diagram d. Component diagram
ANS: D PTS: 1 REF: p300
6. The original method used to process input data in a Web based system was by using computer
programs in ______.
a. the Java programming language
b. the .NET programming suite
c. the C++ language for the CGI
d. the Javascript programming language
ANS: C PTS: 1 REF: p303
8. A set of public methods of a system that can be used by the outside world is referred to as
______.
a. MVC c. CRC
b. API d. DCD
ANS: B PTS: 1 REF: p300
9. Which diagram is directly used to write programming code for object-oriented systems?
a. Sequence diagram c. Package diagram
b. Design class diagram d. State-machine
diagram
ANS: B PTS: 1 REF: p305
10. Which two models are the primary models in object-oriented detailed design?
a. Design class diagram and component diagram
b. Package diagram and CRC cards
c. Sequence diagram and state machine diagram
d. Sequence diagram and design class diagram
ANS: D PTS: 1 REF: p308
12. An input window class is an example of a(n) ____ design class type.
a. boundary c. entity
b. control d. persistent
ANS: A PTS: 1 REF: p309
13. A(n) ____ class acts as a switchboard between the view layer and the domain layer.
a. boundary c. entity
b. control d. persistent
ANS: B PTS: 1 REF: p309
14. Which of the following is included in the top compartment of a design class?
a. Attributes c. Type-expression
b. Parameter list d. Stereotype name
ANS: D PTS: 1 REF: p310
15. In design class notation, the ____ of an attribute is enclosed in curly braces {}.
a. visibility c. initial-value
b. type-expression d. property
ANS: D PTS: 1 REF: p310
16. Which of the following is valid Unified Modeling Language (UML) notation for a method
signature?
a. visibility name:type-expression {parameter
list}
b. name:class-name (parameter list):type-
expression
c. visibility name(parameter list):type-
expression
d. visibility class-name:name:type-expression
{parameter list}
ANS: C PTS: 1 REF: p310
17. Which of the following is correct UML notation for an attribute in a design class?
a. visibility name:type-expression = initial-
value{property}
b. visibility class-name:type-expression
{property}
c. visibility name:initial-value(property)
d. visibility name:type-expression initial-value
(property)
ANS: A PTS: 1 REF: p310
18. Given two classes, customer and order, which class would probably have navigational visibility
to which class?
a. Cannot determine based on the information
provided
b. Bidirectional -- each has visibility to the other
c. Order to Customer
d. Customer to Order
ANS: D PTS: 1 REF: p313
19. If you are doing detailed design for the use case Create New Order, which class should receive
the first input?
a. OrderTransaction c. OrderHandler
b. Order d. Customer
ANS: C PTS: 1 REF: p314
21. UML provides a technique to extend the standard UML notation to include new symbols. This
technique is called ________.
a. extending c. prototyping
b. stereotyping d. externalizing
ANS: B PTS: 1 REF: p309
22. Which of the following is usually NOT included in a first-cut design class diagram?
a. Initial value c. Method signatures
information for
attributes
b. Attribute types d. Navigation visibility
arrows
ANS: C PTS: 1 REF: p313-314
23. Which of the following is a general guideline for designing navigation visibility?
a. A superior/subordinate relationship is usually
navigated from the superior to the subordinate
class
b. A superior/subordinate relationship is usually
navigated from the subordinate to the superior
class
c. Relationships in which objects in one class
cannot exist without objects of another class
are usually navigated from the more
dependent class to the more independent class
d. Navigation arrows should not be modified
during the design process
ANS: A PTS: 1 REF: p313
24. After completing a use-case design using CRC cards, the next step is to _______.
a. add required utility c. program the use case
classes
b. select another use d. update the design
case class diagram
ANS: D PTS: 1 REF: p316
27. Which of the following is the best coupling choice for an input window, domain, and database
object in a system?
a. The input window is coupled to both the
domain and database objects.
b. The input window is coupled to the domain
and the domain is coupled to the database.
c. The input window and the domain are both
coupled to the database object.
d. All objects are coupled to each other.
ANS: B PTS: 1 REF: p317
29. ____ is a qualitative measure of the consistency of functions within a single class.
a. Cohesion c. Coupling
b. Encapsulation d. Visibility
ANS: A PTS: 1 REF: p318
30. A class that is responsible for accessing both the Internet and a database has ____ cohesion.
a. very low c. medium
b. low d. high
ANS: A PTS: 1 REF: p318
31. A class named SaleItem which has methods to calculate its own price is said to have good
______.
a. API c. coupling
b. cohesion d. object responsibility
ANS: D PTS: 1 REF: p319
MULTIPLE RESPONSE
1. Which of the following are two primary methods used to design and implement enterprise-level
systems. (choose two)
a. Client-server d. Desktop systems
networked systems
b. Client-server stand e. Mobile app systems
alone systems
c. Internet systems f. Open-source systems
ANS: A, C PTS: 2 REF: p299
2. Which of the following are information items on CRC cards. (Choose two)
a. Object names d. Stereotypes
b. Method signatures e. Interactions
c. Attributes f. Responsibilities
ANS: C, F PTS: 2 REF: p315
COMPLETION
1. The creation of a programming object based on the template provided by the class definition is
called _______.
ANS:
instantiation
Instantiation
instantiating an object
2. When a system has shared resources among multiple people or groups it is called a(n) _______.
ANS:
enterprise-level system
enterprise level system
3. What is the name of the diagram that is an implementation diagram which shows the overall
system architecture and the logical components within it?
4. When a system is built with public methods that other systems can use to access its functionality,
that is called the system’s _______.
ANS:
application program interface (API)
application program interface
API
PTS: 2 REF: p300
6. The main purpose of a(n) ____________________ diagram is to document and describe the
programming classes that will be built for the new system.
7. A(n) ____________________ class is a class that is used to retrieve data from a database.
8. A(n) _______ class is one where its objects exist after the system is turned off.
ANS:
persistent
persistence
9. What is the term used to define the characteristic of an object attribute that describes whether it
can be directly accessed by another object -- denoted by + or - ?
ANS: visibility
10. What do we call the notation that shows all the information required to call or invoke a method?
11. What is the term to denote a method that is invoked on a class instead of on an object?
ANS:
class-level method
class level method
12. The term used to identify an attribute that contains the same value for all objects of this type in
the system is _______.
ANS:
class-level attribute
class level attribute
13. A class that can never have objects of its type created is called a(n) _______.
14. A class that can be instantiated with objects of its type being created is called a(n) ______.
15. The term “_______” is a design principle in which one object has reference to another object and
can thus interact with it.
ANS:
navigation visibility
navigational visibility
16. A brainstorming technique for designing interactions in use cases by assigning responsibilities
and collaborations for classes is called _______ .
ANS:
CRC cards
class responsibility collaboration cards
17. The term “_______” is a measure of the focus or unity of purpose within a single class.
ANS:
cohesion
Cohesion
18. What is the term that is used to describe a design principle in which parts of a system that are
unlikely to change are segregated from those that will?
ANS:
Protection from variations
protection from variations
protection-from-variations
19. What term is used to describe a design principle in which an intermediate class is placed between
two classes to decouple them but still link them?
ANS:
indirection
Indirection
20. A design principle in which objects are responsible for carrying out system processing is called
______.
ANS:
object responsibility
object-responsibility
ESSAY
1. List five important UML design models, and describe their use.
ANS:
1. Component diagram -- to show the overall structure of the solution with identification and
relationships between the major components, such as servers, of the solution.
2. Deployment diagram -- to show the equipment used to deploy the solution, and which
components reside on which equipment
3. Design class diagram -- to describe all the programming classes, their attributes and methods.
4. Interaction diagrams (sequence diagrams or communication diagrams) -- to show the detail
design of a use case by identifying all the internal messages required
5. Design state machine diagram -- to describe the states of an object and thus define the valid
states and transitions of an object
6. Package diagrams -- to show which sets of classes associate together in subsystems or other
closely related groups of classes
ANS:
Step 1. Develop a first cut design class diagram.
Step 2. (optional) Develop a set of CRC cards for each use case.
Step 3. Develop detailed sequence diagrams for each use case. Do this with a first cut sequence
diagram which focuses on the problem domain classes. Add multilayers.
Step 4. Update the design class diagram with methods and navigation information
Step 5. Partition the solution with package diagrams as appropriate
3. Describe the three major differences between a client/server system and an Internet based system.
ANS:
State -- client/server is stateful but Internet is stateless
Client configuration -- client/server has designed screens and forms under the control of the client
program. Internet uses a browser to present screens and forms.
