Test Bank for Systems Analysis and Design, 9th Edition: Shelly
Test Bank for Systems Analysis and Design, 9th Edition: Shelly
Test Bank for Systems Analysis and Design, 9th Edition: Shelly
Test Bank for Systems Analysis and Design, 9th Edition: Shelly
1. Test Bank for Systems Analysis and Design, 9th
Edition: Shelly download
http://testbankbell.com/product/test-bank-for-systems-analysis-
and-design-9th-edition-shelly/
Find test banks or solution manuals at testbankbell.com today!
2. We have selected some products that you may be interested in
Click the link to download now or visit testbankbell.com
for more options!.
Solution Manual for Systems Analysis and Design 9th
Edition by Shelly
http://testbankbell.com/product/solution-manual-for-systems-analysis-
and-design-9th-edition-by-shelly/
Test Bank for Systems Analysis and Design, 8th Edition:
Shelly
http://testbankbell.com/product/test-bank-for-systems-analysis-and-
design-8th-edition-shelly/
Systems Analysis and Design Rosenblatt 10th Edition Test
Bank
http://testbankbell.com/product/systems-analysis-and-design-
rosenblatt-10th-edition-test-bank/
Solution Manual for Managing for Quality and Performance
Excellence, 10th Edition
http://testbankbell.com/product/solution-manual-for-managing-for-
quality-and-performance-excellence-10th-edition/
3. Java Programming 9th Edition Joyce Farrell Solutions
Manual
http://testbankbell.com/product/java-programming-9th-edition-joyce-
farrell-solutions-manual/
Test Bank for Essentials of Pediatric Nursing, 1st
Edition: Theresa Kyle
http://testbankbell.com/product/test-bank-for-essentials-of-pediatric-
nursing-1st-edition-theresa-kyle/
Test Bank for Ethical Obligations and Decision Making in
Accounting: Text and Cases, 5th Edition, Steven M Mintz,
Roselyn E. Morris
http://testbankbell.com/product/test-bank-for-ethical-obligations-and-
decision-making-in-accounting-text-and-cases-5th-edition-steven-m-
mintz-roselyn-e-morris-i/
International Accounting Doupnik 3rd Edition Solutions
Manual
http://testbankbell.com/product/international-accounting-doupnik-3rd-
edition-solutions-manual/
Management 12th Edition Griffin Solutions Manual
http://testbankbell.com/product/management-12th-edition-griffin-
solutions-manual/
4. Principles of Auditing and Other Assurance Services
Whittington 19th Edition Solutions Manual
http://testbankbell.com/product/principles-of-auditing-and-other-
assurance-services-whittington-19th-edition-solutions-manual/
5. Test Bank for Systems Analysis and Design, 9th Edition: Shelly
Download full chapter at: https://testbankbell.com/product/test-bank-for-systems-
analysis-and-design-9th-edition-shelly/
Chapter 1 – Introduction to Systems Analysis and Design
MULTIPLE CHOICE
1. In launching a new information system, the greatest risk occurs when a company ____.
a. begins by outlining its business models and identifying possible IT solutions
b. tries to decide how the system will be implemented before determining what the system is
supposed to do
c. considers implementation options after having a clear set of objectives
d. all of the above
ANS: B PTS: 1 REF: 7
2. ____ software controls the flow of data, provides data security, and manages network operations.
a. Enterprise c. Application
b. System d. Legacy
ANS: B PTS: 1 REF: 8
3. Examples of company-wide applications, called ____, include order processing systems, payroll
systems, and company communications networks.
a. enterprise applications c. operating applications
b. network operating systems (NOS) d. legacy systems
ANS: A PTS: 1 REF: 8
4. Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power
would double about every ____.
a. 2 months c. 24 months
b. 12 months d. 48 months
ANS: C PTS: 1 REF: 8
5. When planning an information system, a company must consider how a new system will interface with
older systems, which are called ____.
