Which of the factors would tend to increase technical risk

Assignment Help Operating System
Reference no: EM13943504

1. The _____ is generated by the department or person that has an idea for a new information system.

feasibility analysis

gradual refinement

project sponsor

system request

work plan

2. The principal disadvantages(s) with the waterfall development methodology is (are) _______.

a long time elapses between completion of the system proposal and the delivery of the system

it identifies system requirements long before programming begins

it minimizes changes to the requirements as the project proceeds

the design must be completely specified on paper before programming begins

a long time elapses between completion of the system proposal and the delivery of the system and the design must becompletely specified on paper before programming begins

3. During which phase of the SDLC should the analyst determine the who, what, where, when, and how of the current system?

Designing the System

Analyzing the System

none of the above

Evaluating the System

4. Workflow analysis tends to focus most strongly on:

the people who perform the work.

the policies influencing decision making.

the actual work or tasks being completed.

the data used within the system.

5. The creation of a design prototype that is not a working information system, but represents a part of the system that needs additional refinement happens with the prototyping methodology.

True

False

6. The primary advantage of the Waterfall Development methodology is requirements are completely specified and held relatively constant prior to programming.

True

False

7._____ means that the same message can be interpreted differently by different classes of objects.

Inheritance

Encapsulation

Polymorphism

Information Hiding

Dynamic Binding

8. Which of the steps in interview preparation should be performed first?

Decide whom to interview.

Read background material.

Decide on question types and interview structure.

Prepare the interviewee.

9. The biggest difference between collecting data by questionnaire or by interview is:

questionnaires are easier and faster to design, administer, and analyze than are interviews.

questions on questionnaires cannot be open-ended; interviews can include open-ended questions.

interviews are interactive and meanings can be clarified; questionnaires are not so interactive.

questionnaires can only be distributed to a small number of people; interviews can involve a wider number of respondents.

10. Which of these is not a recommended task in designing observation activities?

Deciding what activities to observe.

Decide at what level of concreteness activities are to be observed.

Notify all who will be observed so they can clean their offices, dress up for the observation, and generally spruce things up.

Prepare appropriate scales, checklists, and other materials for conducting the observations.

11. What is an advantage gained from the use of data flow diagrams rather than narratives to represent the information requirements of a system?

Users will immediately understand the diagrams with no need for explanation or training.

Data flow diagrams are not able to be easily understood by users.

The diagrams are an excellent way to represent the system graphically without committing to a specific technical implementation.

Data flow diagrams represent systems only in extremely simple terms.

12. The objective of UML is to provide diagramming techniques in the analysis and design phases that easily translate to Java code during the implementation phase.

True

False

13._________ diagrams represent the things, concepts or ideas that are contained in an application.

Activity diagrams

Sequence diagrams

Class diagrams

Deployment diagrams

Interaction diagrams

14. Feasibility analysis may be defined as a(n)_____.

assessment of ability of the ultimate users of the system to accept the system and incorporate it into the ongoing operations of the organization

determination of the extent to which the system can be technically designed, developed, and installed

guide to determining whether to proceed with a project

identification of only the costs and benefits associated with the project

none of the above

15. Which of the following factors would tend to increase the technical risk of a project?

familiarity with the technology

large project size

creating an application that is familiar to the users and analysts

small project size

the number of other applications under development in the firm

16. Examples of development costs include all EXCEPT _____.

consultant fees

hardware expenses

salaries for the project team

software licensing fees

none of the above

17. If end users feel fearful or threatened by a proposed new system, this factor should be included as a part of the _____.

economic feasibility assessment

organizational feasibility assessment

system proposal

system request

technical feasibility assessment

18. A critical success factor for project management is to _____.

create a work plan

follow the three steps of project management

identify most project tasks

manage the hundreds of tasks

start with a realistic assessment of the work

19. Diane needs to create a work plan for an upcoming systems project. She must first _____.

estimate the hours and request deliverables

identify the tasks and estimate the time needed to complete them

initiate the project and create the project management assessment

make tradeoffs and set conservative numbers

timebox the completion date

20. The process of assigning values for the time and effort needed to perform a system project is called _____.

analysis

estimation

identifying

planning

preparation

21. Kathryn has little experience estimating the time it will take to complete a systems project. She has just completed the planning phase of the project. What method should she use to estimate the time required to build the system?

adjusted project complexity

function points

industry standards

Microsoft Project

more complex approach

22. A(n) ____________ is a measure of program size based on the number and complexity of inputs, outputs, queries, files, and program interfaces.

function point

line of code

project plan

standard module

workplan

23. Root cause analysis attempts to find solutions for the business problems.

True

False

24. A systems analyst is participating in an exchange of services with another organization. First, the analyst visits the partner organization, studies and evaluates their systems, and recommends changes and improvements. Then, a team of analysts from the partner organization visits the analyst's organization and performs the same service. This process is an example of benchmarking.

True

False

25. What information-gathering strategy enables the analyst to see the reality of the situation rather than listen to others describe it?

document analysis

interviewing

joint application design (JAD) sessions

observation

questionnaires

26. The information gathering technique that is most effective in combining information from a variety of perspectives, building consensus, and resolving discrepancies is a(n) _____.

document analysis

interview

joint application development

observation

questionnaire

27. Which of the following analysis strategies incurs the highest risk yet has the potential to provide high value to the business?