Server configuration -- Application server directly connects to the client. Application serves its
functions and data through a Web server.
ANS:
1. Select a single use case. Create a use case controller card.
2. Identify the primary problem domain class that has responsibility for this use case.
3. Identify all the other problem domain classes that are needed to carry out functions to complete
this use case. Define the individual responsibilities of each class. Also define which classes
collaborate (e.g. use) other classes to provide functions or information.
TRUE/FALSE
1. Adding a use case controller to a sequence diagram is an example of applying a design pattern.
3. The starting point for the detailed design of a use case is always the SSD.
5. The first-cut sequence diagram contains view layer and business layer.
8. The perfect memory assumption means that there is always adequate memory to execute the
program.
9. The perfect technology assumption means not to worry about issues such as user security.
10. The perfect solution assumption means that we do not worry about exception conditions.
11. A loop or repeating message or messages in a sequence diagram is depicted by a rectangle box.
12. Separation of responsibilities is a design principle which dictates that reading a database should
not be done in a problem domain class.
13. The best technique for accessing the database when multiple objects are needed is just to let the
data access object instantiate objects.
14. There are two preferred methods to accessing the database. One is to have newly instantiated
object call the data access object. The other is to let the controller access the data access object.
15. Since updating a design class diagram is done after the use case realization is complete, visibility
information is no longer necessary.
17. The code “if (someObject == null)” is part of the factory pattern.
ANS: T PTS: 1 REF: p358-359
MULTIPLE CHOICE
1. System designers frequently create a class called a ____ that can serve as a collection point for
incoming messages.
a. switchboard c. use case controller
b. message controller d. message collector
ANS: C PTS: 1 REF: p330-331
2. What is the least cohesive approach in creating use case controllers in a system?
a. Define a single controller for all use cases.
b. Define several controllers, each with a
specific set of responsibilities
c. Create a single controller for a single
subsystem
d. Create one controller per use case
ANS: A PTS: 1 REF: p330
3. The realization of a use case–determining what objects collaborate by sending messages to each
other to carry out the use case–is done through the development of a(n) ____ diagram.
a. system sequence c. interaction
b. package d. design class
ANS: C PTS: 1 REF: p332
5. Which of the following is NOT a valid technique to return data from an input message?
a. A return object name c. A return value on an
input message
b. A return message d. A return condition
name
ANS: D PTS: 1 REF: p334
6. When a message is sent from an originating object to a destination object it means that ______.
a. data is being passed from the origin object to
the destination object
b. a transition is occurring between the objects
c. a method is being invoked on the originating
object
d. a method is being invoked on the destination
object
ANS: D PTS: 1 REF: p334-335, p342
7. What is the first step in constructing a first-cut sequence diagram from the elements of the system
sequence diagram (SSD)?
a. Determine which messages must be sent
b. Create a use case controller
c. Replace the :System object with all the
objects that must collaborate
d. Select an input message from the use case
ANS: C PTS: 1 REF: p337
8. Developing a(n) ____ diagram is a multistep process of determining which objects work together
and how they work together.
a. design class c. state machine
b. interaction d. package
ANS: B PTS: 1 REF: p335
9. When denoting a specific object in a sequence diagram, a ____ serves as the divider between the
object name and the specific object identifier.
a. double colon c. dash
b. colon d. dot
ANS: B PTS: 1 REF: p334
10. When a use case controller receives the initial request for an inquiry when the data access layer is
added, it first ____.
a. begins the process to initialize the necessary
objects in memory
b. sends a message to the database to see if it is
available
c. sends a message to the appropriate data access
object to retrieve the data
d. sends a return message to the view layer
ANS: A PTS: 1 REF: p334
11. In a sequence when one assumes that the objects are already available to receive messages, that is
considered to be the _______.
13. User interface objects in a sequence diagram often are labeled with the stereotype ____.
a. entity c. control
b. view or boundary d. persistent
ANS: B PTS: 1 REF: p348
15. The primary models used for OO detailed design are ____ diagrams.
16. Which design model provides information for a design class diagram?
a. Deployment diagram c. Statechart diagram
b. Interaction diagram d. Package diagram
ANS: B PTS: 1 REF: p351
17. Which of the following symbols is used in a communication diagram, but not in a sequence
diagram?
a. Message arrow c. Activation lifeline
b. Object d. Link
ANS: D PTS: 1 REF: p350
18. Communication diagrams indicates the order of the messages with ____.
a. sequence numbers c. arrows
b. activation lifelines d. links
ANS: A PTS: 1 REF: p349-350
19. ____ methods must be included in a design class diagram.
a. Constructor c. Getter
b. Use case specific d. Setter
ANS: B PTS: 1 REF: p352
20. The final step in the object-oriented design (OOD) process consists of developing the ____.
a. attributes of the c. interaction diagrams
design classes
b. method names of the d. package diagrams
design classes
ANS: D PTS: 1 REF: p353
21. ____ diagrams partition a design class diagram into related functions.
a. Statechart c. Interaction
b. Sequence d. Package
ANS: D PTS: 1 REF: p353
23. Which of the following is NOT a component of the design pattern template?
a. Problem that requires a solution
b. Example of the pattern
c. Description of when the pattern does not
apply
d. Consequences of the pattern
ANS: C PTS: 1 REF: p331
26. View layer classes should do all of the following EXCEPT _______.
a. capture clicks and data entry
b. start and shut down the system
c. create problem domain classes
d. display forms
ANS: C PTS: 1 REF: p355
27. A different implementation of a function is required in an existing system. The best way to
integrate this function into the system is ______
a. to write the code in a new class
b. to write the code in an existing class
c. with the factory pattern
d. with the adapter pattern
ANS: D PTS: 1 REF: p357
28. The customer relationship system needs to instantiate a new customer object. How should this be
done?
a. Let the factory object do it.
b. Let the view layer object do it.
c. Let the controller object do it.
d. Let another business object do it.
ANS: C PTS: 1 REF: p337-338
COMPLETION
1. Use case ____________________ is the process of detail design for a particular use case by
elaborating the messages that are necessary to execute the use case.
ANS: realization
2. Standard design techniques and templates that are recognized as good practice are called
_________________.
3. The _________________ pattern is a based on a class that helps to decouple the view layer from
the business logic layer by receiving all input messages.
ANS:
controller
use case controller
control
4. A type of interaction diagram that emphasizes the order of the messages between objects for a
specific use case is called a(n) ________ diagram.
ANS: sequence
5. A type of interaction diagram that emphasizes the objects that send and receive messages for a
specific use case is called a(n) _______ diagram.
ANS: communication
6. A representation of a period during which a method of an object is alive and executing is called
its _______.
ANS:
activation lifeline
activation life line
ANS:
first cut
first-cut
8. The ________________ DCD usually contains no method signatures, but does contain navigation
visibility.
ANS:
first cut
first-cut
ANS: message
11. Problem domain classes that must be remember between program execution are called ______
classes.
ANS: persistent
12. In a communication diagram, a(n) ____________________ is used to show that two items share a
message.
ANS: link
13. A type of interaction diagram that does not have activation lifelines is called a ____________
diagram.
ANS: communication
ANS: dependency
PTS: 2 REF: p353
15. _________________________ are relationships among elements that indicate which elements
affect other elements in a system.
16. A type of diagram that is used to define groups of classes as a subsystem is called a
_______________ diagram.
ANS: package
ANS: view
18. The _____________ pattern can be used to connect two disparate systems.
ANS: adapter
ANS: factory
20. A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.
ANS: singleton
ESSAY
1. List and briefly describe the five parts included in the description of a design pattern.
ANS:
1. Pattern name -- a title or name used to recognize the design pattern.
2. Problem -- a description of what the problem is that requires a solution. Justification for the
need for this particular design pattern.
3. Solution -- a description of how to implement this design pattern.
4. Example -- a specific example showing a diagrammatic or programming solution. Specific so
that it is obvious how this design pattern is applied.
5. Benefits or consequences -- How this design pattern solves the stated problem. What are the
specifics of the solution with regard to the identified problem.
2. Describe the three basic guideline steps for creating the messages in the first cut sequence
diagram.
ANS:
1. Take each input message and determine all other internal messages.
2. Identify all the classes required to support all of the internal messages for one input message.
3. Flesh out all internal messages with iteration, true/false conditions, return values, and passed
parameters.
3. What considerations should be taken into account when choosing the type of interaction diagram
for a system design model?