a. enterprise applications c. operating applications
b. network operating systems (NOS) d. legacy systems
ANS: D PTS: 1 REF: 9
6. For complex operations, analysts apply computer-based modeling tools that use a standard language
called ____.
a. electronic data interchange (EDI)
b. joint application development (JAD)
c. business process modeling notation (BPMN)
d. rapid application development (RAD)
ANS: C PTS: 1 REF: 10
6. 7. Systems analysts use a process called ____ to represent company operations and information needs.
a. JAD c. RAD
b. Scrum d. business process modeling
ANS: D PTS: 1 REF: 10
8. A business ____ is an overview that describes a company’s overall functions, processes, organization,
products, services, customers, suppliers, competitors, constraints, and future direction.
a. matrix c. index
b. profile d. glossary
ANS: B PTS: 1 REF: 10
9. Which of the following is one of the main sectors of e-commerce?
a. C2C c. C2B
b. B2C d. BBC
ANS: B PTS: 1 REF: 13
10. ____ enabled computer-to-computer transfer of data between companies, usually over private
telecommunications networks.
a. EDI c. TCH
b. ACH d. O-O
ANS: A PTS: 1 REF: 14
11. Transaction processing (TP) systems ____.
a. provide job-related information to users at all levels of a company
b. simulate human reasoning by combining a knowledge base and inference rules that
determine how the knowledge is applied
c. process data generated by day-to-day business operations
d. include e-mail, voice mail, fax, video conferencing, word processing, automated
calendars, database management, spreadsheets, and high-speed Internet access
ANS: C PTS: 1 REF: 15
12. Business support systems ____.
a. provide job-related information support to users at all levels of a company
b. simulate human reasoning by combining a knowledge base and inference rules that
determine how the knowledge is applied
c. process data generated by day-to-day business operations
d. include e-mail, voice mail, fax, video conferencing, word processing, automated
calendars, database management, spreadsheets, and high-speed Internet access
ANS: A PTS: 1 REF: 16
13. Knowledge management systems are called expert systems because they ____.
a. provide job-related information to users at all levels of a company
b. simulate human reasoning by combining a knowledge base and inference rules that
determine how the knowledge is applied
c. process data generated by day-to-day business operations
d. include e-mail, voice mail, fax, video conferencing, word processing, automated
calendars, database management, spreadsheets, and high-speed Internet access
ANS: B PTS: 1 REF: 16
7. 14. User productivity systems ____.
a. provide job-related information to users at all levels of a company
b. simulate human reasoning by combining a knowledge base and inference rules that
determine how the knowledge is applied
c. process data generated by day-to-day business operations
d. include e-mail, voice mail, fax, video and Web conferencing, word processing, automated
calendars, database management, spreadsheets, desktop publishing, presentation graphics,
company intranets, and high-speed Internet access
ANS: D PTS: 1 REF: 17
15. In a typical company organizational model, top managers ____.
a. develop long-range plans, called strategic plans, which define the company’s overall
mission and goals
b. provide direction, necessary resources, and performance feedback to supervisors and team
leaders
c. oversee operation employees and carry out day-to-day functions, coordinating operational
tasks and people
d. include users who rely on TP systems to enter and receive the data they need to perform
their jobs
ANS: A PTS: 1 REF: 18
16. In a typical company organizational model, middle managers ____.
a. develop long-range plans, called strategic plans, which define the company’s overall
mission and goals
b. provide direction, necessary resources, and performance feedback to supervisors and team
leaders
c. oversee operation employees and carry out day-to-day functions, coordinating operational
tasks and people
d. include users who rely on TP systems to enter and receive the data they need to perform
their jobs
ANS: B PTS: 1 REF: 18
17. A ____, or requirements model, describes the information that a system must provide.
a. process model c. business model
b. data model d. network model
ANS: C PTS: 1 REF: 19
18. A(n) ____ describes the logic that programmers use to write code modules.
a. process model c. business model
b. object model d. network model
ANS: A PTS: 1 REF: 19
19. ____ is a systems development technique that produces a graphical representation of a concept or
process that systems developers can analyze, test, and modify.
a. Prototyping c. Scrum
b. Rapid application development d. Modeling
ANS: D PTS: 1 REF: 19
20. ____ is a systems development technique that tests system concepts and provides an opportunity to
examine input, output, and user interfaces before final decisions are made.
8. a. Scrum c. Modeling
b. Prototyping d. Rapid application development
ANS: B PTS: 1 REF: 20
21. ____ methods include the latest trends in software development.
a. Object-oriented analysis c. Structured analysis
b. Agile/Adaptive d. Rapid application development
ANS: B PTS: 1 REF: 21
22. The ____ method of developing systems is well-suited to project management tools and techniques.
a. object-oriented analysis c. structured analysis
b. adaptive d. rapid application development
ANS: C PTS: 1 REF: 21
23. The ____ method of developing systems produces code that is modular and reusable.
a. object-oriented analysis c. structured analysis
b. adaptive d. rapid application development
ANS: A PTS: 1 REF: 21
24. The ____ method of developing systems stresses team interaction and reflects a set of community-
based values.
a. object-oriented analysis c. structured analysis
b. agile/adaptive d. rapid application development
ANS: B PTS: 1 REF: 21
25. Structured analysis is a traditional systems development technique that uses a series of phases, called
the ____, to plan, analyze, design, implement, and support an information system.
a. O-O c. MSF
b. SDLC d. RUP
ANS: B PTS: 1 REF: 22
26. Because it focuses on processes that transform data into useful information, structured analysis is
called a(n) ____ technique.
a. iterative c. inferred
b. process-centered d. empowered
ANS: B PTS: 1 REF: 22
9. 27. In the ____, like that shown in the accompanying figure, the result of each phase, which is called a
deliverable or end product, flows sequentially into the next phase in the SDLC.
a. interactive model c. waterfall model
b. requirements model d. object model
ANS: C PTS: 1 REF: 22
28. In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal
request to the IT department, called a systems request, which describes problems or desired changes in
an information system or a business process.
a. systems design phase c. systems support and security phase
b. systems planning phase d. systems analysis phase
ANS: B PTS: 1 REF: 23
29. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a
logical model of the new system.
a. systems analysis phase c. systems design phase
b. systems implementation phase d. systems support and security phase
ANS: A PTS: 1 REF: 23
30. In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a
physical model that will satisfy all documented requirements for the system.
a. systems implementation phase c. systems analysis phase
b. systems planning phase d. systems design phase
ANS: D PTS: 1 REF: 24
31. In the model of the SDLC shown in the accompanying figure, during ____, the new system is
constructed.
10. a. systems planning c. systems design
b. systems support and security d. systems implementation
ANS: D PTS: 1 REF: 24
32. In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains,
enhances, and protects the system.
a. systems support and security c. systems analysis
b. systems implementation d. systems planning
ANS: A PTS: 1 REF: 24
33. Whereas structured analysis treats processes and data as separate components, ____ combines data and
the processes that act on the data into things called objects.
a. the MSF c. RUP
b. the SDLC d. O-O
ANS: D PTS: 1 REF: 24
34. In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar
objects.
a. property c. message
b. class d. instance
ANS: B PTS: 1 REF: 24
35. In object-oriented design, built-in processes called ____ can change an object’s properties.
a. methods c. attributes
b. functions d. features
ANS: A PTS: 1 REF: 25
36. Agile methods typically use a(n) ____model, which represents a series of iterations based on user
feedback.
a. gradual c. spiral
b. extreme d. evaluative
ANS: C PTS: 1 REF: 26
37. When building an information system, all of the following basic guidelines should be considered
except ____.
a. stick to an overall development plan
b. identify major milestones for project review and assessment
c. provide accurate and reliable cost and benefit information
d. ensure that users are not involved in the development process
ANS: D PTS: 1 REF: 27
38. The ____ group typically provides leadership and overall guidance, but the systems themselves are
developed by teams consisting of users, managers, and IT staff members.