Business Process Automation

Business Process Improvement

Business Process Reengineering

Business Process Renovation

Root cause analysis

28. The goal of ______ analysis strategy is to make minor or moderate changes to the business processes so that they will become more efficient and effective.

business process automation

business process benchmarking

business process reengineering

business process systemization

business process improvement

29. _______ is an example of functional requirements.

The system should work with any web browser

The system should load any web page within 3 seconds

Customers should be able to see their orders after authentication

The system should comply with the company's policy of buying all PCs and servers from Dell

The system should be able to search all available inventory in order to determine whether a product can be made by a given date

30. A scenario is the same as a(n) _____.

use case

relationship

path through a use case

collection of use cases

role

31. Each use case describes _____ function(s) in which users interact with the system.

one

one or more

many

zero, one, or more

all

32.

The importance level of a use case increases for all of the following characteristics of the use case EXCEPT _____.

the use case represents an important business process

the use case supports revenue generation

the technology is proven

the functionality is complex

the functionality is time-critical

33.

The _____ relationship in use cases allows use cases to support the concept of inheritance.

association

extend

include

generalization

none of the above

34.

Which of the following relationships describe the communication between the use case and the actors?

association relationship

extend relationship

include relationship

generalization relationship

none of the above

35.

Which of the relationship types in use cases enables functional decomposition?

association relationship

extend relationship

include relationship

generalization relationship

decompose relationship

36.

Use cases are the primary drivers for all of the UML diagramming techniques.

True

False

37.

Each object has _______ that specify information about the object.

Methods

Messages

Procedures

Other objects

Attributes

38.

________ allow the analyst to model the processes in an information system.

Package diagrams

Deployment diagrams

Component diagrams

Class diagrams

Activity diagrams

39.

Agile development approach is considered a special case of RAD approach to developing systems.

True

False

40.

In which phase of the SDLC is the system proposal developed?

analysis

design

implementation

planning

system delivery

Reference no: EM13943504

Questions Cloud

Explore the philosophical underpinnings of the approach : Choose a theoretical perspective from the ones covered in the module syllabus - explore the philosophical underpinnings of the approach
Explain the advantages and disadvantages of qualitative : Analyze and describe any two types of qualitative research methods. Recommend in which situations, qualitative research methods can be used in public health research. Explain the advantages and disadvantages of qualitative as well as quantitative res..
Commonly used cubic equation of state : The Soave-Redlich-Kwong equation is a commonly used cubic equation of state, second in popularity only to the Peng-Robinson Equation of state. In this problem, just derive the two equations (7.66) given in the problem.
Discuss quality of each mission statement based on concepts : Discuss the quality of each mission statement based on concepts from the course material. Assess whether the mission statement clearly defines the organization and drives strategic decisions?
Which of the factors would tend to increase technical risk : assessment of ability of the ultimate users of the system to accept the system and incorporate it into the ongoing operations of the organization
Career goals and intentions related to developmentally : Application: Career Goals and Intentions Related to Developmentally Appropriate Practice, You have learned that developmentally appropriate practice is not an activity or a strategy but a complex decision-making process, an approach to care and ed..
Consequences of the drop in rate to the economy : Explain the consequences of the drop in rate to the economy" Mortgage rates dropped again this week, with the 15-year fixed-rate loan hitting a record low, according to a report from mortgage financier Freddie Mac.
Meta-analyses-sexual selection and aging : Within species, do males that invest most in sexual competition and Among species, do those that exhibit more intense sexual selection (e.g. species with harems) age faster? Does this happen in one or both sexes?
Erp get a second lease on life : Kennametal, a $2 billion maker of construction tools, has spent $10 million on ERP maintenance contracts during the past 13 years and not once could the company take advantage of upgrades, says CIO Steve Hanna. The company's implementation was too..

Reviews

Write a Review

Operating System Questions & Answers

  Difference between eigrp and ospf

Imagine that you are a network engineer tasked with implementing either an EIGRP or OSPF solution for your routers.

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

  To determine the values to be printed in the first column

The values in the first column will include 1*start, 2*start, and so on up to 10*start. This will be done using a for loop. In addition, myNumber should appear in the first column in the appropriate row

  What is difference between historic and new bsd release unix

What is major difference between the Historic Unix and the new BSD release of Unix System V in terms of Memory Management?

  Format of a memory address

Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.

  Differences and similarities between linux and unix?

What are some distinct differences and similarities between Linux and Unix? Why do you think it is important to know about both of these operating systems

  Discuss bluetooth technology and different applications

Discuss Bluetooth technology and different applications. Give an overview on emerging trends in wearable computing.

  Find all the dns servers for microsoft.com

I desperately need assistance on the questions below which some of them requires using the the command prompt. I would like to have the answer with the detail step by step commands

  Compare and contrast at least two operating systems

Compare and contrast at least two (2) operating systems that are available today for use on personal computers and / or mobile devices. If you were considering the purchase of a new computing device (i.e., desktop, laptop, smartphone, or tablet)

  Lanen corporation is a major imaging solutions provider the

lanen corporation is a major imaging solutions provider. the company has three main divisions one that manufactures

  Effects of spyware and adware

Describe the effects of spyware and adware. Discuss how has spyware and adware impacted the public's confidence in the security of internet?

  Enable multimedia on a website

Few multimedia can be hard to watch on a mobile device due to screen size or bandwidth limitations. Determine two articles that discuss considerations and new developments that will enable multimedia on a site

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd