Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

In a typical company organizational model middle managers ____

16/10/2021 Client: muhammad11 Deadline: 2 Day

Question 1 1 out of 1 points

System requirements serve as benchmarks to measure the overall acceptability of a finished system.

Question 2 1 out of 1 points

New business support systems that produced valuable information, in addition to performing manual tasks, were called management information systems (MIS) because managers were the primary users.

Question 3 1 out of 1 points

A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.

Question 4 1 out of 1 points

____ is a typical example of a system requirement for the input category.

Question 5 1 out of 1 points

____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

Question 6 1 out of 1 points

Examples of tangible benefits include all of the following except a(n) ____.

Question 7 1 out of 1 points

In a sequence diagram, the interaction proceeds from left to right along horizontal arrows, while a vertical timeline represents messages from one object to another.

Question 8 1 out of 1 points

Internal factors that affect IT systems projects include all of the following except ____.

Question 9 1 out of 1 points

A vertical system is a system, such as an inventory or payroll application, that can be adapted for use in many different companies.

Question 10 1 out of 1 points

____ is a typical example of a system requirement for the output category.

Selected Answer: The contact management system must generate a daily reminder list for all sales reps

Correct Answer: The contact management system must generate a daily reminder list for all sales reps

Question 11 1 out of 1 points

When evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

Question 12 1 out of 1 points

Supporters of neutral locations for interviews believe that it ____.

Question 13 1 out of 1 points

A horizontal system is designed to meet the unique requirements of a specific business or industry, such as a Web-based retailer, a medical practice, or a video chain.

Question 14 1 out of 1 points

All of the following are common reasons for systems requests except ____.

Question 15 1 out of 1 points

The main objective of all RAD approaches is to extend development time and expense by excluding users from every phase of systems development.

Question 16 1 out of 1 points

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Question 17 1 out of 1 points

Product-oriented companies primarily offer information or services or sell goods produced by others.

Question 18 1 out of 1 points

A systems request might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system.

Question 19 1 out of 1 points

Knowledge management systems are called expert systems because they ____.

Question 20 1 out of 1 points

When preparing a checklist of specific tasks to observe and questions to ask, a systems analyst should consider ____.

Question 21 1 out of 1 points

A systems request form should not ____.

Question 22 1 out of 1 points

In an information system, information consists of basic facts that are the system’s raw material.

Question 23 1 out of 1 points

In a typical company organizational model, middle managers ____.

Question 24 1 out of 1 points

Each activity within the systems analysis phase has an end product and one or more milestones.

Question 25 1 out of 1 points

Performance limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

Question 26 1 out of 1 points

____ is a typical example of a system requirement for the performance category.

Question 27 1 out of 1 points

In launching a new information system, the greatest risk occurs when a company ____.

Question 28 1 out of 1 points

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

Question 29 1 out of 1 points

When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

Question 30 1 out of 1 points

In many large companies, applications called enterprise resource planning (ERP) systems provide cost-effective support for users and managers throughout the company.

Question 31 1 out of 1 points

In an information system, data is information that has been transformed into output that is valuable to users.

Question 32 1 out of 1 points

Of the measures of feasibility in the accompanying figure, ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”

Question 33 1 out of 1 points

A mission-critical system is one that is unimportant to a company’s operations.

Question 34 1 out of 1 points

To evaluate ____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.

Question 35 1 out of 1 points

Greater user involvement in the system development process usually results in poorer communication, slower development times, and less satisfied users.

Question 36 1 out of 1 points

Examples of intangible benefits include all of the following except a(n) ____.

Question 37 1 out of 1 points

The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

Question 38 1 out of 1 points

In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

Question 39 1 out of 1 points

Creating an FDD is different from drawing an organization chart — systems analysts start at the bottom and work their way up.

Selected Answer: False

Correct Answer: False

Question 40 1 out of 1 points

Systems requests seldom are aimed at improving service to customers or users within a company.

Question 41 1 out of 1 points

The primary advantage of RAD is that ____.

Question 42 1 out of 1 points

TP systems are inefficient because they process a set of transaction-related commands individually rather than as a group.

Question 43 1 out of 1 points

While RAD typically focuses only on fact-finding and requirements determination, JAD provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation.

Question 44 1 out of 1 points

____ is a traditional, time-tested, easy to understand systems development technique that uses a set of process models to describe a system graphically.

