Final Exam Key

1.(p.418)Which of the following questions is NOT considered when looking at technical feasibility?
a.Is the proposed technology or solution practical?
B.How do the end-users feel about their role in the new system?
c.Do we currently possess the necessary technology?
d.Do we possess the necessary technical expertise?
e.all of these questions are considered when looking at technical feasibility

LOD: Medium
Whitten - Chapter 11 #91

2.(p.436-437)Which of the following is NOT a guideline for answering questions during a formal presentation?
a.Limit the amount of time spent answering any one question.
b.Summarize your answers.
c.Try a little humor.
D.Never try to bluff.
e.Answer silly questions seriously.

LOD: Medium
Whitten - Chapter 11 #109

3.(p.417)Which kind of feasibility asks how well the proposed system satisfies the identified system requirements?
A.operational feasibility
b.technical feasibility
c.schedule feasibility
d.legal feasibility
e.cultural or political feasibility

LOD: Medium
Whitten - Chapter 11 #83

4.(p.417-418)Which of the following is NOT a question that addresses cultural/political feasibility?
a.Does management support the system?
b.How do end users feel about their role in the new system?
c.What users or managers may resist or not use the system?
d.How will the working environment of users change?
E.none of these

LOD: Medium
Whitten - Chapter 11 #81

5.(p.419)Which kind of feasibility deals with deadlines?
a.operational feasibility
b.technical feasibility
C.schedule feasibility
d.legal feasibility
e.cultural or political feasibility

LOD: Medium
Whitten - Chapter 11 #87

6.(p.449-450)Which of the following is a disadvantage of prototyping?
a.Numerous design issues are not addressed by prototyping.
b.Prototyping does not negate the need for systems analysis phases.
c.The scope and complexity of the system can quickly get out of control.
d.A prototype cannot completely substitute for a paper specification.
E.all of these

LOD: Easy
Whitten - Chapter 12 #71

7.(p.463)When several different vendors and/or products are candidates and you want to solicit competitive proposals and quotes, what would you use?
A.request for proposal (RFP)
b.request for quotation (RFQ)
c.request for specification (RFS)
d.request for design (RFD)
e.none of these

LOD: Medium
Whitten - Chapter 12 #77

8.(p.460)Which of the following is NOT a purpose of the procurement and decision analysis phase?
a.Identify and research specific products that could support our recommended solution for the target information system.
b.Solicit, evaluate, and rank vendor proposals.
C.Reverse engineer and draw system models for each of the vendors' proposals.
d.Contract with the awarded vendor to obtain the product.
e.None of these

LOD: Medium
Whitten - Chapter 12 #60

9.(p.449-450)Which of the following is a disadvantage of prototyping?
A.Prototyping encourages a return to the "code, implement and repair" life cycle.
b.Prototypes are a passive model of the system.
c.End-users don't fully understand their requirements until they see them implemented.
d.Errors cannot be detected as easily when a prototype is developed.
e.none of these

LOD: Medium
Whitten - Chapter 12 #70

10.(p.460)Which of the following is a purpose of the procurement and decision analysis phase?
a.Identify and research specific products that could support our recommended solution for the target information system.
b.Solicit, evaluate, and rank vendor proposals.
c.Select and recommend the best vendor proposal.
d.Contract with the awarded vendor to obtain the product.
E.All of these

LOD: Easy
Whitten - Chapter 12 #59

11.(p.502-503)What is defined by the IT architecture?
a.Approved network, data, interface and processing technologies.
b.Ongoing process for researching emerging technologies.
c.Strategy for integrating legacy systems and technologies into the application architecture.
d.Ongoing process for reviewing the application architecture for currency and appropriateness.
E.all of these

LOD: Medium
Whitten - Chapter 13 #121

12.(p.500)Which of the following is a kind of middleware?
a.XML
B.ODBC
c.LAN
d.HTML
e.none of these

LOD: Medium
Whitten - Chapter 13 #119

13.(p.481)Which of the following is NOT represented in a physical data flow?
a.The planned implementation of an input to or output from a physical process.
b.A database command or actions such as create, read, update, or delete.
c.The import of data or the export of data to another information system across the network.
d.The flow of data between two modules of subroutines within the same program.
E.Data and data manipulation layers are placed on the server(s) and the application logic, presentation logic and presentation are placed on the clients.

