Вы находитесь на странице: 1из 14

CASE Tool Powerful software used in computer-aided

Ch. 1 Introduction to Systems Analysis and Design systems engineering (CASE) to help systems analysts
develop and maintain information systems.
Adaptive Method A systems development method that
typically uses a spiral development model, which builds on a Certification A credential an individual earns by
series of iterations, to make adapting to changes easier for all demonstrating a certain level of knowledge and skill on a
stakeholders. standardized test.

Agile Method Systems development method that attempts to Class A term used in object-oriented modeling to indicate a
develop a system incrementally, by building a series of collection of similar objects.
prototypes and constantly adjusting them to user
requirements. Related to adaptive method. Computer-Aided Software Engineering (CASE) A
technique that uses powerful programs called CASE tools to
App A software application that runs on a mobile device, such provide an overall framework for systems development. The
as a smartphone or tablet. tools support a wide variety of design methodologies,
including structured analysis and object-oriented analysis.
Also referred to as computer-aided systems engineering.
Application Software Software programs, such as email,
word processors, spreadsheets, and graphics packages,
used by employees in typical office scenarios. Corporate Culture A set of beliefs, rules, traditions, values,
and attitudes that define a company and influence its way of
doing business.
B2B (business to business) A commercial exchange (e.g.,
products or services) between businesses, typically enabled
by the Internet or electronic means. Critical Thinking Skill The ability to compare, classify,
evaluate, recognize patterns, analyze cause and effect, and
apply logic. Such skills are valued in the IT industry.
B2C (business to consumer) A commercial exchange (e.g.,
products or services) between businesses and consumers
conducted over the Internet. Data The raw material or basic facts used by information
systems.
Bring your own device (BYOD) An equipment management
model where employees are in charge of their devices (e.g., Data Flow Diagram (DFD) Graphical representation of the
computers, tablets, smartphones) at work, not the IT system, showing it stores, processes, and transforms data
department. This includes device selection and setup, into useful information.
program installation and updating, and network connectivity
(including security). Deliverable A polished, final product, suitable for its intended
use. End products or deliverables often coincide with the
Business Model A graphical representation of business completion of each SDLC phase.
functions that consist of business processes, such as sales,
accounting, and purchasing. E-Commerce (electronic commerce) Transactions (e.g.,
buying and selling of goods and information) that occur on the
Business Process A description of specific events, tasks, Internet. Includes both business-to-consumer and business-
and desired results. to-business.

Business Process Model (BPM) A graphical representation Electronic Data Interchange (EDI) A process that involves
of one or more business processes. the computer-to-computer transfer of data between
companies.
Business Process Modeling Notation (BPMN) A standard
set of shapes and symbols used to represent events, Empowerment A business practice that places more
processes, and workflows in computer-based modeling tools. responsibility and accountability throughout all levels of an
organization.
Business Profile A definition of a company's overall
functions, processes, organization, products, services, Enterprise Application Company-wide applications, such as
customers, suppliers, competitors, constraints, and future order processing systems, payroll systems, and company
direction. communications networks.

Business Rules How a system handles data and produces Enterprise Computing Information systems that support
useful information. Business rules, also called business logic, company-wide data management requirements, such as
reflect the operational requirements of the business. airline reservations or credit card billing systems.
Examples include adding the proper amount of sales tax to
invoices, calculating customer balances and finance charges, Enterprise Resource Planning (ERP) A process that
and determining whether a customer is eligible for a volume- establishes an enterprise-wide strategy for IT resources. ERP
based discount. defines a specific architecture, including standards for data,
processing, network, and user interface design.
Business Support System Provide job-related information
support to users at all levels of a company. Feasibility Study An initial investigation to clearly identify the
nature and scope of the business opportunity or problem. Also
called a preliminary investigation.
Groupware Programs that run on a network that enable users Object In object-oriented analysis or programming, an object
to share data, collaborate on projects, and work in teams. Also represents a real person, place, event, or transaction.
called workgroup software.
Object-Oriented (O-O) analysis The act of understanding an
Hardware The physical layer of the information system, to information system by identifying things called objects. An
include computers, networks, communications equipment, object represents a real person, place, event, or transaction.
and other technology-based infrastructure. Object-oriented analysis is a popular approach that sees a
system from the viewpoint of the objects themselves as they
Help Desk A centralized resource staffed by IT professionals function and interact with the system.
that provides users with the support they need to do their jobs.
A help desk has three main objectives: to show people how to Process Procedure or task that users, managers, and IT staff
use system resources more effectively, to provide answers to members perform. Also, the logical rules of a system that are
technical or operational questions, and to make users more applied to transform data into meaningful information. In data
productive by teaching them how to meet their own flow diagrams, a process receives input data and produces
information needs. output that has a different content, form, or both.