Question 45 1 out of 1 points

A risk of RAD is that a system might work well in the short term, but the corporate and long-term objectives for the system might not be met.

Question 46 1 out of 1 points

____ is an example of a discretionary project.

Question 47 1 out of 1 points

A(n) ____ describes the logic that programmers use to write code modules.

Question 48 0 out of 1 points

In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

Question 49 1 out of 1 points

IBM claims that its WebSphere strategy is best for Web-based application development, while Microsoft counters with a broad vision called .NET that redefines that company’s approach to Web-based application development.

Question 50 1 out of 1 points

Hardware-based security controls include passwords, various levels of user access, and coding data.

Question 51 1 out of 1 points

A business process describes a specific set of transactions, events, tasks, and results.

Question 52 1 out of 1 points

A ____, or requirements model, describes the information that a system must provide.

Question 53 1 out of 1 points

Compared with traditional methods, the entire RAD process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.

Question 54 1 out of 1 points

As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.

Question 55 1 out of 1 points

Today, systems development is much more team-oriented than in the past.

Question 56 1 out of 1 points

Business support systems ____.

Question 57 1 out of 1 points

When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

Question 58 1 out of 1 points

System requirements fall into five general categories: outputs, inputs, processes, performance, and controls.

Question 59 1 out of 1 points

A SWOT analysis contributes to the strategic planning process by identifying ____ resources.

Question 60 1 out of 1 points

Although the business-to-business (B2B) sector is more familiar to retail customers, the volume of business-to-consumer (B2C) transactions is many times greater.

Question 61 1 out of 1 points

IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

Question 62 1 out of 1 points

Transaction processing (TP) systems ____.

Question 63 1 out of 1 points

Traditionally, a company either developed its own information systems, called in-house applications, or purchased systems called software packages from outside vendors.

Question 64 1 out of 1 points

User productivity systems ____.

Question 65 1 out of 1 points

System analysts use modeling and fact-finding interactively — first they build fact-finding results into models, then they study the models to determine whether additional fact-finding is needed.

Question 66 1 out of 1 points

In a typical company organizational model, top managers ____.

Question 67 1 out of 1 points

Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Question 68 1 out of 1 points

When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

Question 69 1 out of 1 points

Compared with traditional methods, when properly used, JAD can result in all of the following except ____.

Question 70 1 out of 1 points

In an interview, ____ limit or restrict the response.

Question 71 1 out of 1 points

Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.

Question 72 1 out of 1 points

A company’s mission statement is unrelated to its major goals, shorter-term objectives, and day-to-day business operations.

Question 73 1 out of 1 points

Strategic planning looks beyond day-to-day activities and focuses on a horizon that is 3, 5, or even 10 years in the future.

Question 74 1 out of 1 points

____ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.

Question 75 1 out of 1 points

Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

Question 76 1 out of 1 points

____ is a typical example of a system requirement for the process category.

Question 77 1 out of 1 points

Internal and external factors affect every business decision that a company makes, and IT systems are no exception.

Question 78 1 out of 1 points

Because it is linked to a specific development methodology, systems developers use JAD whenever group input and interaction is not desired.

Question 79 1 out of 1 points

External factors that affect IT systems projects include all of the following except ____.

Question 80 1 out of 1 points

The purpose of a JIT (just-in-time) system is to provide the right product at the right place at the right time.

Question 81 1 out of 1 points

Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product.

Question 82 1 out of 1 points

____ is a typical example of a system requirement for the control category.

Question 83 1 out of 1 points

Management leadership and information technology are unconnected, and no significant changes have occurred in either area.

Question 84 1 out of 1 points

Of the measures of feasibility in the accompanying figure, ____ considers points such as “Does the proposed platform have sufficient capacity for future needs?” and “Will the hardware and software environment be reliable?”

Question 85 1 out of 1 points

____ software controls the flow of data, provides data security, and manages network operations.

Question 86 1 out of 1 points

Of the measures of feasibility in the accompanying figure, issues that relate to ____ include “Has management established a firm timetable for the project?” and “Will a project manager be appointed?”

Question 87 1 out of 1 points

When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

Question 88 1 out of 1 points

Because of the limited range of input and interaction among participants, few companies believe that a JAD group produces the best definition of a new system.

Question 89 1 out of 1 points

Application software manages hardware components, which can include a single workstation or a global network with many thousands of clients.

Question 90 1 out of 1 points

System software consists of programs that support day-to-day business functions and provide users with the information they require.

Question 91 1 out of 1 points

The success or failure of an information system usually is unrelated to whether users are satisfied with the system’s output and operations.

Question 92 1 out of 1 points

In an interview, ____ encourage spontaneous and unstructured responses.

Question 93 1 out of 1 points

A system must have effective controls to ensure that data is secure and accurate.

Question 94 1 out of 1 points

UML provides various graphical tools, such as use case diagrams and sequence diagrams.

Question 95 1 out of 1 points

Service-oriented companies manufacture and sell products such as computers, routers, or microchips.

Question 96 1 out of 1 points

Systems development typically starts with a ____.

Question 97 1 out of 1 points

A strong business case suggests that a company should pursue other options, above the alternative, because it would be in the firm’s best interest to do so.

Question 98 1 out of 1 points

Much of the time a systems analyst spends talking with people is spent conducting ____, which is/are the most common fact-finding technique.

Question 99 1 out of 1 points

Data entry controls should be excessive without being effective.

Question 100 1 out of 1 points

RAD relies heavily on prototyping and user involvement.

Question 1 1 out of 1 points

When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

Question 2 1 out of 1 points

The Software & Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of ____ is redefining the way that companies develop and deploy their information systems.

Question 3 1 out of 1 points

In a DFD, the Gane and Sarson symbol for an entity is a ____.

Question 4 1 out of 1 points

Another term for IBS is managed hosting, because the operation is managed by the outside firm, or host.

Question 5 1 out of 1 points

A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

Question 6 1 out of 1 points

All of the following are true of Web-based development except ____.

Question 7 1 out of 1 points

An object treats data and processes separately.

Question 8 1 out of 1 points

In a DFD, the Gane and Sarson symbol for a process is a ____.

Question 9 1 out of 1 points

A gray hole process is a process that has ____.

Question 10 1 out of 1 points

All of the following are true of a traditional systems development environment except ____.

Question 11 1 out of 1 points

When DFDs are drawn, each of the following conventions should be followed except ____.

Question 12 1 out of 1 points

Which of the following is NOT an attribute of a car?

Question 13 1 out of 1 points

Two Web-based development environments are IBM’s WebSphere and Microsoft’s .NET.

Question 14 1 out of 1 points

Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

Question 15 1 out of 1 points

Building an application in a Web-based environment might involve different risks and benefits, compared to a traditional environment.

Question 16 1 out of 1 points

Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

Question 17 1 out of 1 points

____ is a widely used method of visualizing and documenting an information system.

Question 18 1 out of 1 points

A logical model describes how a system will be constructed.

Question 19 1 out of 1 points

In a DFD, a process symbol can have only one outgoing data flow.

Question 20 1 out of 1 points

In a DFD, a data flow must have a process symbol on at least one end.

Question 21 1 out of 1 points

Typically, customers purchase licenses that give them the right to use the software under the terms of the license agreement.

Question 22 1 out of 1 points

When companies use a ____, they already know the specific products or service they want and need to obtain price quotations or bids from vendors.

Question 23 1 out of 1 points

Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.

Question 24 1 out of 1 points

A gas pump is an example of a black box.

Question 25 1 out of 1 points

An IBS (Internet business services) solution is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.

Question 26 1 out of 1 points

Your car performs a(n) ____ called operate wipers when you send a message by moving the proper control.

Question 27 1 out of 1 points

A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.

Question 28 1 out of 1 points

A black hole process is a process that has ____.

Question 29 1 out of 1 points

In a use case, an external entity is called a(n) ____.

Question 30 1 out of 1 points

Leveling ____.

Question 31 1 out of 1 points

In a DFD, the Gane and Sarson symbol for a data store is a ____.

Question 32 1 out of 1 points

Several years ago, Gartner, a leading IT research and consulting firm, accurately forecast the enormous growth of offshore outsourcing.

Question 33 1 out of 1 points

A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects.

Question 34 1 out of 1 points

An auto parts store inventory ____ might include part number, description, supplier code, minimum and maximum stock levels, cost, and list price.

Question 35 1 out of 1 points

All of the following are true of Web-based development except ____.

Correct Answer: Web-based software treats the software as a service that is more dependent on desktop computing powers and resources

Question 36 1 out of 1 points

Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable, business solution that fits the company’s long-term business strategy.

Question 37 0 out of 1 points

Many valuable reports can be obtained from a data dictionary, including a(n) ____.

Question 38 1 out of 1 points

In a DFD, the Gane and Sarson symbol for a data flow is a ____.

Question 39 1 out of 1 points

Microsoft’s ____ is one of the major Web-based development environments.

Question 40 1 out of 1 points

A data flow in a DFD represents one or more data items.

Question 41 1 out of 1 points

The number of attributes needed to describe an object depends on the business requirements of the information system and its users.

Question 42 1 out of 1 points

An object’s ____ are the tasks or functions the object performs.

Question 43 1 out of 1 points

A major advantage of outsourcing is that it eliminates employee concerns about job security.

Question 44 1 out of 1 points

The UML symbol for a use case is a(n) ____ with a label that describes the action or event.

Question 45 1 out of 1 points

Using Gane and Sarson symbols, a DFD represents processes as circles.

Question 46 1 out of 1 points

A black box does not want or need outside interference.

Question 47 1 out of 1 points

The Software & Information Industry Association (SIIA) believes that the acquisition of software as a service rather than a product will have a major impact on the software industry.

Question 48 1 out of 1 points

Two data stores can be connected by a data flow without an intervening process.

Question 49 1 out of 1 points

Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

Question 50 1 out of 1 points

A class can belong to a more general category called a subclass.

Question 51 1 out of 1 points

The concept that a message gives different meanings to different objects is called encapsulation.

C

Question 52 1 out of 1 points

Oracle Corporation offers a service called ____, which provides E-business applications on a fixed fee basis.

Question 53 1 out of 1 points

Balancing ____.

Question 54 1 out of 1 points

In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

Question 55 1 out of 1 points

The UML represents an object as a(n) ____ with the object name at the top, followed by the object’s attributes and methods.

Question 56 1 out of 1 points

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

Question 57 1 out of 1 points

All relationships have equal weight; none is stronger than any other.

Question 58 0 out of 1 points

A method is like a blueprint, or template, for all the objects within a class.

Question 59 1 out of 1 points

A DFD shows the structure and detailed contents of a data flow.

Question 60 1 out of 1 points

In a traditional systems development environment, security issues usually are less complex than with Web-based systems, because the system operates on a private telecommunications network, rather than the Internet.

Question 61 1 out of 1 points

System analysts define an object’s attributes during the systems design process.

Question 62 1 out of 1 points

An ASP provides a license to use the software, and nothing more.

Question 63 1 out of 1 points

A(n) ____ defines specific tasks that an object can perform.

Question 64 0 out of 1 points

The same message to two different objects produces the same results.

Question 65 1 out of 1 points

A software package developed to handle information requirements for a specific type of business is called a horizontal application.

Question 66 1 out of 1 points

Spontaneous generation, black holes, and gray holes are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.

Question 67 1 out of 1 points

A use case ____ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.

Question 68 1 out of 1 points

Data flows are shown in a context diagram because data stores are external to the system.

Question 69 1 out of 1 points

A software package that can be used by many different types of organizations is called a vertical application.

Question 70 1 out of 1 points

Internet-based development treats the Web as just a communications channel, rather than as a platform.

Question 71 1 out of 1 points

A DFD does not show the external entities that provide data to the system or receive output from the system.

C

Question 72 1 out of 1 points

The ____ uses a set of symbols to represent graphically the various components and relationships within a system.

Question 73 1 out of 1 points

Late in the systems design phase, you build a logical model that describes how a system will be constructed.

Question 74 1 out of 1 points

The main reason for offshore outsourcing is the same as domestic outsourcing: lower bottom-line costs.

Question 75 1 out of 1 points

By limiting access to internal processes, an object prevents its internal code from being altered by another object or process.

C

Question 76 1 out of 1 points

Systems analysts call an entity that supplies data to the system a sink, and an entity that receives data from the system a source.

Correct Answer:

Question 77 1 out of 1 points

Typically, companies choose in-house software development for all of the following reasons except to ____.

Question 78 1 out of 1 points

Which of the following is not a path that development can follow?

Question 79 1 out of 1 points

DFD symbols are referenced by using all ____ letters for the symbol name.

Correct Answer: capital

Question 80 1 out of 1 points

The data dictionary usually records and describes a default value, which is the ____.

