0% found this document useful (0 votes)
14 views17 pages

Sadd 0

Chapter 2 covers key concepts in systems analysis, including the importance of various modeling techniques and stakeholder identification. It includes true/false and multiple-choice questions that assess understanding of system requirements, architecture, and interview processes. The chapter emphasizes the complexity of information systems and the necessity for thorough analysis and documentation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views17 pages

Sadd 0

Chapter 2 covers key concepts in systems analysis, including the importance of various modeling techniques and stakeholder identification. It includes true/false and multiple-choice questions that assess understanding of system requirements, architecture, and interview processes. The chapter emphasizes the complexity of information systems and the necessity for thorough analysis and documentation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Chapter 2

I. True/False Questions
1. Systems analysis involves the creation of logical models.
o Answer: T

o Points: 1

o Reference: p44

2. The reason an analyst uses many different models is that each relates to a
different aspect of the system.
o Answer: T

o Points: 1

o Reference: p44

3. Textual models are used to represent precise aspects of the system that can be
best represented by using formulas.
o Answer: F

o Points: 1

o Reference: p45

4. Sometimes a narrative description is the best form to use for recording


information.
o Answer: T

o Points: 1

o Reference: p45

5. A key reason that modeling is important in system development is the


complexity of describing information systems.
o Answer: T

o Points: 1

o Reference: p45

6. Before gathering detailed information, an analyst identifies every type of


stakeholder.
o Answer: T

o Points: 1

o Reference: p47

7. In the RMO CSMS project, customers are not considered stakeholders because
it is not feasible to interview them or use them in the project activities.
o Answer: F

o Points: 1
Chapter 2

o Reference: p48

8. Core Process 3 involves defining in great detail what the information system
needs to accomplish in order to provide the organization with the desired
benefits.
o Answer: T

o Points: 1

o Reference: p41

9. Beginning analysts often underestimate how much there is to learn about the
work the users perform.
o Answer: T

o Points: 1

o Reference: p41

10. A fact finding user interview can usually be completed in one comprehensive
session.
o Answer: F

o Points: 1

o Reference: p49

11. If the analysts understand the major business processes, it is not usually
necessary to create a comprehensive list of all business processes.
o Answer: F

o Points: 1

o Reference: p50

12. The first and most important step in preparing for an interview is to determine
who should be involved.
o Answer: F

o Points: 1

o Reference: p51

13. Asking about error conditions usually is done in later interviews after the
analyst understands and documents the basic processing requirements.
o Answer: F

o Points: 1

o Reference: p52

14. A good way to remember the details of an interview is to use a tape recorder.
o Answer: F
Chapter 2

o Points: 1

o Reference: p52

15. Reviewing existing documentation is a good idea for analysts because it is a


dependable source of accurate policies and procedures.
o Answer: F

o Points: 1

o Reference: p56

16. When observing business processes, it is not necessary to observe all the
processes at the same level of detail.
o Answer: T

o Points: 1

o Reference: p56

17. It is a good idea to observe user processes so that the analyst will know exactly
how to build the functions into the new system.
o Answer: F

o Points: 1

o Reference: p56

18. The term “I’ll know it when I see it” applies to one valid way to get
requirements definition.
o Answer: T

o Points: 1

o Reference: p57

19. A decision point within an activity diagram may be shown with an activity
symbol.
o Answer: T

o Points: 1

o Reference: p58

20. A synchronization bar in an activity diagram allows multiple agents or actors to


participate in a workflow in separate rows.
o Answer: F

o Points: 1

o Reference: p57-58

II. Multiple Choice Questions


Chapter 2

1. The term technology architecture refers to:


a. the software resources which make up the information systems
b. the hardware, network, and system software
c. the combination of information systems and the hardware infrastructure
d. the configuration of the old technology and new technology within an organization
o Answer: B

o Points: 1

o Reference: p37

2. Application architecture is used to refer to:


a. the organization and configuration of all software solutions into information
systems
b. the application of the information system to solve business problems
c. the architectural structure of the subsystems within a software application
d. the relationship between software applications and the areas of the organization
that they support
o Answer: A

o Points: 1

o Reference: p37

3. Which of the following items is NOT a part of the application architecture?


a. Functional requirements
b. General requirements
c. User requirements
d. Nonfunctional requirements
o Answer: D