ANS:
Many designers use communication diagrams to sketch out a solution. If the use case is small and
not too complex, a simple communication diagram may suffice. Drawing a communication
diagram is an effective way to get a quick overview of the objects that work together. However,
for more complex situations, a sequence diagram may be required to visualize the flow and
sequence of the messages. It is not unusual to find a mix within the same set of specifications:
some use cases described by communication diagrams and others shown with sequence diagrams.
4. How has the differences between programming languages and database languages driven the
trend to a multilayer design?
ANS:
One of the problems with object-oriented programs that use databases is a slight mismatch
between programming languages and database Structured Query Language (SQL) statements. In
a database, tables are linked through the use of foreign keys and data is obtained through a
relational join. However, in OO programming languages, references are made to objects in
memory to obtain data. Therefore, the design, programming, and maintenance in a system is
easier if separate classes are defined to access the database and get the data in a form that is
conducive to processing in the computer. Rather than mix the business logic with the data access
logic, it is better to define separate classes and let each focus on its primary responsibility.
TRUE/FALSE
1. A relation describes the structure, content, and access controls of a physical data store or
database.
4. A foreign key is a field or set of fields stored in one table that also exists as a primary key in
another table.
5. Invented keys in a relational database are dangerous and require careful scrutiny.
6. Relationships in a relational database are usually represented by embedding a foreign key in each
participating table.
8. Classes that participate in a classification relationship can only be represented within a relational
database as a single table containing all the attributes in each class.
9. A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and
if every non-key field is functionally dependent on the primary key.
10. A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and
if no non-key field is functionally dependent on any other non-key field.
11. Problem domain modeling and database normalization are incompatible techniques for relational
database design.
ANS: F PTS: 1 REF: p383
12. One-to-many and many-to-many relationships are both represented by foreign keys in a relational
database.
13. Referential integrity is a consistent relational database state in which every foreign key value also
exists as a primary key value.
15. Completeness control is an integrity control that identifies when a value in a field is too large or
too small.
MULTIPLE CHOICE
1. A(n) ____ describes the structure, content, and access controls of a physical data store or
database.
a. relation c. schema
b. DBMS d. attribute
ANS: C PTS: 1 REF: p373
6. ____ are a critical element of relational database design because they are the bases for
representing relationships among tables.
a. Keys c. Fields
b. Attributes d. Tables
ANS: A PTS: 1 REF: p375
8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another
table.
a. primary key c. object identifier
b. foreign key d. column
ANS: B PTS: 1 REF: p375
10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be
unique.
a. columns c. rows
b. foreign keys d. values
ANS: C PTS: 1 REF: p375
11. An separate relation must be created to store the attributes of a ____ relationship among two other
classes.
a. one-to-one c. many-to-many
b. one-to-many d. not any (not
necessary)
ANS: C PTS: 1 REF: p380
12. ____ is a consistent relational database state in which every foreign key value also exists as a
primary key value.
a. First normal form c. Function dependency
(1NF)
b. Database d. Referential integrity
synchronization
ANS: D PTS: 1 REF: p382
14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields,
and hence all rows have the same columns.
a. first c. third
b. second d. fourth
ANS: A PTS: 1 REF: p383-384
16. A relational database table is in ____ normal form if every non-key field is functionally
dependent on the primary key.
a. first c. third
b. second d. fourth
ANS: B PTS: 1 REF: p385
17. A relational database table is in ____ normal form if no non-key field is functionally dependent
on any other non-key field.
a. first c. third
b. second d. fourth
ANS: C PTS: 1 REF: p386
18. What can be said about the following relational database table (key is underlined): (Choose the
most correct answer.)
CourseSectionID, StudentID, Grade, StudentName
a. Not in any valid normal form
b. In First Normal Form
c. In First and Second Normal Form
d. In First, Second, and Third Normal Form
ANS: B PTS: 1 REF: p385-386
19. What can be said about the following relational database table (key is underlined): (Choose the
most correct answer)
StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding
a. Not in any valid normal form
b. In First Normal Form
c. In First and Second Normal Form
d. In First, Second and Third Normal Form
ANS: C PTS: 1 REF: p385-386
20. A ____ database server architecture is the simplest to build and operate if sufficient network
capacity is already available for database access.
a. single c. partitioned
b. replicated d. cloud-based
ANS: A PTS: 1 REF: p387
21. A ____ database server architecture runs the greatest risk of service disruption in the event of a
server failure.
a. single c. partitioned
b. replicated d. cloud-based
ANS: A PTS: 1 REF: p387
22. A ____ database server architecture stores different parts of a database on different servers.
a. single c. partitioned
b. replicated d. cloud-based
ANS: C PTS: 1 REF: p388
23. Database synchronization should be implemented when using a(n) ____ database server
architecture.
a. single c. partitioned
b. replicated d. cloud-based
ANS: B PTS: 1 REF: p387
25. A ____ database server architecture is only feasible when a database schema can be cleanly
divided among client access user groups.
a. single c. replicated
b. partitioned d. cloud-based
ANS: B PTS: 1 REF: p389
27. An integrity control that verifies the data in one field against the data in other fields is called a
____ control.
a. completeness c. value
b. field combination d. data validation
ANS: B PTS: 1 REF: p394
28. What is a control that checks the value of a field to ensure that it is within the correct range?
a. Answer control c. Value limit control
b. Completeness control d. High-low control
ANS: C PTS: 1 REF: p393
29. What is the name of the control mechanism that is used to ensure that all necessary information
for a transaction has been entered?
a. Secure control c. Comprehensive
control
b. Total control d. Completeness control
ANS: D PTS: 1 REF: p394
30. What is the name of a general control technique used to ensure that entered data is correct?
a. Data validation c. Data acceptance
control control
b. Data access control d. Data completeness
control
ANS: A PTS: 1 REF: p394
31. Which of the following is NOT a factor that affects the risk of fraud?
a. Separation of duties c. Asset reconciliation
b. Monitoring d. Authorization of
users
ANS: D PTS: 1 REF: p397
32. Three types of users that are considered in the design of a security system are ____.
a. manager user, technical user, and clerical user
b. technical user, authorized user, and privileged
user
c. unauthorized user, registered user, and
privileged user
d. supervisor user, administration user, and
operational user
ANS: C PTS: 1 REF: p398
33. Which user is known to the system and is authorized to access all or certain parts of it?
a. Authorized user c. Valid user
b. Registered user d. Authenticated user
ANS: B PTS: 1 REF: p398
34. A user who has special security and access to a system, such as the right to assign passwords, is
called a ____.
a. supervisor user c. privileged user
b. database d. technical user
administrator
ANS: C PTS: 1 REF: p399
36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with
a(n) ____ key.
a. asymmetric c. public
b. private d. symmetric
ANS: B PTS: 1 REF: p399-400
37. A ____ is an institution's name and public key, which is encrypted and certified by a third party.
a. private key c. certifying authority
b. digital certificate d. digital key
ANS: B PTS: 1 REF: p400
COMPLETION
1. A(n) ____________________ describes the structure, content, and access controls of a physical
data store or database.
ANS: schema
2. A(n) _______ is the database component that actually stores the raw bytes of data.
3. In a database a two-dimensional data structure consisting of columns and rows is called a(n)
_______.
ANS:
table
relation
4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a
primary key in another table.
ANS:
Referential integrity
referential integrity
6. Non-key (“bad”) redundancy can be systematically identified and eliminated from a relational
database by ____________________ of the database.
ANS:
normalization
normalizing
ANS:
first
1NF
1st
8. A data type that is supported directly by computer hardware or a programming language is called
a(n) _______ data type.
ANS: primitive
9. A data type that is defined by extending or combining other data types is called a(n) ______ data
type.
ANS: complex
10. _______ database server architecture is poorly suited to applications that must be available on a
seven-day, 24-hour basis.
ANS: Single
11. When it is necessary to update one database copy with changes made to the other database, it is
called _________.
ANS:
database synchronization
synchronization
12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and
protects data and programs against tampering.
ANS: integrity
ANS:
value limit
value-limit
14. A(n) ______ control restricts which persons or programs can add, modify or view information.
ANS: access
15. A technique where all updates to a database are recorded with who, when, and how information is
called ________.
ANS:
transaction logging
logging
16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for
fraud to occur is called the ________.
17. A control that protects the assets of an organization against all threats, primarily external threats
is called ______ control.
ANS: security
18. ____________________ is the process of identifying a user to verify that he or she can have
access to the system.
ANS: authentication
19. _______ is the process of allowing or restricting a specific user’s access to specific resources.
ANS: authorization
21. In ____________________ encryption, the same key encrypts and decrypts the data.
ANS: symmetric
ANS:
digital signing
digital signature
23. A security measure that automatically deletes sensitive data from a portable device when an
unauthorized access is attempted is a called a(n) _______.
ESSAY
1. List and briefly describe the four components of a database management system.
ANS:
1. Application Program Interface -- allows programming language interface to write scripts and
logic to produce results based on complex logic.
2. End-user query processor -- this provides the SQL statements to query and update the database.
3. Administrative interface -- provides the functionality to create the schema and change the
database configuration parameters.
4. Database access and control logic -- this is the actual DB engine which updates the database
and retrieves results.
2. What danger(s) is/are inherent in using keys invented by external agents as primary keys in a
relational database?
ANS:
Referential integrity depends on primary key uniqueness. By using key values assigned by
external entities, an organization risks the possibility that referential integrity may be broken at
some time in the future (e.g., duplicate shipment tracking numbers from competing shipping
companies).
PTS: 5 REF: p377
3. List and briefly describe the four types of database server architecture described in the textbook.
ANS:
1. Single database server architecture —One or more databases are hosted by a single DBMS
running on a single server.
2. Replicated database server architecture —Complete database copies are hosted by cooperating
DBMSs running on multiple servers. The servers are usually distributed across geographic
locations.
3. Partitioned database server architecture —Multiple distributed database servers are used and
the database schema is partitioned, with some content on only one server and some content
copied on all servers.
4. Cloud-based database server architecture —This architecture isn’t really a separate
architecture. Rather, it is a specific implementation of one or more of the other architectures by
using the services of a cloud computing provider.
ANS:
An entity who wants a certificate with its name and public key goes to a certifying authority and
buys a certificate. The certifying authority encrypts the data with its own private key and gives
the data back to the original entity. When someone asks the entity for its public key, it sends the
certificate. The customer receives the certificate and opens it with the certifying authority’s public
key.
TRUE/FALSE
3. Due to design principles for object-oriented systems, such as cohesion and coupling, integration
testing is usually a straightforward process with little complexity.
4. Frequently customer payments for new systems are tied to specific acceptance tests.
ANS: T PTS: 1 REF: p417
5. In complex data conversions programs must be constructed and tested in the same manner as
operational software.
6. The purpose of system documentation is to help the end users understand the details of how the
system works.
7. How to start up the system and how to shut it down are examples of system documentation.
10. The primary advantage of direct deployment, as compared to other installation methods, is
minimal risk to business operations.
11. Parallel deployment is generally best when the consequences of a system failure are severe.
13. Partial parallel deployment and operation always entails the risk that significant errors or
problems will go undetected.
14. Older production versions should not be overlapped with test versions of future production
releases.
15. Beta versions do not need to be stored after the production version is released.
ANS: F PTS: 1 REF: p433
16. In some deployment situations, it may be possible to begin operation of the new system without
converting data from the old system.
MULTIPLE CHOICE
2. The goal of _______ is to identify and fix as many errors as possible before units are combined
into larger software units.
a. user testing c. integration testing
b. unit testing d. stress testing
ANS: B PTS: 1 REF: p412
5. ____ testing examines the behavior of an entire subsystem or independent subsystem with respect
to technical and user requirements.
a. Driver c. System
b. Integration d. Unit
ANS: C PTS: 1 REF: p416
6. A(n) ____ test is a test performed to determine whether the system fulfills user requirements.
a. acceptance c. system
b. integration d. performance
ANS: A PTS: 1 REF: p417
9. The primary purpose and benefit of a build and smoke test is to _______ .
a. test major additions c. test programmer
to the software expertise
b. test equipment d. test integration
malfunctions problems
ANS: D PTS: 1 REF: p416
11. Complex modifications to database structure for a new system may require ____ the data after the
changes.
a. testing c. reloading
b. deleting d. indexing
ANS: C PTS: 1 REF: p418
12. Often the deployment of a new system will require training. What groups typically may require
training?
a. Executive users and operational users
b. Clerical staff and middle managers
c. End users and system operators
d. Management users and operational users
ANS: C PTS: 1 REF: p419
13. Under input, process, output (IPO) development order, programs or modules that ____ are
developed first.
a. produce output c. obtain external input
b. process input d. send system
interfaces
ANS: C PTS: 1 REF: p424
14. Which of the following is NOT a typically used development order for program modules?
a. Left-to-right c. Top-down
b. Bottom-up d. Input, process, output
ANS: A PTS: 1 REF: p424
15. Which of the following is a major advantage of input, process, output development order?
a. The development c. Not as much testing
process is rapid is required
b. Testing is more d. User interface is
straightforward easier to develop
ANS: B PTS: 1 REF: p424
16. Which of the following is an advantage of top-down program development order as compared to
bottom-up program development order?
a. There is always a working and testable
version.
b. All programming staff are immediately put to
work.
c. Stub modules or methods don’t need to be
written.
d. There are multiple iterations.
ANS: A PTS: 1 REF: p425
17. Which of the following is a disadvantage of top-down program development order as compared
to bottom-up program development order?
a. There is always a working and testable
version of the program.
b. Programming staff are not immediately put to
work.
c. Stub modules or methods don't need to be
written.
d. Development proceeds downward.
ANS: B PTS: 1 REF: p425
18. Drivers are used extensively in ____ development, because called methods and child modules are
developed and unit-tested before their parents are developed.
a. top-down c. object-oriented
b. input, process, output d. bottom-up
ANS: D PTS: 1 REF: p426
20. Under which of the following circumstances might a direct deployment be a good choice?
a. System downtime cannot be tolerated.
b. The new system is not replacing an older
system.
c. The system contains mission-critical
applications.
d. The system is large and complex, with
relatively independent subsystems.
ANS: B PTS: 1 REF: p429
22. In a ____ deployment, the system is installed and brought into operation in a series of steps.
a. phased c. parallel
b. direct d. stepwise
ANS: A PTS: 1 REF: p430
25. A(n) ____ version is a system that is incomplete but ready for some level of rigorous testing.
a. production c. alpha
b. maintenance d. beta
ANS: C PTS: 1 REF: p432
26. A(n) ____ version is a system that is stable enough to be tested by end users.
a. production c. alpha
b. maintenance d. beta
ANS: D PTS: 1 REF: p432
27. A(n) ____ version is a system version created for long-term release to users.
a. production c. alpha
b. maintenance d. beta
ANS: A PTS: 1 REF: p432
28. A minor production release, called a(n) ____ version, provides bug fixes and small changes to
existing features.
a. production c. alpha
b. maintenance d. beta
ANS: B PTS: 1 REF: p432
29. A ____ system is a copy of the production system that is modified to test a maintenance change.
a. temporary c. test
b. secondary d. replicated
ANS: C PTS: 1 REF: p434
30. A maintenance change typically skims or skips the ____ activities of the system development life
cycle (SDLC).
a. analysis c. planning
b. design d. testing
ANS: A PTS: 1 REF: p434
31. Most organizations use a(n) ____ form to propose and document a maintenance change.
a. user request c. maintenance report
b. change request d. team request
ANS: B PTS: 1 REF: p433
33. Which is NOT a reason that a full parallel deployment and operation may not be practical?
a. Incompatibility between inputs for the old and
new
b. Insufficient capacity for both systems on the
same equipment
c. Insufficient training for the new system while
using old system
d. Insufficient staffing levels for both systems
ANS: C PTS: 1 REF: p430
COMPLETION
2. A(n) ____________________ is a method developed for unit testing, that simulates the calling
behavior of a method that hasn't yet been developed.
ANS: driver
3. A method or class developed for unit testing that simulates the execution of the method or class
that has not been written yet is called a(n) _____.
ANS: stub
4. A focused test to test a specific method, class, or subsystem to see if it meets the user
requirements is called a(n) _______ test.
ANS:
usability
usability test
5. An type of integration test that tests an entire subsystem or an entire system is called a(n)
_______ test.
ANS:
system
system test
6. A type of integration test that determines whether a system or subsystem can meet time-based
throughput criteria is called a(n) _______ .
ANS:
performance test
stress test
performance
stress
PTS: 2 REF: p416
7. ____________________ is the desired or maximum allowable time limit for software response to
a query or update.
ANS:
Response time
Response
8. ____________________ is the desired or minimum number of queries and transactions that must
be processed per minute or hour.
ANS: Throughput
9. A type of system test performed to determine if the entire system fulfills the user requirements is
called a(n) ________.
ANS:
user acceptance test
acceptance test
acceptance
ANS:
User
End user
11. A(n) ____________ development order is one that implements input modules first, business logic
modules next, and output modules last.