Correct Answer: v

Question 81 1 out of 1 points

Leveling also is called ____.

Question 82 1 out of 1 points

The line from the actor to a use case is called a(n) ____.

Question 83 1 out of 1 points

If objects are similar to adjectives that describe the characteristics of an object, attributes are similar to nouns.

Question 84 1 out of 1 points

Customer objects can perform specific tasks, such as placing an order, or paying a bill.

Question 85 1 out of 1 points

A DFD does not show the detailed contents of a data store — the specific structure and data elements are defined in the data dictionary.

Question 86 1 out of 1 points

A use case ____ is a visual summary of several related use cases within a system or subsystem.

Question 87 0 out of 1 points

Advantages of purchasing a software package over developing software in-house include all of the following except ____.

Question 88 1 out of 1 points

Inheritance enables an object to derive one or more of its attributes from a(n) ____.

Question 89 0 out of 1 points

Buyers can customize a software package by ____.

Question 90 1 out of 1 points

Your red Mustang is a(n) ____ of the CAR class.

C

Question 91 1 out of 1 points

Objects can have a specific attribute called a(n) ____, which describes the object’s current status.

Question 92 1 out of 1 points

A physical model shows what the system must do, regardless of how it will be implemented.

Question 93 1 out of 1 points

In a DFD, processes contain the business logic, also called business rules, that transform the data and produce the required results.

C

Question 94 1 out of 1 points

Outsourcing can refer to ____.

Question 95 1 out of 1 points

A data flow diagram (DFD) shows how the system transforms input data into useful information.

Question 96 1 out of 1 points

When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____.

Question 97 1 out of 1 points

Some objects might have a few attributes; others might have dozens.

Question 98 1 out of 1 points

A set of DFDs provides a logical model that shows how the system works, not what the system does.

Question 99 0 out of 1 points

A spontaneous generation process is a process that has ____.

Question 100 1 out of 1 points

An object has certain ____.

Correct Answer:

Question 1 1 out of 1 points

Problems found with 1NF (first normal form) design that do not exist in 2NF (second normal form) include all of the following except ____.

Question 2 1 out of 1 points

When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.

Question 3 1 out of 1 points

An existence check is a data validation check that ____.

C

Question 4 1 out of 1 points

Exception reports are useful when the user needs to know the details, but does not want information only on records that might require action.

C

Question 5 0 out of 1 points

In a typical file processing environment, ____ problems can occur if updates are not applied in every file.

Question 6 1 out of 1 points

In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.

Question 7 1 out of 1 points

A combination check is a data validation check that ____.

Correct Answer: is performed on two or more fields to ensure that they are consistent or reasonable when considered together

Question 8 1 out of 1 points

In a detail report, each line of output printed is called a detail line.

Question 9 1 out of 1 points

Web pages are stored on a Web server, which is a computer that receives requests and makes Web pages available to users.

Question 10 1 out of 1 points

Online processing systems typically have all of the following characteristics except ____.

Question 11 1 out of 1 points

A ____ is a text document written in HTML.

Question 12 0 out of 1 points

A table is in first normal form (1NF) if it contains a repeating group.

Correct Answer:

Question 13 1 out of 1 points

Relational databases are poorly suited to client/server computing because they are so powerless and rigid.

Correct Answer:

Question 14 1 out of 1 points

____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

Correct Answer:

Question 15 1 out of 1 points

Today, client/server architecture is the dominant form of systems design, using Internet protocols and traditional network models.

Correct Answer:

Question 16 1 out of 1 points

A disadvantage of server-based processing is that character-based terminals typically are used, which provide a limited interface for users.

Correct Answer:

Question 17 1 out of 1 points

In a file-oriented information system, a security file ____.

Correct Answer: is created and saved for backup and recovery purposes

Question 18 1 out of 1 points

In the OSI (open system interconnection) model, the application layer ____.

Correct Answer:

Question 19 1 out of 1 points

To design data entry screens that are easy to learn and use, employ all of the following guidelines except ____.

Correct Answer:

Question 20 1 out of 1 points

Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.

Correct Answer: False

Question 21 1 out of 1 points

A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.

Correct Answer:

Question 22 1 out of 1 points

A batch processing system has all of the following characteristics except ____.

Correct Answer: the information system is available whenever necessary to support business operations

Question 23 1 out of 1 points

In contrast to a centralized system, a client/server design separates applications and data.

Correct Answer:

Question 24 1 out of 1 points

Impact printers can use multi-part forms to produce more than one copy, which is an advantage to firms that require several copies of the same report.

Correct Answer:

Question 25 1 out of 1 points

In a client/server design, a database server ____.

Correct Answer: processes individual SQL commands

Question 26 1 out of 1 points

In a Web-based database design, the Internet serves as the front end, or interface, for the database management system.

Correct Answer:

Question 27 1 out of 1 points

In the OSI (open system interconnection) model, the presentation layer ____.

Correct Answer: assures that data is uniformly structured and formatted for network transmission

Question 28 1 out of 1 points

Podcasts are especially important for legal reasons, or where it is necessary to display a signature, date stamp, or other visual features of a document.

Correct Answer:

Question 29 1 out of 1 points

In a file-oriented information system, a transaction file ____.

Correct Answer:

Question 30 1 out of 1 points

A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

Correct Answer:

Question 31 1 out of 1 points

For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate.

summary report

Question 32 1 out of 1 points

In a file-oriented information system, a history file contains reference data used by the information system.

Correct Answer:

Question 33 1 out of 1 points

An entity is a person, place, thing, or event for which data is collected and maintained.

Correct Answer:

Question 34 1 out of 1 points

A client is a computer that supplies data, processing services, or other support to one or more computers, called servers.

Correct Answer:

Question 35 1 out of 1 points

The Internet has had little impact on system architecture.

Question 36 1 out of 1 points

In e-commerce, data mining works best when a goal is to reduce clicks to close, which means average page views to accomplish a purchase or obtain desired information.

Correct Answer:

Question 37 1 out of 1 points

According to a usability expert at IBM, a computer user has the right to ____.

Correct Answer:

Question 38 1 out of 1 points

A reasonableness check is a data validation check that ____.

Correct Answer:

Question 39 1 out of 1 points

A range check is a data validation check that ____.

Correct Answer:

Question 40 1 out of 1 points

A system design where the server performs all the processing is described as ____.

Correct Answer:

Question 41 1 out of 1 points

In a typical LAN, clients share data stored on a local server that supports a group of users or a department.

Question 42 1 out of 1 points

Intranets and extranets are called Web-centric because they use different protocols, or data transmission standards, than the Internet.

Correct Answer:

Question 43 1 out of 1 points

In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.

Correct Answer:

Question 44 1 out of 1 points

One problem in a file processing environment is ____, which means that data common to two or more information systems is stored in several places.

Correct Answer:

Question 45 1 out of 1 points

Interface design should call attention to the interface, rather than facilitating design objectives.

Correct Answer:

Question 46 1 out of 1 points

In today’s interconnected world, output from one system often becomes input into another system.

Correct Answer:

Question 47 1 out of 1 points

When using Microsoft Office, documents, spreadsheets, and databases can be stored in Unicode-compatible form by using the font called ____.

Correct Answer:

Question 48 1 out of 1 points

Good interface design is based partly on ____, which focuses on how an interface can be made attractive and easy to use.

Correct Answer: aesthetics

Question 49 1 out of 1 points

A subschema is a view of a database used by one or more systems or users.

Correct Answer:

Question 50 1 out of 1 points

Good user interface design is based partly on ____, which describes how people work, learn, and interact with computers.

Correct Answer:

Question 51 1 out of 1 points

____ describes how instances of one entity relate to instances of another entity.

Correct Answer:

Question 52 1 out of 1 points

____ protects privacy rights and shields an organization’s proprietary data from theft or unauthorized access.

Correct Answer:

Question 53 1 out of 1 points

____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Correct Answer:

Question 54 1 out of 1 points

Centering headings over maximum field widths is ideal when many of the actual values are shorter than the maximum width.

Correct Answer:

Question 55 1 out of 1 points

Middleware provides a transparent interface that enables system designers to integrate dissimilar software and hardware.

Correct Answer:

Question 56 1 out of 1 points

The speed of laser printers is rated in ____, which can be used to estimate the time required to print a report.

Correct Answer:

Question 57 0 out of 1 points

As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.

Correct Answer:

Question 58 1 out of 1 points

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

Correct Answer:

Question 59 1 out of 1 points

On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms.