Horizontal System A basic system, such as an inventory or Product-Oriented Companies that manufacture computers,
payroll package that is commonly used by a variety of routers, or microchips.
companies.
Properties In object-oriented (O-O) analysis, characteristics
Inference Rule Instruction that directs a knowledge that objects inherit from their class or possess on their own.
management system to identify data patterns and
relationships. Prototype An early, rapidly constructed working version of the
proposed information system.
Information Data that has been changed into a useful form of
output. Radio Frequency Identification (RFID) Technology that
uses high-frequency radio waves to track physical objects.
Information System A combination of information
technology, people, and data to support business Rapid Application Development (RAD) A team-based
requirements. The five key components are hardware, technique that speeds up information systems development
software, data, processes, and people. and produces a functioning information system. RAD is similar
in concept to joint application development (JAD), but goes
Information Technology (IT) A combination of hardware, further by including all phases of the System Development
software, and telecommunications systems that support Life Cycle (SDLC).
business operations, improve productivity, and help
managers make decisions. Requirements Modeling Used in the systems planning
phase of the SDLC. It involves using various fact-finding
Iterative An adaptive method typically uses a spiral techniques, such as interviews, surveys, observation, and
development model, which builds on a series of iterations. sampling, to describe the current system and identify the
requirements for the new system.
Joint application Development (JAD) A popular systems
development technique that uses a group of users, managers Scalable The ability of a system to expand to meet new
and IT professionals that work together to gather information, business requirements and volumes.
discuss business needs, and define the new system
requirements. Server Farm A large concentration of networked computers
working together.
Knowledge Base A large database used in knowledge
management systems that allows users to find information by Service-Oriented A company that primarily offers information
typing keywords or questions in English phrases. or services, or sells goods produced by others.

Legacy System An older system that is typically less Software A program run by computers for a specific function
technologically advanced than currently available systems. or task.

Management Information Systems (MIS) A computer- Spiral Model A development model with a series of iterations,
based information system used in business planning, control, or revisions, based on user feedback
decision making, and problem solving.
Stakeholder Anyone who is affected by the company's
Mission-Critical System An information system that is vital performance, such as customers, employees, suppliers,
to a company's operations. stockholders, and members of the community.

Modeling A process that produces a graphical representation Strategic Plan The long-range plan that defines the corporate
of a concept or process that systems developers can analyze, mission and goals. Typically defined by top management, with
test, and modify. input from all levels.

Moore's Law A prediction that computing power would double Structured Analysis A traditional systems development
every 18 to 24 months due to increased miniaturization of technique that uses phases to plan, analyze, design,
electronic components.
implement, and support an information system. Processes system or business process. It might propose enhancements
and data are treated as separate components. for an existing system, the correction of problems, or the
development of an entirely new system.
Supply Chain All the companies who provide materials,
services, and functions needed to provide a product to a Systems Support and Security Phase During the systems
customer. support and security phase of the SDLC, the IT staff
maintains, enhances, and protects the system.
System A set of related components that produces specific
results. Technical Support Technical support is necessary to support
the wide variety of IT systems and users. It includes six main
System Design Specification A document that presents the functions: application development, systems support, user
complete design for the new information system, along with support, database administration, network administration, and
detailed costs, staffing, and scheduling for completing the next web support. These functions overlap considerably and often
SDLC phase, systems implementation. Also called the have different names in different companies.
technical design specification or the detailed design
specification. Transaction Processing (TP) System Operational system
used to process day-to-day recurring business transactions,
System Requirements Document A document that contains such as customer billing.
the requirements for the new system, describes the
alternatives that were considered, and makes a specific User Productivity System Application that provides
recommendation to management. It is the end product of the employees of all levels a wide array of tools to improve job
systems analysis phase. performance. Examples include email, word processing,
graphics, and company intranets.
System Software Programs that control the computer,
including the operating system, device drivers that User Stakeholder inside or outside the company who will
communicate with hardware, and low-level utilities. interact with the system.

Systems Analysis and Design The process of developing Vertical System A system designed to meet the unique
information systems that effectively use hardware, software, requirements of a specific business or industry, such as a
data, processes, and people to support the company's web-based retailer or auto-supply store.
business objectives.
Waterfall Model The traditional model of software
Systems Analysis Phase The second SDLC phase. The development. A graph that depicts the result of each SDLC
purpose of this phase is to build a logical model of the new phase flowing down into the next phase.
system.

Systems Analyst A person who plans, analyzes, and


implements information systems. He or she may work
internally within a company's IT department, or be hired by a
company as an independent consultant.
Chapter 2: Analyzing the Business Case
Systems Design Phase The third SDLC phase. The purpose
of systems design is to create a blueprint for the new system Customer Relationship Management System What type of
that will satisfy all documented requirements, whether the system can be used to provide automated responses to sales
system is being developed in-house or purchased as a inquiries, online order processing, and inventory tracking?
package.
Scatter Diagram What is another name for an XY chart,
Systems Development Life Cycle (SDLC) Activities and which is a tool used to identify a correlation between two
functions that systems developers typically perform, variables?
regardless of how those activities and functions fit into a
particular methodology. The SDLC model includes five Strategic Plan Which of the following sets the overall
phases: 1. Systems planning, 2. Systems analysis, 3. direction for a firm and has an important impact on IT projects?
Systems design, 4. Systems implementation, and 5. Systems
support and security. Low Employee moral affecting performance Which of the
following is an example of an intangible cost? low employee
Systems Implementation Phase The fourth phase of SDLC. moral affecting performance, licenses and fees, formal and
During this phase the new system is constructed, programs informal training, consulting expenses
are written, tested, and documented, and the system is
installed. Systems Review Committee Many organizations assign
responsibility for evaluating systems requests to a group of
Systems Planning Phase The first phase of the SDLC. key managers and users. What do many companies call this
During this phase the systems project gets started. The group?
project proposal is evaluated to determine its feasibility. The
project management plan is formulated, with the help of CASE ScheduleA feasibility study uses four main factors to measure
tools where appropriate. a proposal. Three of the factors are operational, technical, and
economic. What is the fourth factor that a feasibility study uses
Systems Request A formal request to the IT department that to measure a proposal?
describes problems or desired changes in an information
Business Case What term refers to the reasons, or customer-related events and transactions including
justification, for a proposal? marketing, sales, and customer service activities.

