Question: One difference between the reports from interviews and from a JAD session is that:

Answer Options:

It describes information from the interview or JAD session
The interview report will give a complete project management timeline; while the JAD session report will not
The interview report is generally written within 48 hours of the interview, while the JAD session report may take a week or two after the JAD session.
The JAD report will include results from questionnaires while the interview report will not
JAD reports will include technology analysis while interviews will only include root cause analysis

Answer: The interview report is generally written within 48 hours of the interview, while the JAD session report may take a week or two after the JAD session.

 

Question: The interview process has gone well. There are a few things that need clarification and what really happens when specific financial analysts use the system. Which of the following might be the best way to verify what does happen?

Answer Options:

Observation of how the analysts do their work
Document analysis of what the system was to do
A JAD session with end users, financial analysts and top managers
Additional interviews with top level managers in the finance area
Questionnaires/survey of end users of the system

Answer: Observation of how the analysts do their work

 

Question: The line between analysis and design is sometimes very blurry. One reason is that _______.

Answer Options:

Analysis and design are parts of the same process
Design and analysis phases do not always follow a sequential flow
Analysis can be simple while design can be complex
Design is always performed by a separate group
The design phase is technically part of the analysis phase

Answer: Design and analysis phases do not always follow a sequential flow

 

Question: Which is NOT a purpose of the requirements definition?

Answer Options:

To give a very high-level explanation of the business requirements
A more precise list of requirements that can be used as inputs to the rest of analysis
Create functional requirements
Create cost/benefit analysis
Create non-functional requirements

Answer: To give a very high-level explanation of the business requirements

 

Question: Which is NOT a requirements analysis strategy?

Answer Options:

Understanding of the as-is system
Identifying improvements
Developing requirements for the to-be system
Root cause analysis
Understanding of screen design, layout and navigation

Answer: Understanding of screen design, layout and navigation

 

Question: Which of the following is true about a JAD facilitator?

Answer Options:

They can participate in the discussion to settle a disagreement
They keep track of all discussions by entering information into the computer
They allow sidebar discussions and unstructured activities
They recognize that some people know more about the system and proposed system and will dominate the discussion and know that is a positive thing
They set the meeting agenda

Answer: They set the meeting agenda

 

Question: The ILOVEYOU virus is important to information security for

Answer Options:

Popularizing computers among the masses
Intruding into a number of high profile computer installations
Exposing the implications of international differences in cyber-law
Stealing commercial information by exploiting weaknesses in wireless networks

Answer: Exposing the implications of international differences in cyber-law

 

Question: Albert Gonzalez and T.J. Maxx are well known in the information security literature for

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Intruding into a number of high profile computer installations
Causing one of the most significant internet outages ever
Fabrication of financial records at publicly traded companies

Answer: Stealing commercial information by exploiting weaknesses in wireless networks

 

Question: Information security is defined as

Answer Options:

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

Answer: Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

 

Question: Confidentiality is

Answer Options:

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
Protecting information and information systems from unauthorized use
Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
Ensuring timely and reliable access to and use of information

Answer: Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices

 

Question: A process model can ____________:

Answer Options:

Only document the as-is system
Only document the to-be system
Document both the as-is and the to-be system
Only be used in BPR situations
Only be used with JAD sessions

Answer: Document both the as-is and the to-be system

 

Question: Rihanna has a process has two inputs but only one output

Answer Options:

This is an error as there need to be the same amount of inputs as outputs
This is an error as processes do not have inputs or outputs
This is normal as all processes have two inputs and one output
This is normal as all processes need at least one input and at least one output
This is an error as processes only produce output

Answer: This is normal as all processes need at least one input and at least one output

 

Question: Decomposing a DFD means:

Answer Options:

Balancing the processes so that each process has three and only three sub-processes
Breaking complex processes into a structured set of detailed diagrams
Doing a walk-through on the entire DFD structure with all the analysts on the project team
Taking lower levels of process refinement and aggregating them into a major system
Making sure that all data stores are shown on each child DFD diagram

Answer: Breaking complex processes into a structured set of detailed diagrams

 

Question: On your level 0 diagram you have a process #2 and when you create a level 1 diagram for process #2, you might have processes like:

Answer Options:

2.1, 2.2, 2.3
2.1, 2.2, 2.2.3
2A, 2B, 2C
2-A, 2-B, 2-C
2-initial, 2-main, 2-end

Answer: 2.1, 2.2, 2.3

 

Question: The context diagram shows:

Answer Options:

Detailed processing logic
All major processes
All the data stores in the system
The “big picture” of the system with external entities and only one process
The system in context with all other systems in that department (for example, accounts payable, accounts receivable, etc.)

Answer: The “big picture” of the system with external entities and only one process

 

Question: The relationship between use cases and data flow diagrams is:

Answer Options:

Use cases tend to be developed with users to make sure the analyst has fully captured the processes and relationships. DFDs are built upon the use cases to more fully formally understand the processes involved.
Both are tools in a systems analyst’s toolbox, although they do unrelated things
Use cases are developed by users exclusively, while DFDs are developed by analysts exclusively
Use cases come out of JAD sessions and clarify what was discussed by users in those sessions; DFD’s come out of analysts interviews
They are the same thing – use cases are process models using the DeMarco and Yourdon notation, and DFD’s are process models using the Gane and Sarson notation

Answer: Use cases tend to be developed with users to make sure the analyst has fully captured the processes and relationships. DFDs are built upon the use cases to more fully formally understand the processes involved.

 

Question: What diagram will have sub-processes with numbers like 3.3.1, 3.3.2, 3.3.3 (etc.) and also have flows coming in or going out that are not illustrated?

Answer Options:

Context diagram
Level 0 diagram
Gantt diagram
Level 1 diagram
Level 2 diagram

Answer: Level 2 diagram

 

Question: In determining if a process is to be automated, the project team will do all of the following EXCEPT:

Answer Options:

Weigh the costs
Redraw the logical DFD as a combined logical/physical DFD
Determine benefits
Evaluate the efficiency
Consider the integrity of the process to the system

Answer: Redraw the logical DFD as a combined logical/physical DFD