a. Web support c. systems support
b. application development d. database administration
ANS: B PTS: 1 REF: 28
11. 39. ____ provides vital protection and maintenance services for system software and hardware, including
enterprise computing systems, networks, transaction processing systems, and corporate IT
infrastructure.
a. User support c. Systems support and security
b. Database administration d. Network administration
ANS: C PTS: 1 REF: 29
40. A systems analyst needs ____.
a. solid technical knowledge and good analytical ability
b. strong oral and written communication skills
c. an understanding of business operations and processes
d. all of the above
ANS: D PTS: 1 REF: 30
MULTIPLE RESPONSE
Modified Multiple Choice
1. An example of a vertical system is a(n) ____.
a. inventory application c. payroll application
b. medical practice application d. database for a video chain
ANS: B, D PTS: 1 REF: 8
2. An example of a horizontal system is a(n) ____.
a. inventory application c. payroll application
b. application for a Web-based retailer d. medical practice application
ANS: A, C PTS: 1 REF: 8
3. A business process describes a specific set of ____.
a. transactions c. events
b. employees d. results
ANS: A, C, D PTS: 1 REF: 10
4. Product-oriented firms produced ____.
a. retail services c. computers
b. routers d. microchips
ANS: B, C, D PTS: 1 REF: 11
5. Database administration involves ____.
a. network administration c. data design
b. user access d. backup
ANS: B, C, D PTS: 1 REF: 29
MODIFIED TRUE/FALSE
1. System software consists of programs that support day-to-day business functions and provide users
with the information they require. _________________________
12. ANS: F, Application
PTS: 1 REF: 8
2. Value-added services such as consulting, financing, and technical support can be more profitable than
hardware. _________________________
ANS: T PTS: 1 REF: 11
3. Rational Unified Process documents the experience of Microsoft’s own software development teams.
_________________________
ANS: F
Microsoft Solutions Framework
MSF
PTS: 1 REF: 27
4. Rapid application development focuses on team-based fact-finding. _________________________
ANS: F
Joint application development
Joint application development (JAD)
JAD
JAD (joint application development)
PTS: 1 REF: 27
5. User support provides users with technical information, training, and productivity support.
_________________________
ANS: T PTS: 1 REF: 29
TRUE/FALSE
1. Most firms give their IT budgets a low priority in bad economic times.
ANS: F PTS: 1 REF: 4
2. A mission-critical system is one that is unimportant to a company’s operations.
ANS: F PTS: 1 REF: 7
3. In an information system, data is information that has been transformed into output that is valuable to
users.
ANS: F PTS: 1 REF: 7
4. In an information system, information consists of basic facts that are the system’s raw material.
ANS: F PTS: 1 REF: 7
13. 5. The success or failure of an information system usually is unrelated to whether users are satisfied with
the system’s output and operations.
ANS: F PTS: 1 REF: 10
6. Although the business-to-business (B2B) sector is more familiar to retail customers, the volume of
business-to-consumer (B2C) transactions is many times greater.
ANS: F PTS: 1 REF: 14
7. TP systems are inefficient because they process a set of transaction-related commands individually
rather than as a group.
ANS: F PTS: 1 REF: 16
8. In a knowledge management system, a knowledge base consists of logical rules that identify data
patterns and relationships.
ANS: F PTS: 1 REF: 17
9. A knowledge management system uses inference rules, which consist of a large database that allows
users to find information by entering keywords or questions in normal English phrases.
ANS: F PTS: 1 REF: 17
10. Most large companies require systems that combine transaction processing, business support,
knowledge management, and user productivity features.
ANS: T PTS: 1 REF: 17
11. Because they focus on a longer time frame, middle managers need less detailed information than top
managers, but somewhat more than supervisors who oversee day-to-day operations.
ANS: F PTS: 1 REF: 18-19
12. Many companies find that a trend called empowerment, which gives employees more responsibility
and accountability, improves employee motivation and increases customer satisfaction.