Fishbone Diagram An analysis tool that represents the discretionary projects Projects where management has a
possible causes of a problem as a graphical outline is referred choice in implementing them.
to as which of the following? economic feasibility This is achieved if the projected
benefits of the proposed system outweigh the estimated costs
Encoding Which of the following terms best describe the involved in acquiring, installing, and operating it.
process of coding data to keep it safe from unauthorized
users? Authorization, Authentication, Encoding, Radio electronic product code (EPC) Technology that uses RFID
Frequency Identification tags to identify and monitor the movement of each individual
product, from the factory floor to the retail checkout counter.
Select a Planning Tool What is the first step in strategic
electronic proof of delivery (EPOD) when a supplier uses
planning for IT Projects?
RFID tags on each crate, case, or shipping unit to create a
digital shipping list.
GovernmentExternal factors that affect business decisions
include technology, suppliers, customers, competitors, the Encryption A process where data is coded (converted into
economy, and which of the following? unreadable characters) so that only those with the required
authorization can access the data (usually via decoding
ThreatsThe letters "S", "W", and "O" in the acronym SWOT software).
stand for strengths, weaknesses, and opportunities. What
does the letter "T" stand for?
fishbone diagram It is an analysis tool that represents the
Electronic Product Code What is the name of the technology possible causes of a problem as a graphical outline. Also
that uses RFID tags to identify and monitor the movement of called an Ishikawa diagram.
each individual product?
intangible benefits benefits that are difficult to measure in
Will the new system result in a workforce reduction? dollars.

intangible costs costs that are difficult to measure in dollar


Which of the following questions would help predict a system's terms, such as employee dissatisfaction.
operational feasibility?
Ishikawa diagram An analysis tool that represents the
-Will a prototype be required? possible causes of a problem as a graphical outline. Also
called a fishbone diagram.
-Does the company have the necessary hardware, software,
just-in-time (JIT) The exchange or delivery of information
and network resources?
when and where it is needed.

-Does the company have the needed technical expertise? mission statement A document or statement that describes
the company for its stakeholders and briefly states the
-Will the new system result in a workforce reduction? company's overall purpose, products, services, and values.

nondiscretionary projects projects where no choice exists.


Strategic Planning The process of identifying long-term
organizational goals, strategies, and resources is known as operational feasibility When a system will be used
which of the following? effectively after it has been developed.

Pareto chart Named for a 19th century economist, this chart


biometric devices Devices that identify a person by a retina is drawn as a vertical bar graph which represents various
scan or by mapping a facial pattern. causes of a problem, arranged in descending order.

business case Refers to the reasons, or justification, for a preliminary investigation An initial investigation to clearly
proposal. identify the nature and scope of the business opportunity or
problem. Also called a feasibility study.
case for action A part of the preliminary investigation report
to management that summarizes project requests and makes project creep The process by which projects with very
specific recommendations. general scope definitions expand gradually, without specific
authorization.
computer resources committee A group of key managers
and users responsible for evaluating systems requests. The project scope A specific determination of a project's
term "systems review committee" is also used. boundaries or extent.

Constraint A condition that the system must satisfy or an schedule feasibility this means that a project can be
outcome that the system must achieve. implemented in an acceptable time frame.

critical success factors Vital objectives that must be strategic planning The process of identifying long-term
achieved for the enterprise to fulfill its mission. organizational goals, strategies, and resources.

customer relationship management (CRM) Many SWOT analysis It examines a company's strengths,
companies implement CRM systems that integrate all weaknesses, opportunities, and threats.
systems request A formal request to the IT department that graphically as nodes. CPM and Program Evaluation Review
describes problems or desired changes in an information Technique (PERT), are essentially identical.
system or business process.
dependent task
systems review committee A group of key managers and
users responsible for evaluating systems requests. The term A task is said to be dependent when it has to be completed in
computer resources committee is also used. a serial sequence.

tangible benefits benefits that can be measured in dollars. design review

tangible costs costs that have a specific dollar value. A design review, or structured walkthrough, is a review of a
project team member's work by other members of the team.
technical feasibility if the organization has the resources to Structured walkthroughs should take place throughout the
develop or purchase, install, and operate the system. SDLC and are called requirements, design, code, or testing,
depending on their phase.
total cost of ownership (TCO) A number used in assessing
costs, which include ongoing support and maintenance costs, duration
as well as acquisition costs.
The amount of time it will take to complete a task.
XY chart Also called a scatter diagram, a tool used by
systems analysts to graphically show the correlation between event
two variables.
An event, or milestone, is a reference point that marks a major
occurrence. Events are used to monitor progress and manage
a project.
Chapter 3: Managing System Projects
finish day/date
Activity
The time that task is scheduled to be finished.
An activity, or task, is any work that has a beginning and an
end, and requires the use of company resources including Gantt chart
people, time, and/or money. Examples include conducting a
series of interviews, designing a report, selecting software, A horizontal bar chart that illustrates a schedule. Gantt charts
waiting for the delivery of equipment, and training users. were developed many years ago by Henry L. Gantt as a
production control technique and still are in common use.
best-case estimate
gateway
The most optimistic outcome is called the best-case estimate.
(1) In business processing modeling notation, a fork in the
bottom-up technique process, allowing the flow to go one way or another. (2) A
router or other network device used to connect to a larger,
A bottom-up technique analyzes a large, complex project as dissimilar type of network, such as the Internet.
a series of individual tasks, called project tasks.
Microsoft Project
Brooks' Law
A powerful, full-featured program that holds the dominant
This interesting concept was stated by Frederick Brooks, Jr. share of the project management software market.
an IBM engineer, who observed that adding manpower to a
late software project only makes it later. milestone

code review A milestone, or event, is a reference point that marks a major


occurrence. Milestones are used to monitor progress and
A code review, or structured walk through, is a review of a manage a project.
project team member's work by other members of the team to
spot logic errors, as a form of peer review. network diagram

concurrent task A PERT chart also is referred to as a network diagram.

If tasks can be completed at the same time they are said to be open source
concurrent, or parallel.
Software that is supported by a large group of users and
critical path developers.

A series of events and activities with no slack time. If any person-day


activity along the critical path falls behind schedule, the entire
project schedule is similarly delayed. As the name implies, a The amount of work that one person can complete in one day.
critical path includes all activities that are vital to the project
schedule. PERT/CPM

Critical Path Method (CPM) The Program Evaluation Review Technique (PERT) was
developed by the U.S. Navy to manage very complex projects.
The Critical Path Method (CPM) was developed by private At approximately the same time, the Critical Path Method
industry, and shows a project as a network diagram. The (CPM) was developed by private industry to meet similar
activities are shown as vectors, and the events are displayed project management needs.
predecessor task Evaluating risk in terms of the actual impact in terms of dollars,
time, project scope, or quality.
Often, two or more concurrent tasks depend on a single prior
task, which is called a predecessor task. risk

probable-case estimate An event that could affect the project negatively.

The most likely outcome is called a probable case estimate. risk identification

Program Evaluation Review Technique (PERT) Listing each risk and assessing the likelihood that it could
affect a project.
The Program Evaluation Review Technique (PERT) was
developed by the U.S. Navy to manage very complex projects, risk management
such as the construction of nuclear submarines. At
approximately the same time, the Critical Path Method (CPM) The process of identifying, evaluating, tracking, and
was developed by private industry to meet similar project controlling risks to minimize their impact.
management needs.
risk management plan
project coordinator
Includes a review of the project's scope, stakeholders, budget,
The project coordinator handles administrative responsibilities schedule, and any other internal or external factors that might
for the development team and negotiates with users who affect the project. The plan should define project roles and
might have conflicting requirements or want changes that responsibilities, risk management methods and procedures,
would require additional time or expense. categories of risks, and contingency plans.

project creep risk response plan

The process by which projects with very general scope A proactive effort to anticipate a risk and describe an action
definitions expand gradually, without specific authorization. plan to deal with it. An effective risk response plan can reduce
the overall impact by triggering a timely and appropriate
project manager action.

The person charged with managing a project from an slack time


administrative perspective.
The slack time for an event is the amount of time by which an
project management event can be late without delaying the project. The slack time
for an event is the difference between its latest completion
The process of planning, scheduling, monitoring, controlling, time (LCT) and earliest completion time (ECT).
and reporting upon the development of an information system.
start day/date
project monitoring
The time that a task is scheduled to begin.
Project monitoring requires guiding, supervising, and
coordinating the project team's workload. structured walk-through

project planning A review of a project team member's work by other members


of the team. Structured walk throughs should take place
Project planning includes identifying project tasks and throughout the SDLC and are called requirements, design,
estimating completion time and costs. code, or testing reviews, depending on the phase they occur.
project reporting successor task

Project reporting tasks include regular progress reports to Each of the concurrent tasks of a predecessor task is called a
management, users, and the project team itself. successor task.
project scheduling task