LOD: Medium
Whitten - Chapter 13 #116

14.(p.485)A set of computers connected over a relatively short distance to one or more servers is known as a(n):
A.LAN
b.WAN
c.MAN
d.CAN
e.backbone

LOD: Easy
Whitten - Chapter 13 #104

15.(p.484)A system in which the components of an information system are distributed to multiple locations in a computer network is known as:
a.a centralized system
b.an emulated system
c.a database system
d.a communications system
E.none of these

This is known as a distributed system

LOD: Medium
Whitten - Chapter 13 #96

16.(p.529)Which of the following are not criteria for producing a quality data model?
a.A good data model is simple.
B.A good data model is redundant.
c.A good data model is flexible.
d.A good data model is adaptable to future needs.
e.all of these are criteria for producing a quality data model

LOD: Medium
Whitten - Chapter 14 #147

17.(p.521)Pointers to the records of a different file in a database, they are used to link records of one type to those of another type:
a.attributes
b.referential pointers
c.descriptive fields
D.foreign keys
e.none of these

LOD: Medium
Whitten - Chapter 14 #159

18.(p.538)Which form of distribution duplicates data in multiple locations?
a.centralization
b.horizontal distribution
c.vertical distribution
D.replication
e.none of these

LOD: Medium
Whitten - Chapter 14 #177

19.(p.536)Appropriate controls must be designed to ensure that no field takes on a value that is outside of the range of legal values. This refers to:
a.referential integrity
B.domain integrity
c.key integrity
d.data integrity
e.none of these

LOD: Medium
Whitten - Chapter 14 #149

20.(p.524)The database technology used to support data architecture is called:
A.database architecture
b.network architecture
c.systems architecture
d.data architecture
e.none of these

LOD: Medium
Whitten - Chapter 14 #183

21.(p.557)Which kind of chart is similar to a line chart except that the focus is on the area under the line? It is useful for summarizing and showing the change in data over time. Each line represents one series or category of data.
A.area
b.bar
c.column
d.donut
e.none of these

LOD: Medium
Whitten - Chapter 15 #52

22.(p.553)Which of the following reports leave the organization, and are intended for customers, suppliers, partners and regulatory agencies?
a.internal
b.exception
c.detailed
D.external
e.none of these

LOD: Medium
Whitten - Chapter 15 #68

23.(p.553)A count of the number of students enrolled in each major would be an example of a(n):
A.summary report
b.exception report
c.external report
d.detailed report
e.none of these

LOD: Medium
Whitten - Chapter 15 #73

24.(p.556)Many of today's retail and consumer transactions are enabled or enhanced by:
a.printed output
b.display screens
C.point of sale terminals
d.tabular terminals
e.none of these

LOD: Medium
Whitten - Chapter 15 #49

25.(p.556)A term coined to collectively describe any information presented in a format other than traditional numbers, codes and words; including: graphics, sound, pictures and animation, is:
a.multimodal
b.graphical
c.zoned
D.multimedia
e.none of these

LOD: Medium
Whitten - Chapter 15 #50

26.(p.584)Batch processing is:
a.The identification and acquisition of new data.
B.The process of collecting entered data into files called batches.
c.The process of translating the source document into a machine-readable format.
d.The processing of captured data immediately.
e.none of these

LOD: Medium
Whitten - Chapter 16 #109

27.(p.584)Online processing is:
a.The identification and acquisition of new data.
b.The process of collecting entered data into files called batches.
c.The process of translating the source document into a machine-readable format.
D.The processing of captured data immediately.
e.none of these

LOD: Medium
Whitten - Chapter 16 #90

28.(p.593-594)A check box:
a.gives the user the flexibility of entering a data item's value directly, or selecting the value from a list.
b.requires the user to select a data item's value from a list of possible choices.
c.allows the user to enter data directly into the associated text box or to select a value by using the mouse to scroll (spin) through a list of values using the buttons.
D.acts as a toggle switch on an input value.
e.all of these.

LOD: Medium
Whitten - Chapter 16 #104

29.(p.585-587)Which of the following input methods could best be used by a manufacturing company to check a product into and out of a building?
a.touch screen
b.optical mark
c.smart cards
d.biometric
E.keyboard

LOD: Medium
Whitten - Chapter 16 #112

30.(p.586)MICR:
a.is used on forms for objective-based questions on exams.
b.requires the user or customer to carefully handwrite input data on a business form.
C.is most widely used in the banking industry.
d.is based on unique human characteristics or traits; for example, fingerprints, voice pattern, retinal pattern.
e.is based on the use of radio frequency, a tag and antenna to identify and track physical objects.