o Points: 1

o Reference: p37

4. Which of the following describes what the system is required to do?


a. Physical
b. Functional
c. Logical
d. System
o Answer: A

o Points: 1

o Reference: p42

5. _______ requirements are based on the procedures and rules that the
organization uses to run its business.
a. System
b. Physical
c. Nonfunctional
d. Implementation
Chapter 2

o Answer: B

o Points: 1

o Reference: p42

6. _______ requirements are characteristics of the system other than the business
procedures it must support.
a. Screen and reporting requirements
b. Software requirements
c. System requirements
d. Security requirements
o Answer: C

o Points: 1

o Reference: p43

7. The S in the FURPS acronym stands for _______.


a. Physical requirements
b. Performance requirements
c. People requirements
d. Processing requirements
o Answer: D

o Points: 1

o Reference: p43

8. The P in the FURPS acronym stands for _______.


a. Security
b. Nonfunctional
c. Technical
d. Functional
o Answer: B

o Points: 1

o Reference: p43

9. _______ requirements are most often documented in graphical and textual


models.
a. logical
b. graphical
c. mathematical
d. textual
o Answer: D

o Points: 1

o Reference: p45

10. Diagrams and schematic representations of some aspect of a system are


examples of a ______ model.
Chapter 2

a. requirement
b. technique
c. model
d. user interface
o Answer: B

o Points: 1

o Reference: p46

11. A representation of some aspect of the system being built is a _______.


a. textual
b. descriptive
c. graphical
d. mathematical
o Answer: C

o Points: 1

o Reference: p45

12. A series of formulas that describe technical aspects of a system is a(n) model.
a. User Modification Language
b. Unified Modeling Language
c. User Mode Listings
d. Unix Modeling Language
o Answer: D

o Points: 1

o Reference: p46

13. What does the Acronym UML stand for?


a. users
b. clients
c. managers
d. stakeholders
o Answer: B

o Points: 1

o Reference: p46

14. The term _______ refers to all the people who have an interest in the successful
implementation of the system.
a. user stakeholders
b. client stakeholders
c. operational stakeholders
d. executive stakeholders
o Answer: D

o Points: 1
Chapter 2

o Reference: p47

15. Persons who regularly interact with the system as part of their jobs are called
_______.
a. Business stakeholders
b. Client stakeholders
c. External stakeholders
d. Executive stakeholders
o Answer: C

o Points: 1

o Reference: p47

16. What type of stakeholders are those that do not use the system on day-to-day
tasks, but use information, such as reports, from the system?
a. Oversight committee
b. Client
c. Board of directors
d. Department head
o Answer: D

o Points: 1

o Reference: p47

17. What do we call the person or group who provides funding for the development
of the new system?
a. Technical stakeholders
b. Support staff
c. System programmers
d. Operational stakeholders
o Answer: B

o Points: 1

o Reference: p47

18. The group that provides direction for the configuration of the new system in the
existing computing environment are called _______.
a. Develop the project plan
b. Fund the project
c. Define business processes
d. Lead the project team
o Answer: A

o Points: 1

o Reference: p47

19. Clients play what role in the development of the new system?
a. are widely distributed geographically
b. need prompting to respond to questions
Chapter 2

c. are not well-informed


d. do not have time for interviews
o Answer: B

o Points: 1

o Reference: p47

20. Questionnaires can be useful in information gathering when users _____.


a. true/false
b. close-ended
c. open-ended
d. multiple choice
o Answer: A

o Points: 1

o Reference: p54

21. Questions that have a simple, definitive answer are called _______ questions.
a. Building prototypes
b. Observing business processes
c. Researching vendor solutions
d. Interview stakeholders
o Answer: B

o Points: 1

o Reference: p51

22. Which of the following is normally the most time-consuming and resource-
expensive operation?
a. determine user opinions
b. determine the stakeholders
c. define system functions
d. detail user procedures
o Answer: D

o Points: 1

o Reference: p49

23. Questionnaires can be used to ask questions that _______.


a. to include as many users as possible
b. not to waste project time by including too many analysts
c. to probe to get sufficient details
d. to include the client in important decisions
o Answer: A

o Points: 1

o Reference: p54-55
Chapter 2

24. During a fact-finding interview, an important guideline is ____.


a. invite discussion and elaboration
b. limit answers to a set of choices
c. speed up the interview process
d. are easier for the users to answer
o Answer: C

o Points: 1

o Reference: p51-52

25. The strength of closed-ended questions is that they ____.


a. Questionnaires are well suited to help you learn about processes, workflows, or
techniques.
b. Stakeholders always return questionnaires that contain many open-ended questions.
c. Questionnaires have a limited and specific use in information gathering.
d. Questionnaires are the most frequently used method to gather user information.
o Answer: B

o Points: 1

o Reference: p50

26. Which of the following statements is correct about questionnaires?


a. determine the correct users
b. build a list of questions
c. establish an objective
d. determine the project team members
o Answer: C

o Points: 1

o Reference: p54-55

27. The most important step in preparing for an interview is to _______.


a. makes the users uncomfortable
b. is necessary to understand the business process
c. can wait until follow-up interviews
d. indicates that the analyst does not understand the business
o Answer: C

o Points: 1

o Reference: p51

28. Asking many detailed, probing questions during an initial interview usually
_______.
a. Follow-up
b. Review of the requirements models
c. An agenda
d. Finalize processing decisions
o Answer: B
Chapter 2

o Points: 1

o Reference: p52

29. ____ is an important part of each interview.


a. Establishing documentation guidelines
b. Building models
c. Making copies of everyone’s notes
d. Setting the time for the next meeting
o Answer: A

o Points: 1

o Reference: p51-52

30. _______ is an important part of the follow-up after an interview.


a. open-ended questions
b. preparation
c. an activity diagram
d. finding the exception conditions
o Answer: B

o Points: 1

o Reference: p51-52

31. Every successful interview requires ____.


a. noted in the analyst’s meeting notes
b. given a tentative resolution
c. brought to the attention of the appropriate manager
d. put on an open-items list
o Answer: B

o Points: 1

o Reference: p51

32. As part of the interview process, any unresolved issues should be _______.
a. may discover and desire too many unimportant “bells and whistles”
b. may not understand the vendor solution
c. may discover different methods to perform business processes
d. may want to buy one of these solutions prematurely
o Answer: D

o Points: 1

o Reference: p53

33. One of the dangers in researching vendor solutions is that users and analysts
_______.
a. Questionnaires
b. User interviews
Chapter 2

c. Observing business procedures


d. Collecting active user comments
o Answer: D

o Points: 1

o Reference: p57

34. The term “I’ll know it when I see it” refers to what method of requirements
definition.
a. synchronization bar
b. swimlane
c. decision diamond
d. activity oval
o Answer: D

o Points: 1

o Reference: p57

35. One way to show multiple, independent alternative paths within an activity
diagram is with a _______.
a. swimlanes
b. use case diagrams
c. class diagrams
d. activity diagrams
o Answer: C

o Points: 1

o Reference: p58

36. Workflows can be documented using _______.


a. synchronization bars
b. decision points
c. activity ovals
d. lines with arrowheads
o Answer: D

o Points: 1

o Reference: p57

37. Looping in an activity diagram is best represented using what?


a. assign work within an iteration
b. speed up the project
c. avoid confusing the users
d. avoid scope creep
o Answer: A

o Points: 1

o Reference: p57
Chapter 2

38. One important reason for prioritizing requirements is to _______.


o Answer: D

o Points: 1

o Reference: p41

III. Multiple Response Questions


1. The “+” in FURPS+ includes which of the following types of requirements?
(choose two)
Options:
o a. Supportability requirements

o b. Performance constraints

o c. Reliability constraints

o d. Nonfunctional requirements

o e. Design constraints

o f. User interface requirements

o Answer: A, E

o Points: 2

o Reference: p43-44

2. Which are the major business themes that guide analysts in fact-finding
activities? (choose 3)
Options:
o a. What are the business processes?

o b. Who performs the business processes?

o c. How are the business processes performed?

o d. What are the objectives of a business process? (What should it


accomplish?)
o e. What is produced by the business process?

o f. What information is needed?

o Answer: A, C, F

o Points: 2

o Reference: p50

3. What are the two primary benefits of reviewing the documentation of existing
inputs, outputs, and procedures? (choose 2)
Options:
Chapter 2

o a. Have a repository of existing documentation

o b. Obtain a preliminary understanding

o c. Encourage the users to prepare for interviews

o d. Help build models of existing procedures

o e. Ensure complete documentation of procedures

o f. Serve as visual aids in interview discussions

o Answer: B, F

o Points: 2

o Reference: p55

4. Two benefits of researching vendor solutions include _______ and ______.


(choose two)
Options:
o a. Encouraging the users to buy a vendor solution immediately