Project scheduling involves the creation of a specific timetable A task, or activity, is any work that has a beginning and an
to facilitate completion of a project. Scheduling also involves end, and requires the use of company resources including
selecting and staffing the project team and assigning specific people, time, and/or money. Examples include conducting a
tasks to team members. series of interviews, designing a report, selecting software,
waiting for the delivery of equipment, and training users.
project triangle
task box
The three major components of a project: cost, scope, and
time. A project manager tries to find the optimal balance In project management, a task box is a component of a
among these factors. PERT/CPM chart that contains important scheduling and
duration information about a task. Each task in a project is
qualitative risk analysis represented by its own task box in the PERT/CPM chart.
Evaluating risk by estimating the probability that it will occur task group
and the degree of impact.
In task groups, each task represents several activities.
quantitative risk analysis
task ID
A number or code that uniquely identifies a task. Use case diagrams

task name
Interaction between users and the systems
A brief descriptive name for a task, which does not have to be
unique in the project. For example, a task named Conduct Sequence diagrams
Interviews might appear in several phases of the project.
Shows the timing of interactions between objects as they
task pattern occur
A logical sequence of tasks in a work breakdown structure.
Task patterns can involve sequential tasks, multiple Context diagram
successor tasks, and multiple predecessor tasks.
A top-level view of an information system that shows the
testing review boundaries and scope
A testing review, or structured walkthrough, is a review of a
project team member's work by other members of the team,
as a form of peer review. This should take place throughout
the SDLC and are called requirements, design, code, or Physical model
testing reviews, depending on the phase they occur.
Describes how a system will be constructed
weight

Weight is an important value that managers add to estimates Logical model


so they can be analyzed.
Shows what a system must do
work breakdown structure (WBS)

Breaking a project down into a series of smaller tasks. agile methods

worst-case estimate Trend that stresses intense interaction between system


developers and users
The most pessimistic outcome is called the worst-case
estimate.
brainstorming

Small group discussion of a specific problem, opportunity, or


issue

business process model (BPM)


Chapter 4: Requirements Modeling
Describes one or more business process
Requirements modeling
construction phase
Fact-finding to describe the current system and identification
of the requirements for the new system
Focuses on program and application development tasks
similar to the SDLC
Systems requirements list
cutover phase
Outputs, inputs, processes, performance, and security
Includes data conversion, testing, changeover to the new
JAD system, and training

Brings users into the design process data flow diagram (DFD)

RAD Shows how a system stores, processes, and transforms data

Uses a condensed version of the SDLC with users involved document review
every step of the way
Can help in understanding how the current system is
Requirements gathering supposed to work

Interviews, JAD, questionnaires, document analysis, and engaged listening


observation
Process of listening carefully and observing nonverbal
Data flow diagrams communication

Show how the system stores, processes, and transforms data


functional decomposition diagram (FDD) Rapid Economic Justification
Microsoft developed method for measuring total costs and
Top-down representation of a function or process benefits

requirements model
Hawthorne Effect End product of joint application development

Productivity improves when workers know they're being requirements planning phase
observed Combines elements of the systems planning and systems
analysis phases
histogram
research
Fact-finding technique that can include the Internet and IT
Common tool for showing the distribution of questionnaire or
magazines
sampling results
sampling
informal structure Process of collecting examples of actual documents
Based on interpersonal relationships and can develop from
physical proximity scalability
System's ability to handle future increases in business volume
inputs and transactions
Necessary data that enters the system
scrum
interview Agile approach whose name comes from a rugby term
Planned meeting during which information is obtained from
another person security
Safeguards and protects the system and its data from threats
JAD project leader
Develops an agenda, acts as a facilitator, and leads the JAD sequence diagram
session Shows the timing of interactions between objects as they
occur
joint application development
User-oriented technique for fact-finding and requirements site visit
modeling Visit to a physical location