ANS: T PTS: 1 REF: 19
13. CASE tools provide an overall framework for systems development and support a wide variety of
design methodologies, including structured analysis and object-oriented analysis.
ANS: T PTS: 1 REF: 20
14. It is unusual for system developers to mix and match system development methods to gain a better
perspective.
ANS: F PTS: 1 REF: 22
15. In the systems planning phase, a key part of the preliminary investigation is a feasibility study that
reviews anticipated costs and benefits and recommends a course of action based on operational,
technical, economic, and time factors.
14. ANS: T PTS: 1 REF: 23
16. In the systems analysis phase, the first step is requirements modeling, where business processes are
investigated and what the new system must do to satisfy users is documented.
ANS: T PTS: 1 REF: 23
17. In object-oriented design, objects possess characteristics called properties, which the object inherits
from its class or possesses on its own.
ANS: T PTS: 1 REF: 24
18. A scalable design can expand to meet new business requirements and volumes.
ANS: T PTS: 1 REF: 24
19. In object-oriented design, a message requests specific behavior or information from another object.
ANS: T PTS: 1 REF: 25
20. Microsoft offers a development approach called Microsoft Solutions Framework (MSF), which
documents the experience of its own software development teams.
ANS: T PTS: 1 REF: 27
21. An IT group provides technical support, which includes application development, systems support and
security, user support, database administration, network administration, and Web support.
ANS: T PTS: 1 REF: 28
22. Network administration includes hardware and software maintenance, support, and security.
ANS: T PTS: 1 REF: 29
23. Companies typically require that systems analysts have a college degree in information systems,
computer science, business, or a closely related field, and some IT experience usually is required.
ANS: T PTS: 1 REF: 32
24. The responsibilities of a systems analyst at a small firm are exactly the same as those at a large
corporation.
ANS: F PTS: 1 REF: 33
25. A corporate culture is the set of beliefs, rules, traditions, values, and attitudes that define a company
and influence its way of doing business.
ANS: T PTS: 1 REF: 33
COMPLETION
1. _________________________ refers to the combination of hardware, software, and services that
companies use to manage, communicate, and share information.
16. ANS:
Information technology (IT)
IT
PTS: 1 REF: 4
2. _________________________ is a step-by-step process for developing high-quality information
systems.
ANS: Systems analysis and design
PTS: 1 REF: 7
3. A(n) _________________________ combines information technology, people, and data to support
business requirements.
ANS: information system
PTS: 1 REF: 7
4. An IT department team includes _________________________ who plan, develop, and maintain
information systems.
ANS: systems analysts
PTS: 1 REF: 7
5. A(n) _________________________ is a set of related components that produces specific results, such
as routing Internet traffic, manufacturing microchips, and controlling complex entities like the Mars
Rover.
ANS: system
PTS: 1 REF: 7
6. In the accompanying figure showing the components of an information system,
_________________________ consist(s) of everything in the physical layer of the information
system.
ANS: hardware
PTS: 1 REF: 8
17. 7. In the accompanying figure showing the components of an information system,
_________________________ refer(s) to the programs that control the hardware and produce the
desired information or results.
ANS: software
PTS: 1 REF: 8
8. In the accompanying figure showing the components of an information system,
_________________________ is/are the raw material that an information system transforms into
useful information.
ANS: data
PTS: 1 REF: 9
9. In the accompanying figure showing the components of an information system,
_________________________ describe(s) the tasks and business functions that users, managers, and
IT staff members perform to achieve specific results.
ANS: processes
PTS: 1 REF: 9
10. In the accompanying figure showing the components of an information system, the people, called
_________________________, interact with an information system, both inside and outside the
company.
ANS:
users
end users
PTS: 1 REF: 10
11. The newest category of company is the _________________________ whose primary business
depends on the Internet rather than a traditional business channel.
ANS:
Internet-dependent firm
dot-com company
.com company
PTS: 1 REF: 12
12. Traditional companies sometimes are called _________________________ companies because they
conduct business primarily from physical locations.