LOD: Medium
Whitten - Chapter 16 #93

31.(p.629)An important authentication guideline is to assign privileges to:
a.individuals
b.users
c.rules
D.roles
e.computers

LOD: Medium
Whitten - Chapter 17 #38

32.(p.628)Which of the following instruction-driven interfaces requires the user to learn a special syntax?
a.language-based
b.mnemonic
c.natural language
D.A and B
e.none of these

LOD: Medium
Whitten - Chapter 17 #31

33.(p.617)Which of the following verbs should be avoided in terminal dialogue?
a.select
b.type
C.hit
d.press
e.quit

LOD: Medium
Whitten - Chapter 17 #37

34.(p.617)With respect to the tone of a dialogue, use which of the following guidelines?
a.make things funny
b.use slang so users understand
C.don't be condescending
d.use abbreviations so that users can read them more quickly
e.none of these

LOD: Medium
Whitten - Chapter 17 #39

35.(p.632-633)Which of the following techniques for providing online help allows the user to write an inquiry in natural language?
a.tool tips
b.wizards
C.agents
d.pop-up menus
e.none of these

LOD: Medium
Whitten - Chapter 17 #42

36.(p.663)Which UML diagram models object state
a.sequence diagram
B.state machine diagram
c.class diagram
d.deployment diagram
e.communication diagram

LOD: Easy
Whitten - Chapter 18 #47

37.(p.670)If you needed to provide a stable interface to similar classes with different interfaces, you could use:
a.the strategy pattern
B.the adapter pattern
c.a creational pattern
d.the organizational pattern
e.none of these

LOD: Medium
Whitten - Chapter 18 #50

38.(p.648-649)The student class in an enrollment system would be an example of a(n):
A.entity class
b.interface class
c.control class
d.persistence class
e.system class

LOD: Medium
Whitten - Chapter 18 #55

39.(p.663)What is an object state?
A.a condition of the object at one time in its lifetime
b.an occurrence that triggers a change in an object
c.the act of simulating object behavior
d.a method that displays the current state of the object
e.none of these

LOD: Medium
Whitten - Chapter 18 #46

40.(p.673)What type of diagram is also an implementation type diagram that describes the physical architecture of the hardware and software in the system and depicts software components, processors, and devices that make up the systems architecture?
a.state
b.component
c.sequence
D.deployment
e.communication

LOD: Medium
Whitten - Chapter 18 #64

41.(p.692)Which kind of testing might be done by a quality assurance staff?
a.validation testing
b.verification testing
C.audit testing
d.matrix testing
e.litmus testing

LOD: Medium
Whitten - Chapter 19 #36

42.(p.691)Which installation strategy is the riskiest?
A.abrupt cut-over
b.parallel conversion
c.location conversion
d.staged conversion
e.there is no difference in the risk

LOD: Medium
Whitten - Chapter 19 #25

43.(p.692)Which kind of testing runs the system in a live environment using real data?
A.validation testing
b.verification testing
c.audit testing
d.matrix testing
e.litmus testing

LOD: Medium
Whitten - Chapter 19 #35

44.(p.686, 690)Which of the following is NOT a task of the Systems Implementation phase?
a.install databases
b.train system users
c.prepare conversion plan
D.install and test new software packages
e.conduct system test

LOD: Medium
Whitten - Chapter 19 #37

45.(p.688)If a programmer wrote a subroutine to calculate shipping cost, it would initially be tested with a(n):
a.systems test
B.stub test
c.unit test
d.program test
e.sub test

LOD: Medium
Whitten - Chapter 19 #21

46.(p.710)Which of the following terms means to modify or expand the application system in response to constantly changing requirements?
a.system requirements
b.system modifications
c.system changes
d.system maintenance
E.system enhancement

LOD: Medium
Whitten - Chapter 20 #27

47.(p.709)Which of the following ensures that the stand-alone program not only fixes the bug, but does so without side effects?
A.unit testing
b.system testing
c.regression testing
d.alpha testing
e.beta testing

LOD: Medium
Whitten - Chapter 20 #39

48.(p.709-710)Which of the following is NOT a possible system recovery activity?
a.rebooting the user's computer
b.calling network administration to fix a networking problem
c.calling vendor service representatives to fix hardware problems
d.isolate and trap a software bug
E.all of these are possible system recovery activities

LOD: Medium
Whitten - Chapter 20 #37

49.(p.714)Which kind of program restructuring is done to eliminate control flow knots and reduce cycle complexity?
a.code slicing
b.code conversion
C.code reorganization
d.both B and C
e.all of these

LOD: Easy
Whitten - Chapter 20 #34

50.(p.710-711)System enhancement can be done in response to all of the following events EXCEPT:
a.new business requirements
b.new business problems
c.new design requirements
d.new technology requirements
E.new recovery requirements

LOD: Easy
Whitten - Chapter 20 #33

Category / #ofQuestions
LOD:Easy / 6
LOD:Medium / 44
Whitten-Chapter11 / 5
Whitten-Chapter12 / 5
Whitten-Chapter13 / 5
Whitten-Chapter14 / 5
Whitten-Chapter15 / 5
Whitten-Chapter16 / 5
Whitten-Chapter17 / 5
Whitten-Chapter18 / 5
Whitten-Chapter19 / 5
Whitten-Chapter20 / 5