True/False Indicate whether the statement is true or
false.
|
|
1.
|
Bar codes appear on any person or object that needs to be checked into and out
of any kind of inventory system.
|
|
2.
|
Active RFID tags are much less reliable because they depend on their own power
supply, which may fail.
|
|
3.
|
A disadvantage of alphabetic derivation codes is that there may be names that do
not have the minimum required number of consonants in the name or description.
|
|
4.
|
The process of putting ambiguous or cumbersome data into short, easily entered
digits or letters is called coding.
|
|
5.
|
Customs are stories that users tell regarding how the systes worked.
|
|
6.
|
Internal auditors are used when the Information System process data that
influences a company’s financial statements.
|
|
7.
|
Maintenance is performed most often to improve the existing software, rather
than to respond to crisis or system failure.
|
|
8.
|
In a structure chart the rectangles represent the modules.
|
|
9.
|
Coded data require less time to enter and reduce the number of items
entered.
|
|
10.
|
A Six Sigma project leader is called a Green Belt.
|
|
11.
|
The better the system design, the easier it will be to maintain and the less
money the business will have to spend on maintenance.
|
|
12.
|
Test data is data that have been successfully processed through the existing
system.
|
|
13.
|
Numerical codes are much more difficult to sort than alphanumerics.
|
|
14.
|
Six Sigma is more than a methodology, it is a culture built on quality.
|
|
15.
|
On-line manuals on Web sites should include a FAQ page and downloadable
updates.
|
|
16.
|
If codes must be long, they should be broken up into subcodes.
|
|
17.
|
Sayings are brief statements representing generalizations or advice.
|
Multiple Choice Identify the choice that best completes the
statement or answers the question.
|
|
18.
|
What is not contained in procedure manuals?
a. | trouble-shooting | b. | steps to accomplish different
transactions | c. | what to do next if something worked well | d. | instructions on how
to recover from problems | e. | background
comments |
|
|
19.
|
Which of the following is not a part of the Six Sigma
methodology?
a. | Define the problem. | b. | Analyze the cause. | c. | Draw
Conclusions | d. | Implement the solution. | e. | Standardize the
changes. |
|
|
20.
|
Which of the following refer to having an expert, who is not involved in setting
up or using a system, examine information in order to ascertain its reliability?
a. | external training | b. | auditing | c. | maintenance | d. | mentoring |
|
|
21.
|
Which refers to identifying the processes that need computerization as they
arise, analyzing them as systems?
a. | molecular development | b. | top-down design | c. | bottom-up design
| d. | modular program design |
|
|
22.
|
Which testing checks to see if programs that are independent actually work
together as planned?
a. | full systems testing with live data | b. | program testing | c. | full systems testing
with test data | d. | link testing |
|
|
23.
|
A machine that reads characters on the bottom of bank checks and some credit
card bills use the _______ technology.
a. | Bar coding | b. | OMR | c. | OCR | d. | MICR |
|
|
24.
|
Which is a way to read input from a source document with an optical scanner
rather than off the magnetic media?
a. | optical character recognition (OCR) | b. | mark sense forms (OMR) | c. | bar
codes | d. | punch out forms |
|
|
25.
|
At what stage do operators and end-users become actively involved in
testing?
a. | link testing with test data | b. | full systems testing with live
data | c. | full systems testing with test data | d. | program testing with
test data |
|
|
26.
|
In a structured walkthrough, the _______ records what is said so that the others
present can interact without encumbrance.
a. | author of the program being reviewed | b. | analyst or programmer peer | c. | notetaker | d. | walkthrough
coordinator |
|
|
27.
|
Which is a way to use peer reviewers to monitor the system's programming
and overall development?
a. | systems development | b. | structured walkthroughs | c. | structure
charts | d. | systems design |
|
|
28.
|
Which people are not involved in structured
walkthroughs?
a. | a programmer or analyst peer | b. | a programmer or analyst | c. | a walkthrough
coordinator | d. | the information system department manager |
|
|
29.
|
A problem that occurs with classification codes is that:
a. | the classifications are not easily understood since they are
encrypted. | b. | there may be several groups that have the same first letter. | c. | the classifications
may not be secure enough. | d. | there may not be enough letters to form a
complete code. | e. | the data may not be recognized as belonging to any
classes. |
|
|
30.
|
The recommended tool for designing a modular, top-down system is called:
a. | a structure chart | b. | a structured walkthrough | c. | the folklore
method | d. | a pseudocode |
|
|
31.
|
BQN is the code for Rafael Hernandez Airport at Aguadilla. What type of
code is this?
a. | simple sequence | b. | alphabetic derivation | c. | significant
digits | d. | mnemonic |
|
|
32.
|
Which is not a purpose for
coding?
a. | revealing information | b. | keeping track of something | c. | concealing
information | d. | classifying information | e. | creating
information |
|
|
33.
|
Which is not a possible way to validate
input?
a. | test for missing data | b. | using check digits | c. | test for accurate
character data | d. | test for correct field length |
|
|
34.
|
Which can be used as an intermediate step for developing program code?
a. | procedure manuals | b. | folkware | c. | pseudocode | d. | structure
charts |
|
|
35.
|
In establishing a coding system, the analyst should do all
except:
a. | allow for modification of codes | b. | keep codes uniform. | c. | make codes
meaningful. | d. | keep codes concise. | e. | make codes that are diversified or
different. |
|
|
36.
|
Which method is useful for scoring answer sheets for survey
questionnaires?
a. | bar codes | b. | data strips | c. | punch out
forms | d. | MICR | e. | mark sense forms
(OMR) |
|
|
37.
|
Which is the correct testing process?
I.
full systems testing with test data II. link testing with test
data III. full systems testing with live
data IV. program testing with test data
a. | IV - I - III - II | b. | IV - II - I - III | c. | IV - I - II -
III | d. | II - IV - III – I | e. | II - IV - I -
III |
|
Matching
|
|
|
Matching
a. | indicates the approximate order the
data were entered. | b. | groups data according to a common
characteristic. | c. | used to conceal or disguise information | d. | describes an object
by its membership in many subgroups | e. | helps the data entry person remember how to
enter the data or the end-user remember how to use the information | f. | used to represent
glyphs or syllables or whole words | g. | necessary for instructing either the computer
or the decision maker about what action to take | h. | used to assign codes sequentially within a
category |
|
|
38.
|
simple sequence code
|
|
39.
|
classification code
|
|
40.
|
unicode
|
|
41.
|
function code
|
|
42.
|
mnemonic code
|
|
43.
|
cipher code
|
|
44.
|
block sequence code
|
|
45.
|
significant-digit code
|