leading questions structured brainstorming


Suggest or favor a particular reply Small group discussion in which each participant speaks
when it is his turn
model
Helps users, managers, and IT professionals understand a system requirement
system's design Serves as a benchmark to measure the overall acceptability
of a new system
outputs
Electronic or printed information produced by a system system requirements document
Deliverable, or end product, of the systems analysis phase
performance
System characteristics such as speed and capacity unified modeling language (UML)
Widely used method of visualizing and documenting software
personal information manager systems design
Includes a personal calendar and powerful contact
management features unstructured brainstorming
Small group discussion in which anyone can speak at any
personal observation time
Can be used to determine whether procedures operate as
they are described use case diagram
Visually represents the interaction between users and the
processes information system
Logical rules that are applied to transform data into
information user design phase
Allows users to understand, modify, and approve a working
productivity software model of a system
Includes word processing, spreadsheet, and collaboration
software programs Zachman Framework
Asks traditional fact-finding questions in a systems
questionnaire development context
Can be used to obtain information about a wide range of topics
a. True
rapid application development Outputs, inputs, processes, performance, and controls are the
User-oriented method resembling a condensed version of five general categories of system requirements.
entire SDLC a. True
b. False
a. Processes c. security
________ refer to logical rules that are applied to transform d. formal
data into meaningful information.
a. Processes c. 50
b. Outputs It is important for the interviewer to record facts and evaluate
c. Inputs information following an interview because studies have
d. Phases shown that ________ percent of a conversation is forgotten
within 30 minutes.
c. system requirements document a. 75
A(n) ________ is the end product of the systems analysis b. 25
phase. c. 50
a. stratified sample d. 33
b. sequence diagram
c. system requirements document a. fill-in
d. histogram A(n) ________ form, which is an alternative to a traditional
paper-based survey, can be used to collect data on the
a. True Internet or a company intranet.
The Unified Modeling Language uses object-oriented design a. fill-in
concepts and provides various graphical tools, such as use b. closed-ended
case diagrams and sequence diagrams. c. open-ended
a. True d. data flow
b. False
b. site visit
d. nontechnical When performing research regarding a vendor's software, it
Modeling involves graphical methods and ________ could be beneficial to make a(n) ________ to observe the
language that represent the system at various stages of system in use at another location.
development. a. histogram
a. closed-ended b. site visit
b. technical c. scrum
c. open-ended d. data flow diagram
d. nontechnical
b. Microsoft Visio
a. Rapid application development A popular graphics modeling tool that can be used to create
________ provide(s) a fast-track approach to a full spectrum many types of charts and diagrams is ________ .
of systems development tasks, including planning, design, a. Microsoft Access
construction, and implementation. b. Microsoft Visio
a. Rapid application development c. Evernote
b. Agile methods d. Novell's GroupWise
c. Joint application development
d. Rapid Economic Justification a. True
The objective of the systems analysis phase is to understand
c. project owner the proposed project, ensure that it will support business
In a typical JAD session, the ________ explains the reason requirements, and build a solid foundation for system
for the project and expresses top management authorization development.
and support. a. True
a. project leader b. False
b. recorder
c. project owner b. False
d. systems analyst IT professionals handle almost every aspect of systems
development with little to no user participation.
d. actor a. True
A user assumes the role of a(n) ________ in a use case b. False
diagram.
a. project sponsor a. True
b. project leader A potential disadvantage of rapid application development is
c. recorder its lack of emphasis on a company's strategic business needs.
d. actor a. True
b. False
a. scalability
Information about projected future volume for all outputs, a. True
inputs, and processes is required in order to evaluate The Unified Modeling Language uses object-oriented design
________ . concepts and provides various graphical tools, such as use
a. scalability case diagrams and sequence diagrams.
b. agile methods a. True
c. sampling b. False
d. range-of-response questions
a. True
b. informal Outputs, inputs, processes, performance, and controls are the
In a(n) ________ structure, some people have more influence five general categories of system requirements.
or knowledge than appears on an organization chart. a. True
a. observational b. False
b. informal
b. False Presentation graphics
Microsoft has developed a method for measuring scalability _______ software, such as Microsoft PowerPoint, can be
called Rapid Economic Justification (REJ). used to create organization charts, which are helpful during a
a. True preliminary investigation.
b. False
Structured analysis
b. False _______ is a popular, traditional technique that describes a
In an interview, closed-ended questions encourage system in terms of data and the processes that act on the
spontaneous and unstructured responses. data.
a. True
b. False business process modeling notation (BPMN)
A standard language used during requirements modeling that
b. False includes various shapes and symbols to represent events,
The Hawthorne Effect is a model that asks traditional fact- processes, and workflows.
finding questions in a systems development context.
a. True pool
b. False The overall diagram of the BPMN is called a _______.

a. True swim lanes


People working in teams can use collaboration software, such Designated customer areas in the BPMN are called _______.
as Google Docs and Microsoft Web Apps, to access data and
share files. a. waterfall
a. True The ________ model shows sequential SDLC phases, but it
b. False is common for several phases to interact during the
development process.
a. True a. waterfall
Microsoft Outlook and Novell's GroupWise are examples of b. unified
popular personal information managers, which include a c. business process
personal calendar, a to-do list, and contact management d. requirements
features.
a. True d. Requirements
b. False ________ modeling involves fact-finding to describe the
current system as well as identification of the requirements for
requirements the new system.
Consideration of development strategies, object modeling, a. Waterfall
data and process modeling, and _______ modeling are the b. Unified
four main activities of the systems analysis phase. c. Business process
d. Requirements
construction
Requirements planning, user design, _______ , and cutover b. Processes
are the four phases of the rapid application development ________ refer to logical rules that are applied to transform
model. data into meaningful information.
a. Phases
process modeling notation b. Processes
Analysts often create models that use a standard language c. Inputs
called business _______ during requirements modeling. d. Outputs