ANS:
input, process, output
input, process, output (IPO)
IPO
input-process-output
input process output
input-process-output (IPO)
ANS:
top-down
top down
13. ____________________ tests are valuable because they provide rapid feedback regarding
significant problems.
ANS:
Build and smoke
Build-and-smoke
14. A(n) _______ is an automated tool for tracking source code files and controlling changes to those
files.
ANS:
source code control system
SCCS
15. ________ deployment is most useful when a system is large, complex, and composed of
relatively independent subsystems.
ANS: Phased
16. End users test ___________ versions by using them to do real work.
ANS: beta
17. The ________ system is the version of the system used day to day.
ANS: production
ESSAY
1. List and briefly describe the four activities of Core Process 5: Build, text, and integrate system
components, i.e. Implementation activities.
ANS:
1. Program the software -- This is the actually programming done in some programming
language.
2. Unit test the software -- Unit testing is that testing that tests each class and its methods in a
limited or narrow context. It is usually done by the programmer or programming team.
3. Identify and build test cases -- In order to test the system at a broader level, such as integration
or system test, test cases need to be created. These test cases will simulate a real-world
environment with both good and bad data.
4. Integrate and test components -- This is the highest level testing associated with this core
process. The various components (sets of classes) are combined together and tested to ensure that
they can function together.
2. List and briefly describe the six activities of Core Process 6: Complete system tests and deploy
the solution, i.e. Deployment activities.
ANS:
1. Perform system and stress tests -- System tests are tests that involve all parts of the system in
multiple cycles including period based testing (i.e. month-end). Stress testing includes high
volumes of transactions and other testing that tests the throughput of the system.
2. Perform user acceptance tests -- User acceptance tests are an extension of system tests. They
test the entire system across time periods, but use data that is either live data or simulated live
data. Users will also test the system for usability, easy of use, and correctness of all answers.
3. Convert existing data -- Things like Customer records will need to be transported from the old
system to the new system. This can be a complex and time consuming activity.
4. Build materials and conduct training -- This activity can range from almost non-existent to
comprehensive and extensive depending on the complexity of the new system and its variance
from the previous system.
5. Configure and set up the environment -- This is primarily a technical activity to establish a
reliable, solid, optimized production environment.
6. Deploy the solution -- Actually “turning on” the new system and using it for productive
business use.
3. List and briefly describe the six activities of Core Process 6: Complete system tests and deploy
the solution.
ANS:
1. Perform system and stress tests -- System tests are designed to test the entire system across all
functions and time periods. Stress tests evaluate performance and throughput
2. Perform user acceptance tests -- User tests validate that the system actually solves the business
problem. Accuracy is also tested.
3. Convert existing data -- Old data may need to be included in the new system. There are three
primary methods to convert data.
4. Build training materials and do training -- Both user and technical training may be required
5. Configure and set up production environment -- The production environment needs to be
configured. The new system may need to conform to an existing configuration.
6. Deploy the solution -- Install and turn on the new system.
PTS: 5 REF: p417 and on
ANS:
1. Direct deployment -- The old system is turned off (if there is one), and the new system is
turned on. This is the most simple, and the highest risk approach.
2. Parallel deployment -- Both systems are run in parallel, either partially or completely. This is
the safest, but also the most expensive.
3. Phased deployment -- The new system is turned on a piece at a time. This is also a safer
approach than direct, but it also can be complex to coordinate the different phases as they cut
over.
TRUE/FALSE
1. In the UP life cycle, some working software is tested and reviewed with system users at the end
of each iteration.
3. The UP should not be tailored to the needs of a specific organization or system project.
5. The Unified Process (UP) life cycle has four phases: inception, elaboration, construction, and
conversion.
9. Once a Scrum team has agreed on a goal and has selected items from the backlog list, the scope
of the sprint is frozen.
10. The purpose of a Scrum daily meeting is to find solutions for any issues that have arisen since the
last meeting.
11. In a Scrum project users can change the items being worked on whenever necessary. .
12. Blog hosting and photograph hosting are examples of software as a service.
13. The future of open-source software looks bleak because of an unworkable revenue model to
generate sufficient funds.
14. Large open-source software projects are usually staffed by a staff of experienced developers who
work together in one or two primary locations.
15. For many people —both at work or at home —the Web browser is the computer program they
use the most.
16. Software development has turned into a cottage industry for much of the world’s new
applications.
MULTIPLE CHOICE
3. The UP ____ discipline involves setting up the guidelines to manage releases and versions.
a. project management c. deployment
b. configuration and d. environment
change management
ANS: B PTS: 1 REF: p449
8. In XP development, a(n) ____ can guide members toward a vision and help them understand the
system.
a. sprint c. object framework
b. system metaphor d. metamodel
ANS: B PTS: 1 REF: p453
9. The first XP development activity is creating ____.
a. a system metaphor c. a set of acceptance
tests
b. a development plan d. user stories
for releases
ANS: D PTS: 1 REF: p454
14. A Scrum sprint is a firm ____ time box, with a specific goal or deliverable.
a. 7 day c. 30 day
b. 14 day d. 60 day
ANS: C PTS: 1 REF: p456
15. Which of the following is NOT a question that is asked in a Scrum meeting?
a. What have you done since last meeting?
b. What will you do by the next meeting?
c. What obstacles are hindering you?
d. Are you meeting your scheduled deliverables?
ANS: D PTS: 1 REF: p456
18. The most challenging and difficult problem of providing Internet connectivity to a home or
computing device continues to be the ______.
a. bandwidth c. last mile connection
requirements
b. denial of service d. diversity of
attacks computing devices
ANS: C PTS: 1 REF: p459
19. Companies that host and deliver static content from locations around the world that are closer to
the end users are called ______ .
a. network services c. colocation hosting
companies companies
b. content delivery d. on demand software
networks networks
ANS: B PTS: 1 REF: p460-461
20. The two biggest uses of the Internet today are ______.
a. Web searching and c. Gaming and
social networking pornography
b. Social networking d. Web searching and
and pornography gaming
ANS: A PTS: 1 REF: p460
22. MySQL, Wordpress, Aptana, and Apache are all examples of _____ .
a. open-source software c. browser-based
software
b. Internet applications d. proprietary software
ANS: A PTS: 1 REF: p464
23. A Web site, such as a store or business, that includes capabilities, such as a Mapquest map
location and a Google search capability can be called _____.
a. a Web mini-app c. open-source software
b. an RIA d. a mashup
ANS: D PTS: 1 REF: p469
25. The key element that is required to develop and provide RIAs is ______.
a. powerful computing c. fast Internet
on the local computer connection to provide
quick responses
b. powerful servers to d. content delivery
provide quick networks to provide
turnaround extended multimedia
delivery
ANS: A PTS: 1 REF: p471
26. Adding the capability to post a Tweet from your blog is an example of what?
a. A mashup c. A toolbar
b. A plug-in d. A widget
ANS: B PTS: 1 REF: p468
COMPLETION
1. A(n) ________ is a set of functionally related activities that combine to enable the develop
process in a UP project.
ANS:
Discipline
UP discipline
2. _______ is the technique of revising, reorganizing, and rebuilding part of a system so that it is of
higher quality.
ANS: Refactoring
ANS:
Pair programming
Pair-programming
ANS:
releases
small releases
ANS: Scrum
6. A(n) ____________ is a prioritized list of user requirements used to choose work to be done
during a Scrum project.
7. In Scrum, a(n) ________ is the client stakeholder for whom a system is being built.
8. The _________ is a small group of developers who work together on a Scrum project.
ANS: sprint
ANS:
scrum
scrum meeting
11. A computer application that is built to execute on a local computer without requiring a
client/server connection is called a _______.
ANS:
device-top application
device top application
desk-top application
desk top application
12. A client/server application that executes locally within the control of a browser is called a
______.
ANS:
browser-based application
browser based application
13. The primary data routes between large, strategically interconnected networks and major routers
on the Internet is called the ______.
ANS:
Internet backbone
backbone
14. The final leg that delivers Internet connectivity from the Internet to the customer is called the
______ .
ANS:
last mile
last-mile
15. A software delivery model similar to a utility in which the application and its associated data are
accessed over the Internet without locally installed programs is called _____.
ANS:
software as a service
software-as-a-service
software as a service (SAAS)
SAAS
16. ________ is a method of developing, delivering, and licensing software that makes the
application source code freely available.
ANS:
Open-source software
Open source software
Open source
17. ______ is a loosely defined, nonstandard term that is used to refer to Web sites that permit user-
generated content and user interaction, such as social networking.