o b. Helping analysts discover state-of-the-art solutions

o c. Helping users generate new ideas for business functions

o d. Speeding up the development project

o e. Informing senior management about competitors

o f. Reducing the risk of implementing a new system

o Answer: B, C

o Points: 1

o Reference: p56-57

5. Which two of the following are activities of Core Process 3? (choose two)
Options:
o a. Gather detailed information

o b. Plan the project iterations

o c. Build an iteration schedule

o d. Define test data

o e. Develop user-interface dialogs

o f. Develop architectural structure

o Answer: A, E

o Points: 2

o Reference: p40
Chapter 2

IV. Completion Questions


1. Core Process 3 is called “Discover and understand details.” Another term that is
used to describe these activities is _______ activities.
o Answer: analysis, Analysis, systems analysis, Systems Analysis

o Points: 2

o Reference: p40

2. The U in the FURPS acronym stands for _______.


o Answer: usability, Usability, usability requirements, Usability requirements

o Points: 2

o Reference: p43

3. The R in the FURPS acronym stands for _______.


o Answer: reliability requirements, Reliability requirements, reliability,
Reliability
o Points: 2

o Reference: p43

4. The P in the FURPS acronym stands for _______.


o Answer: performance requirements, performance, Performance, Performance
requirements
o Points: 2

o Reference: p43

5. _______ requirements describe operational characteristics related to users such


as work procedures and online help.
o Answer: Usability, usability

o Points: 2

o Reference: p43

6. _______ requirements describe the dependability of a system such as service


outages and incorrect processing.
o Answer: Reliability, reliability

o Points: 2

o Reference: p43

7. _______ requirements describe operational characteristics related to measures


of workload such as throughput and response time.
o Answer: Performance, performance
Chapter 2

o Points: 2

o Reference: p43

8. _______ requirements describe how access to the software application will be


controlled and data will be protected.
o Answer: Security, security

o Points: 2

o Reference: p43

9. _______ requirements describe constraints such as programming languages,


tools, and communication protocols for distributed portions of the system.
o Answer: Implementation, implementation

o Points: 2

o Reference: p44

10. _______ requirements describe interactions between systems, e.g., the method of
communication between one system and another system.
o Answer: Interface, interface

o Points: 2

o Reference: p44

11. _______ requirements describe how a system is configured, monitored,


maintained, and updated.
o Answer: Supportability, supportability

o Points: 2

o Reference: p44

12. Use case diagrams, class diagrams, sequence diagrams are all examples of a
standard modeling method.
o Answer: UML, Unified Modeling Language, Unified modeling language

o Points: 2

o Reference: p46

13. Persons who have an interest in the successful implementation of the new system
are called _______.
o Answer: stakeholders

o Points: 2

o Reference: p46

14. Persons within an organization who have a significant interest in its operation
are _______ stakeholders.
Chapter 2

o Answer: internal

o Points: 2

o Reference: p46

15. Persons outside an organization’s control who interact with the system or who
have an interest in its operation are called _______ stakeholders.
o Answer: external

o Points: 2

o Reference: p46

16. Questions that have a simple, definitive answer are called


____________________ questions.
o Answer: closed-ended

o Points: 2

o Reference: p50

17. Questions that encourage discussion are called ____________________


questions.
o Answer: open-ended

o Points: 2

o Reference: p50

18. The most important and first step in preparing for an interview with a user is to
establish the ____________________ of the interview.
o Answer: objective

o Points: 2

o Reference: p51

19. A _______ is the sequence of processing steps that completely handles one
business transaction.
o Answer: workflow

o Points: 2

o Reference: p57

20. An _______ describes the sequential flow of user activities.


o Answer: activity diagram, workflow diagram

o Points: 2

o Reference: p57

21. One way to show concurrent paths within an activity diagram is with a _______.
Chapter 2

o Answer: synchronization bar

o Points: 2

o Reference: p57

22. In order to show all the activities of a single agent or organizational unit
together, an activity diagram contains what construct?
o Answer: swimlane, swimlane heading (any acceptable variation)

o Points: 2

o Reference: p57

V. Essay Questions
1. List the activities of Core Process 3: Discover and Understand Details
Answer:
o Gather detailed information

o Define requirements

o Prioritize requirements

o Develop user-interface dialogs

o Evaluate requirements with users

o Points: 5

o Reference: p40

2. List the elements that are referred to by the FURPS+ acronym.


Answer:
o F: Functional requirements

o U: Usability requirements

o R: Reliability requirements

o P: Performance requirements

o S: Security requirements

o +: Other constraints (including design constraints, implementation


requirements, interface requirements, physical requirements, supportability
requirements)
o Reference: p43

You might also like