Question: Which of the following statements is true of closed source projects?

Answer Options:

Only users are allowed to alter the source code.
Only trusted programmers are allowed to make changes.
Only the programmers who hold the license are allowed to alter the source code.
Only the license holder is allowed to alter the source code.

Answer: Only the license holder is allowed to alter the source code.

 

Question: An accountant realizes that considerable amount of time that is wasted when accounting tasks are performed manually. The software that automates these tasks is called ________.

Answer Options:

Operating system
System software
Firmware
Application software

Answer: Application software

 

Question: Which of the following is an example of vertical-market application software? (select all that apply)

Answer Options:

Inventory tracking software for an automobile manufacturer
Tax preparation software that individuals use in their personal computers
Microsoft PowerPoint used to create presentations
Self-driving software of an automobile manufacturer

Answer: Inventory tracking software for an automobile manufacturer Self-driving software of an automobile manufacturer

 

Question: Smart devices will increasingly need ________. (select all that apply)

Answer Options:

New protocols
Less cache
Higher bandwidth
Less memory

Answer: Higher bandwidth

 

Question: An example of a functional requirement is __________.

Answer Options:

Access to the customer order system
System should be available in English and Spanish
System should be accessed through a Blackberry device
Can be displayed in Internet Explorer, in Firefox, or in Google Chrome
System is automatically updated every 5 seconds

Answer: Access to the customer order system

 

Question: An example of a nonfunctional requirement is __________.

Answer Options:

Supplier table is available
The system must contain customer order history for three years
System can be used in any of 100 offices worldwide
SQL queries from customer table and order table are available
Customer zip code is formatted as character data

Answer: System can be used in any of 100 offices worldwide

 

Question: Hamid has selected one middle manager from each department that will be affected by the updated system and one lower-level manager from each department, along with a few senior staff as well as the project sponsor for a JAD session. He is trying to:

Answer Options:

Balance the work load for departments so the regular day-to-day functions can still continue while the JAD team is off-site
Create a new hybrid department that will beta test the final system
Prevent domination by only a few individuals in the JAD session
Have a broad mix of organizational levels in the JAD session
Reduce the time necessary for the length of JAD session meetings

Answer: Have a broad mix of organizational levels in the JAD session

 

Question: Michael, a systems analyst, is preparing a closed wiki site for Northstate Bank. He has written permission from eight other companies to view their internal wiki sites, and also has approval from his manager and the project team to use these other sites for ideas and structure. This would be a form of:

Answer Options:

Business Process Automation
Business Process Improvement
Informal Benchmarking
Formal Benchmarking
Technology Analysis

Answer: Formal Benchmarking

 

Question: One difference between the reports from interviews and from a JAD session is that:

Answer Options:

It describes information from the interview or JAD session
The interview report will give a complete project management timeline; while the JAD session report will not
The interview report is generally written within 48 hours of the interview, while the JAD session report may take a week or two after the JAD session.
The JAD report will include results from questionnaires while the interview report will not
JAD reports will include technology analysis while interviews will only include root cause analysis

Answer: The interview report is generally written within 48 hours of the interview, while the JAD session report may take a week or two after the JAD session.

 

Question: The interview process has gone well. There are a few things that need clarification and what really happens when specific financial analysts use the system. Which of the following might be the best way to verify what does happen?

Answer Options:

Observation of how the analysts do their work
Document analysis of what the system was to do
A JAD session with end users, financial analysts and top managers
Additional interviews with top level managers in the finance area
Questionnaires/survey of end users of the system

Answer: Observation of how the analysts do their work

 

Question: The line between analysis and design is sometimes very blurry. One reason is that _______.

Answer Options:

Analysis and design are parts of the same process
Design and analysis phases do not always follow a sequential flow
Analysis can be simple while design can be complex
Design is always performed by a separate group
The design phase is technically part of the analysis phase

Answer: Design and analysis phases do not always follow a sequential flow

 

Question: Bits are used for computer data because they ________.

Answer Options:

Are represented exclusively as alphabets
Can have three possible states at a time
Are easy to represent physically
Are more complex than bytes

Answer: Are easy to represent physically

 

Question: Main memory is also known as ________.

Answer Options:

Optical memory
Read-only memory
Cache memory
Random access memory

Answer: Random access memory

 

Question: Which of the following is an example of SaaS?

Answer Options:

iCloud
Oracle on Demand
Amazon S3
Microsoft Windows Azure

Answer: iCloud

 

Question: Which of the following refers to the three tiers in the three-tier architecture?

Answer Options:

TCP, IP, and HTTP
Tunnel, switch, and access point
HTML, XML, and JSON
User, server, and database

Answer: User, server, and database

 

Question: Mark follows certain steps to access the supplementary readings for a course when using his organization’s library management system. These steps that he follows are examples of the ________ component of an information system.

Answer Options:

User guide
Procedure
Instructions
Software

Answer: Procedure

 

Question: Which of the following is the least critical aspect of good information?

Answer Options:

Additional data
Timeliness of data
Relevance of data
Data accuracy

Answer: Additional data

 

Question: Virtualization is the process by which ________.

Answer Options:

One physical computer hosts many different virtual computers within it
Many computers are used to control a server
A single server is used to host the operations of a workstation
A single operating system is licensed for multiple computers

Answer: One physical computer hosts many different virtual computers within it