ANS: brick-and-mortar
PTS: 1 REF: 12
13. Internet-based commerce is called _________________________ and includes two main sectors: B2C
(business-to-consumer) and B2B (business-to-business).
18. ANS:
e-commerce
electronic commerce
I-commerce
Internet commerce
PTS: 1 REF: 13
14. _________________________ technology uses high-frequency radio waves to track physical object.
ANS:
RFID
Radio frequency identification
RFID (Radio frequency identification)
Radio frequency identification (RFID)
PTS: 1 REF: 16
15. A truck fleet dispatcher might run a series of _________________________ scenarios to determine
the impact of increased shipments or bad weather.
ANS: what-if
PTS: 1 REF: 16
16. _________________________ programs run on a company intranet and enable users to share data,
collaborate on projects, and work in teams.
ANS: Groupware
PTS: 1 REF: 17
17. The systems implementation phase of the SDLC includes an assessment, called a(n)
_________________________, to determine whether the system operates properly and if costs and
benefits are within expectation.
ANS: systems evaluation
PTS: 1 REF: 24
18. A(n) _________________________ uses various symbols and shapes to represent data flow,
processing, and storage.
ANS:
data flow diagram
DFD
data flow diagram (DFD)
DFD (data flow diagram)
PTS: 1 REF: 22
19. _________________________ design and construct Web pages, monitor traffic, manage hardware and
software, and link Web-based applications to a company’s information systems.
19. ANS: Web support specialists
PTS: 1 REF: 29
20. Many hardware and software companies offer _________________________ for IT professionals,
which verifies that an individual demonstrated a certain level of knowledge and skill on a standardized
test.
ANS: certification
PTS: 1 REF: 32
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
a. MIS f. team leaders
b. network model g. operational employees
c. object model h. supply chain management
d. fuzzy logic i. data model
e. ERP j. prototype
1. In many large companies, these kinds of systems provide cost-effective support for users and managers
throughout the company.
2. The name for new business support systems that produced valuable information, in addition to
performing manual tasks; their primary users were managers.
3. A B2B site that allows buyers, sellers, distributors, and manufacturer to offer products, submit
specifications, and transact business.
4. Many knowledge management systems use this technique, which allows inferences to be drawn from
imprecise relationships.
5. People who oversee operational employees and carry out day-to-day functions.
6. People who rely on TP systems to enter and receive data they need to perform their jobs.
7. Describes the design and protocols of telecommunications links.
8. Describes objects, which combine data and processes.
9. Describes data structures and design.
10. An early working version of an information system.
1. ANS: E PTS: 1 REF: 15
2. ANS: A PTS: 1 REF: 16
3. ANS: H PTS: 1 REF: 14
4. ANS: D PTS: 1 REF: 17
5. ANS: F PTS: 1 REF: 19
6. ANS: G PTS: 1 REF: 19
7. ANS: B PTS: 1 REF: 19
8. ANS: C PTS: 1 REF: 19
9. ANS: I PTS: 1 REF: 19
10. ANS: J PTS: 1 REF: 20
ESSAY
20. 1. Explain what a knowledge worker is, and why this kind of worker is required by successful
companies.
ANS:
Knowledge workers include professional staff members such as systems analysts, programmers,
accountants, researchers, trainers, and human resource specialists. Knowledge workers also use
business support systems, knowledge management systems, and user productivity systems. Knowledge
workers provide support for the organization's basic functions. Just as a military unit requires logistical
support, a successful company needs knowledge workers to carry out its mission.
PTS: 1 REF: 19 TOP: Critical Thinking
2. What are the disadvantages of each of the three system development methods?
ANS:
With structured analysis, changes can be costly, especially in later phases. Requirements are defined
early, and can change during development. Users might not be able to describe their needs until they
can see examples of features and functions. With object-oriented analysis, this somewhat newer
method of development might be less familiar to development team members. Also, the interaction of
objects and classes can be complex in larger systems. With agile/adaptive methods, team members
need a high level of technical and communications skills. Lack of structure and documentation can
introduce risk factors. Finally, the overall project might be subject to scope change as user
requirements change.