ANS:
Web 2.0
Web-2.0
Web two point zero
18. A software component that adds specific capabilities to a larger software application is called a(n)
______.
ANS:
plug-in
plug in
plug-ins
19. A type of plug-in software, often found on Web applications, that focuses on enhancing the user
interface by adding more capabilities is referred to as a(n) ______.
ANS:
widget
gadget
20. A type of add-on to an application that allows the look and feel, such as colors and layouts, to be
changed is called a(n) ______ .
ANS: theme
PTS: 2 REF: p467
21. A(n) ______ is a type of application add-on, usually comprised of iconic menu items, that
accesses the capabilities of the application.
ANS:
toolbar
tool bar
tool-bar
22. A software application that provides a complete set of functions but must be executed within the
confines of another Web application is called a(n) ______.
ANS:
Web mini-app
Web mini app
mini-app
Web mini-application
23. A type of Web site that combines the functionality of several other Web sites through the use of
predefined APIs is called a(n) ______.
ANS: mashup
24. ________ is a type of Web site that provides active user interaction as well as delivering rich
multimedia.
ANS:
Rich Internet application
Rich Internet application (RIA)
RIA
Rich-Internet application
25. _____ is the new HTML specification that standardizes RIA specifications for built-in browser
delivery.
ANS:
HTML 5
HTML5
HTML-5
ANS:
The four core values of XP-communication, simplicity, feedback, and courage-drive its practices
and project activities. One of the major causes of project failure has been a lack of open
communication with the right players at the right time and at the right level. Effective
communication involves not only documentation but also open verbal discussion. Even though
developers have always advocated keeping solutions simple, they do not always follow their own
advice. XP includes techniques to reinforce this principle and make it a standard way of
developing systems. As with simplicity, getting frequent, meaningful feedback is recognized as a
best practice of software development. XP integrates feedback into every aspect of development,
including functionality, requirements, designs, and code. Finally, developers always need courage
to face the harsh choice of doing things right or throwing away bad code and starting over. But all
too frequently they have not had the courage to stand up to a too-tight schedule, resulting in bad
mistakes. XP practices are designed to make it easier to give developers the courage to “do it
right”.
2. List and briefly describe at least four of the six criteria required (by OSI) for open source
software to be licensed as such.
ANS:
1. Source code -- must be open for distribution
2. Freely redistributable -- recipients may also distribute it further
3. Derived works -- the source code can be modified and redistributed
4. Distribution of license -- the open-source license should apply to all derived works
5. No discrimination -- the license cannot restrict how can receive the software
6. No related restrictions -- the license cannot restrict other software that is part of the open-
source software
3. Web applications have evolved through three major changes over the last twenty years. Briefly
describe each of these three evolutionary changes.
ANS:
1. Static Web pages -- these were not really applications. These Web pages were static pages
based on HTML and CSS files. They included text, static images, and hyperlinks.
2. Dynamic Web pages and applications -- these include applications that provide dynamic pages
depending on the user and his/her actions. These types of Web pages accepted user input and
responded appropriately with dynamic pages.
3. Rich Internet Applications -- these applications simulate true desktop functions with complete
interactive activity and responses between the user and the application. It usually includes both
program logic on the browser and rapid interaction between the local computer and the server.
TRUE/FALSE
1. Systems analysis means understanding and specifying in detail what the information system
should accomplish.
5. When deciding which information system solution to recommend the analyst should recommend
the one with the fewest risks and the most benefits.
6. The difference between the system boundary and the automation boundary is that the system
boundary is contained within the automation boundary.
7. The components of an information system are the computer hardware, the computer software and
the data.
8. Since business problems tend to be similar, systems analysts seldom focus on a specific business
industry.
10. Due to outsourcing programming to off-shore companies in India, China, an the old Soviet Block,
careers in information systems is not expected to be a growth industry in the future.
ANS: F PTS: 1 REF: Chap A p 14
11. Today the nature and types of jobs for information system graduates is more varied than ever
before.
12. Systems analysis and design focuses on understanding the business problem and outlining the
approach to solve it.
13. The primary skill required of a good systems analyst is to be able to program effectively and
efficiently.
MULTIPLE CHOICE
1. The process of understanding and specifying in detail what the information system should
accomplish is called systems ____.
a. design c. analysis
b. specification d. administration
ANS: C PTS: 1 REF: Chap A p 3
2. Systems ____ means specifying in detail how the many components of the information system
should be physically implemented.
a. design c. analysis
b. specification d. administration
ANS: A PTS: 1 REF: Chap A p 3
3. The term “____” refers to a business professional who uses analysis and design techniques to
solve business problems using information technology.
a. database manager c. systems analyst
b. computer d. business analyst
programmer
ANS: C PTS: 1 REF: Chap A p 3
4. The text identifies three primary areas of skills that are required of a systems analyst. Which of
the following is NOT one of the three?
a. People skills c. Business skills
b. Technical skills d. Writing skills
ANS: D PTS: 1 REF: Chap A p 3
6. A(n) ____ includes hardware, software, inputs, outputs, data, people, and procedures.
a. system c. subsystem
b. information system d. functional
decomposition
ANS: B PTS: 1 REF: Chap A p 7
9. Support systems that allow employees to communicate with each other and with customers and
suppliers are called ____.
12. A system that is subject to many external laws and regulations is a(n) _______.
13. The two systems that are externally oriented, i.e. they focus on entities outside of the organization
15. Such things as how to do project planning, or how to do cost/benefit analysis, or how to conduct
an interview is called _______.
a. techniques c. methodologies
b. strategies d. a knowledge base
ANS: A PTS: 1 REF: Chap A p 11
16. Understanding the way an organization performs its procedures is what kind of skill area?
a. Technical skills c. Organizational skills
b. Business skills d. People skills
ANS: B PTS: 1 REF: Chap A p 12
17. Highly integrated systems that support company-wide operations and data, often combining
aspects of many other systems is a(n) ____.
18. A process in which an organization commits to using an integrated set of software packages for
key information systems is called ____.
19. After investing resources in thoroughly understanding the business problem, the analyst decides
that the costs of solving the problem will likely outweigh the benefits. The analyst should ____.
a. move to the design activities
b. invest more in the project to increase the
benefits
c. resolve feasibility issues
d. suggest that the project be discontinued
ANS: D PTS: 1 REF: Chap A p 4
20. One common element of all types of business information systems is that they all _______.
a. use client/server c. interact with
architecture customers
b. interact with d. use database
investors technology
ANS: D PTS: 1 REF: Chap A p 5
21. Which of the following is NOT a defined area of knowledge that is required of systems analysts?
a. Problem solving c. Business knowledge
knowledge
b. Technical knowledge d. People knowledge
ANS: A PTS: 1 REF: Chap A p 10
22. A type of information system that allows geographically distributed personnel to work together
on projects and tasks is called a(n) ________.
a. human resource management system (HRM)
b. knowledge management system (KMS)
c. collaboration support system (CSS)
d. business intelligence system
ANS: C PTS: 1 REF: Chap A p 9
COMPLETION
1. A collection of interrelated components that collect, process, store, and provide as output the
information needed to complete a business task is called a(n) ________.
ANS:
information system
information system (IS)
ANS: system
5. The ______________ describes the separation between the automated part of a system and the
manual part of a system.
6. Those skills which have to do with computers, programming, networks, and databases are called
___________________ skills.
ANS: technical
7. A centrally managed collection of data that is accessible to many users and systems at the same
time is called a(n) __________________.
ANS: database
8. A specific software application that assists developers in creating models or other components
required for a project is called a(n) _____.
ANS: tool
9. Since a systems developer often works on systems that contain confidential corporate
information, it is important that he or she have a high commitment to ________ and ethics.
ANS: integrity
10. The process of understanding and specifying what the information system should accomplish is
called _______.
ANS:
systems analysis
system analysis
ANS:
systems design
system design
12. A business professional who uses analysis and design techniques to solve business problems
using technology is called a(n) ________.
ANS:
systems analyst
system analyst
ANS: subsystem
ESSAY
1. List the steps taken in the analyst's general approach to problem solving.
ANS:
1. Research and understand the problem
2. Verify that the benefits of solving the problem outweigh the costs
3. Define the requirements for solving the problem
4. Develop a set of possible solutions (alternatives)
5. Decide which solution is best and make a recommendation
6. Define the details of the chosen solution
7. Implement the solution
8. Monitor to make sure that you obtain the desired results
2. What are the three required areas of skills of the system analyst?
ANS:
System analysts need a great variety of special skills. They need to understand how to build
information systems (technical skills) and must understand the business they are working for
(business skills). They also need to understand people and the way they work (people skills).
2. Traditional computer processes are much like procedural computer programs in that they contain
instructions that execute in sequence.