control c. system requirements document


An example of a(n) _______ requirement is when a system A(n) ________ is the end product of the systems analysis
must maintain separate levels of security for users and the phase.
system administrator. a. histogram
b. stratified sample
Visible Analyst c. system requirements document
The _______ CASE tool includes a Zachman Framework d. sequence diagram
interface that allows users to view a systems project from
different perspectives and levels of detail. c. JAD
Systems developers use ________ , a team-based approach,
OneNote whenever group input and interaction are desired.
Microsoft _______ is powerful information management a. BPMN
software that allows an interviewer to record a meeting, store b. RAD
the results, and create a searchable file for easy access. c. JAD
d. UML
observation
Personal _______ is a fact-finding technique used by systems d. JAD project leader
analysts to verify statements made in interviews and A(n) ________ is typically responsible for developing an
determine if procedures operate as they are described. agenda, acting as a facilitator, and leading the JAD session.
a. user
survey b. recorder
A questionnaire, which can be used to obtain information c. manager
about a wide range of topics, can also be referred to as a(n) d. JAD project leader
_______.
b. recorder
The ________ documents the results of JAD sessions and b. adaptive
works with systems analysts to build system models and c. functional
develop CASE tool documentation. d. constructive
a. user
b. recorder a. functional decomposition
c. manager Using a(n) ________ diagram, an analyst can show business
d. JAD project leader functions and break them down into lower-level functions and
processes.
a. project leader a. functional decomposition
During a typical JAD session, the ________ prepares a report b. use case
that will be sent to JAD team members. c. sequence
a. project leader d. data flow
b. user
c. group leader a. BPMN
d. top management ________ includes various shapes and symbols to represent
events, processes, and workflows.
c. RAD a. BPMN
Systems developers use ________ , a team-based technique, b. RAD
to speed up information systems development and produce a c. JAD
functioning information system. d. BPM
a. BPMN
b. JAD d. Unified Modeling Language
c. RAD A systems analyst can utilize the ________ to represent an
d. UML information system from a user's viewpoint.
a. Zachman Framework
d. cutover b. Hawthorne Effect
The four phases of the RAD model are requirements planning, c. Scrum
user design, construction, and ________ . d. Unified Modeling Language
a. document
b. productivity b. use case
c. sampling A systems analyst can draw ________ diagrams that visually
d. cutover represent the interaction between users and information
systems.
c. user design a. functional decomposition
During the ________ phase of the RAD model, prototypes b. use case
and models that represent all systems processes, outputs, c. sequence
and inputs are developed. d. data flow
a. construction
b. requirements planning c. sequence
c. user design A(n) ________ diagram shows the timing of interactions
d. sampling between objects as they occur.
a. functional decomposition
d. development b. use case
Cutting ________ time and expense by involving users in c. sequence
every phase of systems development is the main objective of d. data flow
RAD.
a. scalability c. System
b. sampling ________ requirements serve as benchmarks to measure the
c. processing overall acceptability of a finished system.
d. development a. Output
b. Performance
a. strategic business c. System
A disadvantage of RAD is that it stresses the mechanics of a d. Security
system without emphasizing the company's ________ needs.
a. strategic business c. output
b. scalability Requiring a Web site to report online volume statistics every
c. documentation four hours is an example of a(n) ________ requirement.
d. security a. control
b. input
c. Scrum c. output
________ , an agile approach whose name comes from a d. performance
rugby term, has sessions in which team members play roles.
a. Unified modeling a. process
b. Swim lanes Requiring a prescription system to automatically generate
c. Scrum insurance claim forms is an example of a(n) ________
d. Pool requirement.
a. process
b. adaptive b. input
Agile, or ________ , methods are very flexible and efficient in c. output
dealing with change and reflect a set of community-based d. performance
values.
a. stratified b. control
Requiring a system to provide logon security at the operating b. 2.5
system level and at the application level is an example of a(n) c. 1.5
________ requirement. d. 2
a. process
b. control c. interviewee's office
c. output Some analysts believe that the best location for conducting
d. performance interviews is a(n) ________ because it can make the
interviewee feel comfortable during the meeting.
d. Scalability a. offsite location
________ determines how a system will handle future growth b. interviewer's office
and demands. c. interviewee's office
a. Sampling d. neutral location
b. Observation
c. Brainstorming d. neutral location
d. Scalability Some analysts believe that the best location for conducting
interviews is a(n) ________ because interruptions will be kept
a. indirect to a minimum.
One problem with calculating TCO is that cost estimates tend a. interviewer's meeting room
to understate ________ costs such as user support and b. interviewer's office
downtime productivity losses. c. interviewee's office
a. indirect d. neutral location
b. use case
c. security a. OneNote
d. direct Powerful information management software, such as
Microsoft ________ , can be used to record a meeting, store
d. REJ the results, and create a searchable file for easy access.
________ , which was developed by Microsoft, is a method a. OneNote
for measuring total costs and benefits. b. Outlook
a. FDD c. Visio
b. BPM d. Access
c. UML
d. REJ c. document review
As part of a(n) ________ , copies of actual forms and
b. Zachman Framework operating documents currently in use should be obtained.
The Visible Analyst CASE tool includes a(n) ________ a. observation
interface that allows users to view a systems project from b. random sample
different perspectives and levels of detail. c. document review
a. Evernote d. site visit
b. Zachman Framework
c. Rapid Economic Justification b. Hawthorne study
d. Unified Modeling Language The purpose of the ________ was to determine how various
changes in the work environment would affect employee
b. Group productivity.
________ interviews can save time and provide an a. systematic sample
opportunity to observe interaction among the participants. b. Hawthorne study
a. Brainstorming c. Zachman Framework
b. Group d. Scrum
c. Face-to-face
d. Range-of-response a. survey
A(n) ________ is a document containing a number of
c. Open-ended standard questions that can be sent to many individuals.
________ questions are useful when attempting to a. survey
understand a larger process or draw out an interviewee's b. use case diagram
opinions, attitudes, or suggestions. c. systems requirements document
a. Leading d. sequence diagram
b. Scalability
c. Open-ended b. fill-in
d. Range-of-response Microsoft Word can be used to create convenient ________
forms that include data fields, text boxes, and drop-down lists.
d. Range-of-response a. stratified
________ questions ask a person to evaluate something by b. fill-in
providing limited answers to specific responses or on a c. sequence
numeric scale. d. observation
a. Leading
b. Scalability d. sample
c. Open-ended The main objective of a(n) ________ is to ensure that it
d. Range-of-response represents the overall population accurately.
a. range-of-response question
a. 1 b. requirements model
It is recommended that interviews be limited to no more than c. observation
________ hour(s). d. sample
a. 1
c. Research b. project data management
________ is a fact-finding technique that can include the c. graphics modeling
Internet, IT magazines, and books to obtain background d. productivity
information, technical material, and news about industry
trends and developments. b. Object
a. Observation ________ modeling is a methodology that combines data and
b. Sampling processes into entities that represent actual people, things,
c. Research transactions, and events.
d. Unstructured brainstorming a. Unified
b. Object
d. site visit c. Structured analysis
The objective of a(n) ________ is to observe a system in use d. Requirements
at another location.
a. stratified sample
b. systematic sample CHAPTER 5: DATA AND PROCESS MODELING
c. actor
d. site visit alias
Any name(s) other than the standard data element name
c. Structured brainstorming
________ is a small group discussion of a specific problem, attributes
opportunity, or issue, in which each participant either speaks Standard DFD names that enter or leave a data store
when it is his or her turn or passes.
a. closed-ended brainstorming balancing
b. Unstructured brainstorming Maintains consistency among a set of DFDs
c. Structured brainstorming
d. open-ended brainstorming black box
A process symbol in a data flow diagram
b. Unstructured brainstorming
________ is a small group discussion of a specific problem, black hole
opportunity, or issue, in which each participant can speak at Process that has input, but produces no output data flow
any time.
a. closed-ended brainstorming business logic
b. Unstructured brainstorming Transforms data and produces required results
c. Structured brainstorming
d. open-ended brainstorming child diagram
The lower-level diagram on a DFD that has been exploded
a. documenting
Recording findings in such a way that they can be understood context diagram
by someone else is a principle of ________ your work. Top-level view of an information system that shows its
a. documenting boundaries and scope
b. interviewing
c. sampling data dictionary
d. observing A central storehouse of documentation for an information
system
d. productivity
Microsoft Office is the best-known suite of ________ software. data element
a. personal data management Smallest piece of data that has meaning within an information
b. project data management system
c. graphics modeling
d. productivity data flow
Path for data to move from one part of an information system
d. collaboration to another
Google Docs is an example of Web-based ________
software. data flow diagram
a. personal data management Uses symbols to show how a system transforms input data
b. project data management into useful information
c. graphics modeling
d. collaboration data flow label
The data flow name as it appears on the DFDs
c. graphic modeling
Microsoft Visio is a popular ________ tool that includes a data repository
library of templates, stencils, and shapes. Storehouse of information that is also called a data dictionary
a. personal data management
b. project data management decision table
c. graphic modeling Logical structure that shows every combination of conditions
d. collaboration and outcomes

