Chapter 2 Review
1. An
evaluation of the resources needed for users to be trained on a new system is
part of ____ feasibility.
A: economic
B: technical
C: operational
D: schedule
A: economic
B: technical
C: operational
D: schedule
2. The
first step in evaluating feasibility is ____.
A: setting priorities
B: identifying systems requests that are not feasible or necessary
C: conducting a preliminary investigation
D: building a prototype
A: setting priorities
B: identifying systems requests that are not feasible or necessary
C: conducting a preliminary investigation
D: building a prototype
3. The
first step in a preliminary investigation is generally to ____.
A: evaluate feasibility
B: perform fact-finding
C: understand the problem or opportunity
D: estimate project development time and cost
A: evaluate feasibility
B: perform fact-finding
C: understand the problem or opportunity
D: estimate project development time and cost
4.
An organizational chart does NOT show ____.
A: formal reporting relationships
B: an overview of the way each department functions
C: the informal alignment of a group
D: the names of employees and their positions
A: formal reporting relationships
B: an overview of the way each department functions
C: the informal alignment of a group
D: the names of employees and their positions
5.
Many companies use ____ request forms that can be filled out and submitted
electronically.
A: printed
B: faxed
C: online
D: offline
A: printed
B: faxed
C: online
D: offline
6.
A company's ____ are broken down into one-year, three-year, and five-year
categories.
A: objectives
B: goals
C: requirements
D: inventory
A: objectives
B: goals
C: requirements
D: inventory
7.
The coding of data to keep it safe from unauthorized users is called ____.
A: prototyping
B: encryption
C: password access
D: key access
A: prototyping
B: encryption
C: password access
D: key access
8. EDI refers to ____.
A: external development interchange
B: electronic data interchange
C: external data interchange
D: none of the above
A: external development interchange
B: electronic data interchange
C: external data interchange
D: none of the above
9.
A risk is an event that can affect a project ____.
A: negatively
B: positively
C: both a. and b.
D: neither a. nor b.
A: negatively
B: positively
C: both a. and b.
D: neither a. nor b.
10.
Chapter 2 explained four types of project feasibility tests that a systems
request must pass and did NOT include ____ feasibility.
A: technical
B: marketing
C: economic
D: schedule
A: technical
B: marketing
C: economic
D: schedule
11.
An examination of the reliability of the hardware and software environment for
a new system is part of ____ feasibility.
A: economic
B: technical
C: operational
D: schedule
A: economic
B: technical
C: operational
D: schedule
12.
A project where management has a yes/no choice to implement is called a ____
project.
A: nondiscretionary
B: discretionary
C: resource
D: non-resource
A: nondiscretionary
B: discretionary
C: resource
D: non-resource
13.
A popular technique for investigating causes and effects is called a(n) ____.
A: Ishikawa diagram
B: arrowhead diagram
C: Moore diagram
D: Problem/Solution diagram
A: Ishikawa diagram
B: arrowhead diagram
C: Moore diagram
D: Problem/Solution diagram
14.
A fact-finding method during the preliminary investigation includes all of the
following EXCEPT ____.
A: observing the current system in operation
B: conducting a survey of users
C: reviewing current system documentation
D: figuring out the costs of the solution
A: observing the current system in operation
B: conducting a survey of users
C: reviewing current system documentation
D: figuring out the costs of the solution
15.
____ feasibility means that a project can be implemented in an acceptable time
frame.
A: Technical
B: Time
C: Schedule
D: Operational
A: Technical
B: Time
C: Schedule
D: Operational
16.
A SWOT analysis does NOT include an examination of ____.
A: weaknesses
B: options
C: strengths
D: threats
A: weaknesses
B: options
C: strengths
D: threats
17.
Vital objectives that must be achieved for the enterprise to fulfill its
mission are considered ____.
A: the SDLC
B: critical success factors
C: critical business issues
D: CASE tools
A: the SDLC
B: critical success factors
C: critical business issues
D: CASE tools
18.
Hardware-based security controls that can identify a person by a retina scan or
by mapping a facial pattern are referred to as ____.
A: biological devices
B: encrypted devices
C: strategic scanning devices
D: biometric devices
A: biological devices
B: encrypted devices
C: strategic scanning devices
D: biometric devices
19.
The purpose of a(n) ____ system is to provide the right product in the right
place at the right time.
A: EDI
B: CRM
C: CASE
D: JIT
A: EDI
B: CRM
C: CASE
D: JIT
20.
Microsoft Project is a tool that is often used by ____.
A: end users
B: project managers
C: customer service personnel
D: top managers
A: end users
B: project managers
C: customer service personnel
D: top managers
21.
A systems request form should not ____.
A:
have complex instructions
B:
be easy to understand
C:
include enough space for all required information
D:
indicate what supporting documents are needed
22.
A(n: ____ is a requirement or condition that a system must satisfy or an
outcome that a system must achieve.
A:
condition
B: constraint
C:
impediment
D:
obstacle
23.
To avoid the problem of project creep, ____.
A:
define project scope as vaguely as possible
B:
leave project scope undefined
C: define project
scope as clearly as possible
D:
expand the focus beyond the problem at hand
24.
____ considers questions such as “Does management support the project?” and
“Will the new system require training for users?”
A:
schedule feasibility
B:
technical feasibility
C:
economic feasibility
D: operational
feasibility
25.
____ components can provide automated response to sales inquiries, Web-based
order processing, and online inventory tracking.
A:
Mission statement
B: Customer relationship
management (CRM)
C:
Feasibility study
D:
Total cost of ownership (TCO:
26.
A feasibility study includes tests for ____ feasibility, which means that the
projected benefits of the proposed system outweigh the estimated costs.
A: economic
B:
schedule
C:
operational
D:
technical
27.
____ is an example of a discretionary project.
A:
Creating a new report for a user
B:
Adding a report required by a new federal law
C:
Including annual updates to payroll and tax percentages
D:
All of the above
28.
When setting priorities for systems requests, the highest priority goes to
projects that provide the ____.
A:
least benefit, at the highest cost, in the longest period of time
B:
least benefit, at the lowest cost, in the longest period of time
C:
greatest benefit, at the highest cost, in the shortest period of time
D:
greatest benefit, at the lowest cost, in the shortest period of time
29.
Projects where management has a choice in implementing them are called ____
projects.
A:
discretionary
B:
nondiscretionary
C:
appended
D:
concatenated
30.
A systems analyst conducts a(n: ____ investigation to study the systems request
and recommend specific action.
A: preliminary
B:
appendix
C:
systems
D:
transitional
0 comments:
Post a Comment