6. Diagram 0 summarizes an entire system or subsystem in greater detail than a context diagram.
MULTIPLE CHOICE
2. A(n) ____ is a person or organization outside the system boundary that supplies data inputs or
accepts data outputs.
a. data flow c. external agent
b. data store d. customer
ANS: C PTS: 1 REF: Chap B p 22
3. Which of the following refers to a modeling technique that breaks the system into a hierarchical
set of increasingly more detailed models?
a. Data store c. Data flow
b. Level of abstraction d. Context diagram
ANS: B PTS: 1 REF: Chap B p 24
4. A(n) ____ is a data flow diagram (DFD) that summarizes all processing activity within the
system in a single process symbol.
a. Event partition c. Diagram 0
diagram
b. level of abstraction d. context diagram
ANS: D PTS: 1 REF: Chap B p 26
6. A data flow diagram (DFD) that models system requirements using a single process for each
event in a system or subsystem is called a(n) ____.
a. context diagram c. event-partitioned
system model
b. DFD fragment d. diagram 1.0
ANS: C PTS: 1 REF: Chap B p 27
8. If the data flow diagram (DFD) is a ____, then it assumes that the system will be implemented
with perfect technology.
a. context diagram c. physical model
b. logical model d. prototype model
ANS: C PTS: 1 REF: Chap B p 32
9. A(n) ____ can be a physical system model, a logical system model, or a blend of the two.
a. process definition c. entity-relationship
diagram
b. data flow diagram d. context diagram
ANS: B PTS: 1 REF: Chap B p 32
10. Which of the following data flow diagram (DFD) symbols usually corresponds to a data entity on
an entity-relationship diagram (ERD)?
a. Data store c. Data link
b. Data flow d. Process
ANS: A PTS: 1 REF: Chap B p 23
11. Which of the following data flow diagram (DFD) symbols represents the communication between
an external agent and a process while the process is executing?
a. Process c. Real-time link
b. Data link d. Data store
ANS: C PTS: 1 REF: Chap B p 23
12. An analyst can avoid information overload by adhering to the rule of ____.
a. functional c. process dependency
decomposition
b. interface d. balancing
minimization
ANS: B PTS: 1 REF: Chap B p 35
13. ____ is the equivalence of data content between data flows entering and leaving a process and
data flows entering and leaving a process decomposition data flow diagram (DFD).
a. Balancing c. Complexity
minimization
b. Interface d. Abstraction
minimization
ANS: A PTS: 1 REF: Chap B p 36
15. On a DFD a(n) ____ represents a file or part of a database that stores information about a data
entity.
a. process c. data store
b. data flow d. data link
ANS: C PTS: 1 REF: Chap B p 23
16. Which of the following is NOT a technique to document program logic for a process.
a. Structured English c. Decision Tree
b. Decision Matrix d. Decision Table
ANS: B PTS: 1 REF: Chap B p 38-40
17. Analysts sometimes can spot black holes and miracles simply by examining the _________.
a. context diagram c. data flow diagram
b. entity relationship d. structured English
diagram
ANS: C PTS: 1 REF: Chap B p 37
18. Which of the following is a table that describes the relationship between processes and the
locations in which they are performed?
a. Location diagram c. Activity-location
matrix
b. Black hole d. Activity-data matrix
ANS: C PTS: 1 REF: Chap B p 48
19. Which of the following is a diagram or map that identifies all of the processing locations of a
system?
a. Location diagram c. Activity-data matrix
b. Activity-location d. CRUD table
matrix
ANS: A PTS: 1 REF: Chap B p 47
20. A ____ is a textual description of a data flow’s content and internal structure.
a. data store rule c. data flow rule
b. data flow definition d. process definition
ANS: B PTS: 1 REF: Chap B p 43
21. In small development projects, a(n) ____ may be a small loose-leaf notebook or word processing
file.
a. data store c. activity-data matrix
b. data dictionary d. decision table
ANS: B PTS: 1 REF: Chap B p 46
22. A symbol on a data flow diagram (DFD) that represents an algorithm or procedure by which data
inputs are transformed into data outputs is called a(n) ____.
a. process c. activity
b. transaction d. data flow
ANS: A PTS: 1 REF: Chap B p 23
COMPLETION
1. A diagram that represents system requirements as processes, external agents, data flows, and data
stores is called a(n) ______.
ANS:
data flow diagram
data flow diagram (DFD)
DFD
PTS: 2 REF: Chap B p 22
2. A symbol on a data flow diagram (DFD) that represents an algorithm or procedure by which data
inputs are transformed into data outputs is called a(n) __________.
ANS: process
3. A place where data are held pending future access by one or more processes in a DFD is called
a(n) ________.
4. A(n) ________ is a data flow diagram (DFD) that summarizes all processing activity within the
system in a single process symbol.
5. A DFD _______ represents the system response to one event within a single process symbol.
ANS:
fragment
6. A data flow diagram (DFD) that models system requirements using a single process for each
event in a system or subsystem is called a(n) ____.
ANS:
event-partitioned system model
diagram 0
7. An assumption about DFDs that includes things such as instant processing, infinite storage, and
zero errors is called ______.
8. If too much information is presented at once, people experience a phenomenon called _______ .
10. _________ is a principle of model design that seeks simplicity by limiting the number of
connections among model components.
11. The term “__________” is used to describe the equivalence of data content between data flows
entering and leaving a process and data flows entering and leaving a process decomposition data
flow diagram (DFD).
ANS: balancing
12. A process or data store with data input that is never used to produce a data output is referred to as
a(n) ______.
13. A(n) _______ is a process or data store with a data element that is created out of nothing.
ANS: miracle
14. ___________ is a method of writing process specifications that combines structure programming
techniques with narrative English.
15. ___________ can summarize decision logic more concisely than structured English.
ANS:
decision tables
decision trees
decision tables and decision trees
17. A(n) _______ is a tabular representation of processing logic containing decision variables,
decision variable values, and actions or formulas.
18. A(n) ________ is a table that describes stored data entities, the locations from which they are
accessed, and the nature of the accesses.
ESSAY
1. List the five symbols used on a data flow diagram (DFD) and briefly explain what each symbol
represents.
ANS:
A process (rectangle with rounded corners) represents transformation of data input(s) into data
output(s).
A data flow (straight arrow) represents movement of data among processes, data stores, and
external agents.
An external agent (square) represents a person, organization, or system outside the system
boundary that supplies or receives data.
A data store (rectangle with one end open) represents data stored for later retrieval.
A real-time link (arrow with a double bend) represents exchange of data between a process and an
external agent while the process is executing.
2. What are the first four steps involved in the construction of a decision table?
ANS:
1. Identify each decision variable and its allowable values.
2. Compute the number of decision variable combinations as the product of the number of values
of each decision table.
3. Construct a table with one more column than the number of decision variable combinations
computed in step 2.
4. Assign the decision variable with the fewest values to the first row of the table. Put the decision
variable name in the first column. Divide the remaining columns into sets of columns for each
decision variable value.
ANS:
The traditional and the object-oriented approaches to system development differ in how a
system’s response to an event is modeled and implemented. The traditional approach views a
system as a collection of processes, some performed by people and some performed by
computers. In contrast, the object-oriented approach views a system as a collection of interacting
objects. Objects are capable of behaviors that allow them to interact with each other and with
people using the system.
TRUE/FALSE
1. Payback period is usually calculated for the same time period as the discount rate is applied.
5. In Microsoft Project calculating and assigning the duration time to a summary task is usually
fairly complex.
6. In Microsoft Project a Tracking Gantt chart is useful to keep track of the resources on a project.
MULTIPLE CHOICE
1. The present value of $200,000 development costs in year 0 assuming a 10% discount rate is:
a. $180,000 c. $200,000
b. $190,000 d. $210,000
ANS: C PTS: 1 REF: Chap C p 55-56
2. The objective of ____ is to determine a specific value based on a predetermined discount rate.
a. project evaluation and review technique
(PERT)
b. return on investment (ROI)
c. cost/benefit analysis
d. net present value (NPV)
ANS: D PTS: 1 REF: Chap C p 55-56
3. Which of the following equations represents the present value (PV) of a discounted future amount
(FA) at a discount rate (i) for multiple periods (n)?
a. c.
b. d.
ANS: C PTS: 1 REF: Chap C p 55
4. The discount factor for 2 time periods at 10% discount rate is ______.
a. .9090 c. .8264
b. .8899 d. .7513
ANS: C PTS: 1 REF: Chap C p 55
6. Given that the NPV at the end of year 3 was -$185,000 and it was +$265,00 at the end of year 4,
what is the payback period?
a. Not enough c. Three years and 41
information to days
calculate.
b. 150 days d. Three years and 150
days.
ANS: D PTS: 1 REF: Chap C p 57
8. The most common way to determine the discount rate for NPV calculations is by _____.
a. using company policy
b. using the federally published discount rates
c. using the results of ROI calculations
d. calculating current loan interest rates
ANS: A PTS: 1 REF: Chap C p 55
9. A(n) _____ chart is a chart for scheduling a project based on individual tasks or activities and
their dependencies.
a. WBS c. PMBOK
b. PERT d. Project
ANS: B PTS: 1 REF: Chap C p 58
10.
Given the above figure, what is the Net Present Value (NPV) for Year 2?
a. $55,800 c. $60,850
b. $59,340 d. $61,620
ANS: B PTS: 1 REF: Chap C p 56
11.
Given the above figure, what is the Cumulative NPV after Year 2?
a. $76, 760 c. $5,380
b. $15,140 d. -$44,200
ANS: B PTS: 1 REF: Chap C p 56
12.
Given the above figure, when is the Breakeven point?
13.
Given the above figure, what is the 2 year ROI without discount?
a. 129% c. 207%
b. 182% d. 238%
ANS: A PTS: 1 REF: Chap C p 58
14.
Given the above PERT/CPM chart, how many days does it take for the project to end?
a. 15 days c. 12 days
b. 13 days d. 9 days
ANS: C PTS: 1 REF: Chap C p 60-61
15.
Given the above figure, what is the early start time of task number 6?
a. 6 days c. 8 days
b. 7 days d. 9 days
ANS: D PTS: 1 REF: Chap C p 60-61
16.
Given the above figure, what is the late start time for task number 5?
a. 6 days c. 8 days
b. 7 days d. 9 days
ANS: C PTS: 1 REF: Chap C p 60-61
17.
Given the above figure what tasks are included in the critical path?
a. 1, 2, 3, 4, 5, 6, 7 c. 1, 2, 4, 6, 7
b. 1, 2, 3, 6, 7 d. 1, 2, 5, 6, 7
ANS: B PTS: 1 REF: Chap C p 60-61
18. Which of the following equations is correct for calculating early start time?
a.
b.
c.
d.
ANS: D PTS: 1 REF: Chap C p 60
19. Which of the following equations is correct for calculating late start times with concurrent tasks?
a.
b.
c.
d.
ANS: A PTS: 1 REF: Chap C p 62
20. In a PERT/CPM chart when several tasks are in sequence to form a path segment but are not on
the critical path the total slack time is _____?
a. the same for each one c. equal to the greatest
slack time
b. the sum of the d. equal to the smallest
individual slack times slack time
ANS: A PTS: 1 REF: Chap C p 62
22. Which of the following is NOT a type of dependency between tasks on a PERT/CPM chart?
a. Resource mandatory c. External mandatory
b. Project mandatory d. Discretionary
ANS: A PTS: 1 REF: Chap C p 58
23. In Microsoft Project if task B need to begin two days after task A started, you would use a task
dependency of _______.
a. FS + 2 days c. FS - 2 days
b. SS + 2 days d. SS - 2 days
ANS: B PTS: 1 REF: Chap C p 65
24. The method used in Microsoft Project for making summary tasks is by _______ the detailed
tasks.
a. leveling c. promoting
b. subtasking d. demoting
ANS: D PTS: 1 REF: Chap C p 65
26. Given a project schedule with all tasks connected via one way arrows and with task durations.
The critical path is ______.
28. Setting up a change control log to keep track of new system requirements is part of what PMBOK
area?
a. Cost Management c. Time Management
b. Quality Management d. Scope Management
ANS: D PTS: 1 REF: Chap C p 72
29. The three techniques used for Scope Management are Defining the scope, _______ , and
Controlling the scope.
a. Reducing the scope c. Monitoring the scope
b. Approving the scope d. Verifying the scope
ANS: D PTS: 1 REF: Chap C p 72
30. To ensure that the project schedule accurately accommodates the necessary work is part of the
objective of which PMBOK management area?
a. Schedule c. Quality management
management
b. Time management d. Resource
management
ANS: B PTS: 1 REF: Chap C p 72
32. Good Project Communication Management requires techniques in three important areas: (1)
gathering information (2) disseminating information and (3) ________ .
a. managing internal c. managing the
communications database of
information
b. managing stakeholder d. managing the project
information documentation
ANS: A PTS: 1 REF: Chap C p 75
33. For a particular project the new system requires the installation of new servers. Managing this
activity fits best in which project management area?
a. Quality management c. Cost management
b. Time management d. Procurement
management
ANS: D PTS: 1 REF: Chap C p 76
COMPLETION
1. The annual percentage rate that an amount of money is discounted to bring to a present value is
called the _____.
2. The accumulation of yearly discounts based on a discount rate is called the ______.
3. The earliest time that a task can start on a project schedule is called its _____.
4. The latest time that a task can start on a project schedule without negative impacts to the overall
schedule is called the ______.
5. The _____ is the point at which the increased cash flow exactly pays off the costs of development
and operation.
ANS:
breakeven point
payback period
6. The amount of time a task or sequence of tasks can be delayed without impacting the project is
called the _____.
ANS:
leveling
level
resource leveling
ANS:
network
Network
9. In Microsoft Project a task that indicates the completion of a deliverable or some other
completion item is called a _____ task.
ANS: milestone
ESSAY
ANS:
Project scope management
Project time management
Project cost management
Project quality management
Project human resources management
Project communications management
Project risk management
Project procurement management
Project integration management
ANS:
--Easy to use -- it is intuitive for the users and has techniques to support both novices and power
users.
--Fit for intended purpose -- it must completely solve the business need for which it was built
--Robust -- does not easily crash or break; handles bad input data
--Reliable -- it gives consistent and correct answers
--Secure -- is not easily ‘hacked’ or compromised
--Maintainable -- built so that programmers can understand structure and code and easily make
modifications
3. Briefly identify and explain the three primary objectives of Project Scope Management.
ANS:
--Define the functions for the new system -- to identify and determine all the functions that are
required
--Verify the functions -- prioritize the identified functions to determine which can be included
--Control the set of functions -- control the scope to avoid scope creep
4. Briefly identify and explain the three objectives of Project Time Management.
ANS:
--Build an accurate project schedule -- make sure the schedule is complete and includes all work
that must be done
--Schedule resources -- make sure that resources are not over allocated, but are scheduled
effectively
--Measure completed work -- keep track of work as it progresses so that the project can be
controlled accurately
5. Briefly identify and explain the four objectives of Project Cost Management.
ANS:
--Accurately estimate project costs -- Using work estimates, time estimates, and resource
estimates make an estimate of total project costs
--Predict cash flows -- based on project resources, estimate the timing of cash flows
--Control project costs -- only allow valid project costs to be accepted
--Capture and record project costs -- keep accurate records of all expenditures
6. List and briefly explain at least four of the six objectives of Human Resource Management.
ANS:
--Staff the project with the right resources -- both the timing and the skill mix of project members
must be determined and controlled
--Provide training -- team members should be trained and have development opportunities as part
of the project
--Organize the teams -- team members must be organized into work units; even self-organizing
teams must organize
--Build effectiveness -- work teams should work on how to improve relationships and working
associations and efficiency
--Provide leadership -- team members work better if they have a vision of the project and its
potential
--Provide an effective work environment -- team members are more effective if their are no
obstacles and if they have all the tools and resources required
7. List and briefly describe the four objectives of Project Communication Management.
ANS:
--Gather information -- make sure all necessary information is collected. Set up methods to do so
in a timely manner
--Disseminate information -- ensure that accurate information is made available frequently to all
stakeholders
--Keep team members informed -- often one serious problem is that team members do not know
what is going on within the rest of the team. Establish methods to keep all informed
--Keep a central repository -- ensure that collected information is stored in an easily accessible,
safe, and secure location and format
ANS:
--Plan the procurement -- decide and make plans on how items will be purchased - how to find
them, how to evaluate them, how to buy them, how to ensure they are delivered
--Ensure solicitation is correct and complete -- using RFPs (Request for proposal) or other
mechanisms make sure adequate research is done before a commit to purchase
--Evaluate alternatives -- make sure the evaluation process is fair, complete, with bias, accurate
--Ensure adequate contracts -- work with legal staff to ensure that the contracts are
comprehensive and cover all contingencies
--Monitor deliverables -- make sure deliverables are received on time, and that they are as
specified, and that they function correctly