a. information management decision tree


Microsoft Outlook is a type of ________ program that includes Graphical representation of a decision table's conditions,
a personal calendar and a to-do list with priorities and the actions, and rules
capability to check off completed tasks.
a. information management default value
Value for a data element if a value otherwise is not entered for
it selection
Completion of one of two or more process steps based on
destination results of a test
The DFD ending point for a data flow
sequence
diverging data flow Logical structure that completes steps one after another
Data flow in which the same data travels to two or more
different locations sink
Data flow diagram entity that receives data from a system
domain
The set of values permitted for a data element source
Data flow diagram entity that supplies data to a system
entity
Represented as a rectangle in a data flow diagram spontaneous generation
Process that produces output, but has no input data flow
entity name
Singular form of a department, outside organization, other structured English
system, or person Describes logical processes clearly and accurately

field terminators
Data that is also referred to as a data element or data item Data origins and final destinations on a data flow diagram

functional primitive Yourdon


Process consisting of a single function that isn't exploded A popular data flow diagram symbol set
further

gray hole
Process that has input and output, but the input is unable to
produce the output

iteration
Completion of a process step that is repeated until a specific
condition changes

leveling
Uses a series of increasingly detailed DFDs to describe an
information system

logical model
Shows what a system must do, regardless of how it is
implemented physically

logical structures
Process building blocks that must have a single entry and exit
point

modular design
Based on combinations of three logical structures

origin
The DFD beginning for a data flow

output data flows


Standard DFD names for the data flows leaving an entity

parent diagram
The higher-level diagram on a DFD that has been exploded

physical model
Describes how a system will be constructed in the systems
design phase

process description
Documents the details of a functional primitive

pseudocode
Used in program design as a shorthand notation for actual
code

record
Meaningful combination of related data elements

Вам также может понравиться