PTS: 1 REF: 21 TOP: Critical Thinking
3. Discuss the five basic systems development guidelines.
ANS:
Develop a Plan
Prepare an overall project plan and stick to it. Complete the tasks in a logical sequence. Develop a
clear set of ground rules and be sure that everyone on the team understands them clearly.
Involve Users and Listen Carefully to Them
Ensure that users are involved in the development process, especially when identifying and modeling
system requirements. When you interact with users, listen closely to what they are saying.
Use Project Management Tools and Techniques
Try to keep the project on track and avoid surprises. Create a reasonable number of checkpoints — too
many can be burdensome, but too few will not provide adequate control.
Develop Accurate Cost and Benefit Information
Managers need to know the cost of developing and operating a system, and the value of the benefits it
will provide. You must provide accurate, realistic cost and benefit estimates, and update them as
necessary.
Remain Flexible
Be flexible within the framework of your plan. Systems development is a dynamic process, and
overlap often exists among tasks. The ability to react quickly is especially important when you are
working on a system that must be developed rapidly.
PTS: 1 REF: 27 TOP: Critical Thinking
21. CASE
Critical Thinking Questions
Case 1-1
Roark has just joined the company and in his role as lead analyst, he will be responsible for
determining which systems development method the team uses to create the new application for a
major medical supplier.
1. After Roark has spent a week getting to know the members of the team, including their strengths and
weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme
keeps recurring: the team has particularly weak communications skills. Which of the following
methods, then, is he least likely to use, given what he knows about the disadvantages of each method?
a. structured analysis
b. agile/adaptive methods
c. object-oriented analysis
d. rapid application development
ANS:
B
PTS: 1 REF: 21 TOP: Critical Thinking
2. It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications
skills of his employees, getting them to work much better together. Now, the challenge that he faces is
not an internal one; it lies with the client, which is increasingly showing itself to be incapable of
sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that
the client will throw them a curveball and want to make changes late in the game — but that they also
will be unwilling to absorb the costs of those changes. For this reason, Roark eliminates which of the
following methods of development?
a. structured analysis
b. agile/adaptive methods
c. object-oriented analysis
d. rapid application development
ANS:
A
PTS: 1 REF: 21 TOP: Critical Thinking
Critical Thinking Questions
Case 1-2
Maddy has been performing at a very high level at the firm, and so when two colleagues of hers who
are currently leading other development efforts get sick or leave the company, she is asked to step in
and help manage these two other efforts.
3. When Maddy sits down at the first meeting at which the first group is gathering, she hears them
discussing the feasibility study in which they are currently engaged. She knows, then, in which phase
of the SDLC this team currently is. Which phase is it?
a. systems analysis
b. systems design
c. systems planning
22. d. systems implementation
ANS:
C
PTS: 1 REF: 23 TOP: Critical Thinking
4. After leaving the first meeting, Maddy goes down the hall to meet with the outgoing manager of the
second team. In that meeting, he shares with her the latest draft of the systems requirement document,
which is nearly complete. In which phase is the second team currently?
a. systems analysis
b. systems design
c. systems planning
d. systems implementation
ANS:
A
PTS: 1 REF: 24 TOP: Critical Thinking
24. Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is
derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is
posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files
25. containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or
providing access to or distributing Project Gutenberg™
electronic works provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
26. payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project
Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
27. law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except
for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
28. If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set
forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.
Section 2. Information about the Mission
of Project Gutenberg™
29. Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.
The Foundation’s business office is located at 809 North 1500
West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
30. Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws
regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states
where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot
make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.
Please check the Project Gutenberg web pages for current
donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
31. credit card donations. To donate, please visit:
www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.
Project Gutenberg™ eBooks are often created from several
printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
32. Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
testbankbell.com