Correct Answer:

Question 60 1 out of 1 points

Compared to file server designs, client/server systems ____.

Correct Answer: reduce network loads and improve response times

Question 61 1 out of 1 points

A report footer, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.

Correct Answer:

Question 62 1 out of 1 points

In a typical client/server system, the client stores the data and provides data access and database management functions.

Question 63 1 out of 1 points

Apart from backup and recovery procedures necessary to sustain business operations ____ laws and regulations apply to company data.

Correct Answer:

Question 64 1 out of 1 points

When considering physical design, a systems analyst must determine how a new application will communicate with existing legacy systems.

Correct Answer:

Question 65 1 out of 1 points

After a report design is approved, the design should be documented in a ____, which contains information about the fields, data types and lengths, report frequency and distribution, and other comments.

Correct Answer:

Question 66 1 out of 1 points

A fat client, also called a thick client, design locates all or most of the processing logic at the server.

Correct Answer:

Question 67 1 out of 1 points

Visio is an example of a CASE tool that can help users plan, analyze, design, and implement an information system.

Correct Answer:

Question 68 1 out of 1 points

A(n) ____ produces one or more lines of output for each record processed.

Correct Answer: d

Question 69 1 out of 1 points

In a file-oriented information system, a work file ____.

Correct Answer:

Question 70 1 out of 1 points

The type of output and the technology needed usually is decided during the systems analysis phase, based on user requirements.

Question 71 1 out of 1 points

A database system stores and manages data in separate files using a method called file processing.

Correct Answer:

Question 72 1 out of 1 points

When designing a report, a sample report, which is a ____, or prototype, should be prepared for users to review.

Correct Answer:

Question 73 1 out of 1 points

A(n) ____ displays only those records that meet a specific condition or conditions.

Correct Answer:

Question 74 1 out of 1 points

In the OSI (open system interconnection) model, the session layer ____.

Correct Answer: defines control structures that manage the communications link between computers

Question 75 0 out of 1 points

Either a page header or a page footer, which appears at the bottom of a page, is used to display the name of the report and a page number.

Correct Answer:

Question 76 1 out of 1 points

A fat client design is ____ to develop than a thin client design, because the architecture resembles traditional file-server designs where all processing is performed at the client.

Correct Answer:

Question 77 1 out of 1 points

A three-tier design includes a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.

Correct Answer:

Question 78 1 out of 1 points

The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

Correct Answer:

Question 79 1 out of 1 points

When a system produces multiple reports, each report should have completely different design elements.

Correct Answer:

Question 80 1 out of 1 points

In a report, a group header can be printed after the last detail line in a group and a group footer above the first detail line.

Correct Answer:

Question 81 1 out of 1 points

In a file-oriented information system, a master file ____.

Correct Answer: stores relatively permanent data about an entity

Question 82 1 out of 1 points

A report header, which appears at the beginning of a report, identifies the report, and contains the report title, date, and other necessary information.

Correct Answer:

Question 83 1 out of 1 points

In a client/server design, tasks are divided between servers, which are workstations that users interact with, and clients, which are computers that supply data, processing, and services to the server workstations.

Question 84 1 out of 1 points

When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.

Correct Answer:

Question 85 1 out of 1 points

An extranet is a private, company-owned network to provide Web-based access to users.

Correct Answer:

Question 86 1 out of 1 points

Specific DBMS (database management system) advantages include all of the following except ____.

Correct Answer:

Question 87 1 out of 1 points

Although stand-alone PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, stand-alone computing was inefficient and expensive.

Correct Answer:

Question 88 0 out of 1 points

Physical storage refers to information as seen through a user’s eyes, regardless of how or where the information actually is organized or stored.

Correct Answer:

Question 89 1 out of 1 points

Using a DDBMS (distributed database management system) offers all of the following advantages except ____.

Correct Answer: t

Question 90 1 out of 1 points

File sharing designs are efficient only if the number of networked users is ____.

Correct Answer:

Question 91 1 out of 1 points

Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.

Correct Answer:

Question 92 1 out of 1 points

HTML uses formatting codes called ____, which specify how the text and visual elements on a Web page will be displayed in a Web browser.

Correct Answer:

Question 93 1 out of 1 points

A Web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.

Correct Answer:

Question 94 1 out of 1 points

A dialog box allows a user to enter information about a task that the system will perform.

Correct Answer:

Question 95 1 out of 1 points

In a client/server interaction, the client submits a request for information from the server, which carries out the operations and responds to the client.

Question 96 1 out of 1 points

Every information system involves ____.

Correct Answer:

Question 97 1 out of 1 points

Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems.

Correct Answer:

Question 98 1 out of 1 points

User-selected Help always offers assistance for the task in progress.

Question 99 1 out of 1 points

In most organizations, the IT department is responsible for output control and security measures.

Correct Answer:

Question 100 1 out of 1 points

In older systems, often the user interface mainly consisted of process-control screens that allowed a user to send commands to the system.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

High Quality Assignments
Innovative Writer
Top Grade Essay
Pro Writer
Smart Homework Helper
Ideas & Innovations
Writer Writer Name Offer Chat
High Quality Assignments

ONLINE

High Quality Assignments

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$50 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$50 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$43 Chat With Writer
Pro Writer

ONLINE

Pro Writer

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$21 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$32 Chat With Writer
Ideas & Innovations

ONLINE

Ideas & Innovations

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$33 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Involuntary group - Carl lange theory of emotion - Pearsall v alexander - Toyota prius product life cycle analysis - Importance of classroom management ppt - Bunsen burner set up - Business information value chain in mis - Business government and society a managerial perspective - Cpt code for vats pleurodesis - Property of spiker and sponge - Assignment 9/16 - Theories of hotel and restaurant management - Cessna 182p v speeds - Holden outerwear promotes innovation at the individual employee level by - Warwick university bluebell accommodation - Ir led eye safety calculator - Short essay shoulder gridle - Industrial and Hazardous Waste Management - How does an appendix work in a report - Smitty's men's & boy's wear - Holy cross application form - Is copper more reactive than iron - What does bt37 mean - Mary's bicarbonate levels are consistent with an acidic blood ph - Paper - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI - Vitamins calories per gram - How to increase cogat scores - Human resource management discussion questions - Atraumatic care in pediatric nursing - Namma kalvi 12th study material - Mentoring program design and reflection - Molar heat of combustion of ethanol experiment - Abiotic factors of a jungle - How fast do clouds move - Global Citizen Journal - Hot glass looks the same as cold glass - Initiating the Project - Problem Set 8 - Terence irwin nicomachean ethics pdf - Canal and river trust handcuff key - Create a clustered column chart object for cells - Industrial regions of the world on map - Teens and technology share a future - Comment and reply - Lg nortel phone instructions - Hookstick operated disconnect switch - Front end rounding decimals multiplication - Marketers and senior managers like to see graphical - Acceleration of a cart lab report answers - Principles of distributed database systems - Titian’s portrait of isabella d’este does not portray isabella as she really looked. - Who am i at school - Java applet window yellow triangle - All summer in the day - Essay - Mid latitude cyclone worksheet answers - Health education west midlands - Course paper - Fluke 5502a multi product calibrator - Exercise 11 5 computing payroll taxes lo p2 p3 - Example of an enthymeme in the media - Big data discussion questions - Mortality rate of ball turret gunners - Order # 9381 - How do you look after a hamster - Bsbmgt517 manage operational plan assessment 2 - Pocahontas powhatan opechancanough - Mark skousen net worth - The processes of photosynthesis and cellular respiration are complementary - Ass 44 - Shakespeare most famous sonnets 18 - Consumer Behavior Assignment 2 - Pyrex glass tf 55.4 c - Example of a refutation - Bachelor of midwifery rmit - Standardization of naoh with khp lab report - Health employees state award - Accuracy and precision worksheet chemistry - Operation Excellence - Final Paper - Dsw comenity bank customer service - The results of accounting principals latest workonomix - Math project(writing proofs) - 3 5 6 improper fraction - Defence plaza sydney pass office - 3 p of business communication - Precise background services whirlpool - Jumping for the jelly beans herzberg - St george bank equipment finance - Energy and Circular Motion Exercises - " What Started the Civil War" - Create your own constellation project - Walden prospectus template - Discussion Post - Progress notes aged care documentation examples - Experiment 3. Separation of the Components of a Mixture - Building a simple network packet tracer - !!!~USA~!!! +91-8529590991 lOVE Vashikaran Specialist Molvi ji - Complete comparative income statements for the month of january for laker company - Classification of space maintainers