Name:     ID: 
 
Email: 

SICI4087 THIRD PARTIAL TEST CHAPTERS 15 & 16 VERSION A

True/False
Indicate whether the statement is true or false.
 

 1. 

Bar codes appear on any person or object that needs to be checked into and out of any kind of inventory system.
 

 2. 

Active RFID tags are much less reliable because they depend on their own power supply, which may fail.
 

 3. 

A disadvantage of alphabetic derivation codes is that there may be names that do not have the minimum required number of consonants in the name or description.
 

 4. 

The process of putting ambiguous or cumbersome data into short, easily entered digits or letters is called coding.
 

 5. 

Customs are stories that users tell regarding how the systes worked.
 

 6. 

Internal auditors are used when the Information System process data that influences a company’s financial statements.
 

 7. 

Maintenance is performed most often to improve the existing software, rather than to respond to crisis or system failure.
 

 8. 

In a structure chart the rectangles represent the modules.
 

 9. 

Coded data require less time to enter and reduce the number of items entered.
 

 10. 

A Six Sigma project leader is called a Green Belt.
 

 11. 

The better the system design, the easier it will be to maintain and the less money the business will have to spend on maintenance.
 

 12. 

Test data is data that have been successfully processed through the existing system.
 

 13. 

Numerical codes are much more difficult to sort than alphanumerics.
 

 14. 

Six Sigma is more than a methodology, it is a culture built on quality.
 

 15. 

On-line manuals on Web sites should include a FAQ page and downloadable updates.
 

 16. 

If codes must be long, they should be broken up into subcodes.
 

 17. 

Sayings are brief statements representing generalizations or advice.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 18. 

What is not contained in procedure manuals?
a.
trouble-shooting
b.
steps to accomplish different transactions
c.
what to do next if something worked well
d.
instructions on how to recover from problems
e.
background comments
 

 19. 

Which of the following is not a part of the Six Sigma methodology?
a.
Define the problem.
b.
Analyze the cause.
c.
Draw Conclusions
d.
Implement the solution.
e.
Standardize the changes.
 

 20. 

Which of the following refer to having an expert, who is not involved in setting up or using a system, examine information in order to ascertain its reliability?
a.
external training
b.
auditing
c.
maintenance
d.
mentoring
 

 21. 

Which refers to identifying the processes that need computerization as they arise, analyzing them as systems?
a.
molecular development
b.
top-down design
c.
bottom-up design
d.
modular program design
 

 22. 

Which testing checks to see if programs that are independent actually work together as planned?
a.
full systems testing with live data
b.
program testing
c.
full systems testing with test data
d.
link testing
 

 23. 

A machine that reads characters on the bottom of bank checks and some credit card bills use the _______ technology.
a.
Bar coding
b.
OMR
c.
OCR
d.
MICR
 

 24. 

Which is a way to read input from a source document with an optical scanner rather than off the magnetic media?
a.
optical character recognition (OCR)
b.
mark sense forms (OMR)
c.
bar codes
d.
punch out forms
 

 25. 

At what stage do operators and end-users become actively involved in testing?
a.
link testing with test data
b.
full systems testing with live data
c.
full systems testing with test data 
d.
program testing with test data
 

 26. 

In a structured walkthrough, the _______ records what is said so that the others present can interact without encumbrance. 
a.
author of the program being reviewed
b.
analyst or programmer peer
c.
notetaker
d.
walkthrough coordinator
 

 27. 

Which is a way to use peer reviewers to monitor the system's programming and overall development?
a.
systems development
b.
structured walkthroughs
c.
structure charts
d.
systems design
 

 28. 

Which people are not involved in structured walkthroughs?     
a.
a programmer or analyst peer
b.
a programmer or analyst
c.
a walkthrough coordinator
d.
the information system department manager
 

 29. 

A problem that occurs with classification codes is that:
a.
the classifications are not easily understood since they are encrypted.
b.
there may be several groups that have the same first letter.
c.
the classifications may not be secure enough.
d.
there may not be enough letters to form a complete code.
e.
the data may not be recognized as belonging to any classes.
 

 30. 

The recommended tool for designing a modular, top-down system is called: 
a.
a structure chart
b.
a structured walkthrough
c.
the folklore method
d.
a pseudocode
 

 31. 

BQN is the code for Rafael Hernandez Airport at Aguadilla. What type of code is this?
a.
simple sequence
b.
alphabetic derivation
c.
significant digits
d.
mnemonic
 

 32. 

Which is not a purpose for coding?
a.
revealing information
b.
keeping track of something
c.
concealing information
d.
classifying information
e.
creating information
 

 33. 

Which is not a possible way to validate input?     
a.
test for missing data
b.
using check digits
c.
test for accurate character data
d.
test for correct field length
 

 34. 

Which can be used as an intermediate step for developing program code?
a.
procedure manuals
b.
folkware
c.
pseudocode
d.
structure charts
 

 35. 

In establishing a coding system, the analyst should do all except:
a.
allow for modification of codes
b.
keep codes uniform.
c.
make codes meaningful.
d.
keep codes concise.
e.
make codes that are diversified or different.
 

 36. 

Which method is useful for scoring answer sheets for survey questionnaires?
a.
bar codes
b.
data strips
c.
punch out forms
d.
MICR
e.
mark sense forms (OMR)
 

 37. 

Which is the correct testing process?

I.      full systems testing with test data
II.      link testing with test data
III.      full systems testing with live data
IV.      program testing with test data
a.
IV - I - III - II
b.
IV - II - I - III
c.
IV - I - II - III
d.
II - IV - III – I
e.
II - IV - I - III
 

Matching
 
 
Matching
a.
indicates the approximate order the data were entered.
b.
groups data according to a common characteristic.
c.
used to conceal or disguise information
d.
describes an object by its membership in many subgroups
e.
helps the data entry person remember how to enter the data or the end-user remember how to use the information
f.
used to represent glyphs or syllables or whole words
g.
necessary for instructing either the computer or the decision maker about what action to take
h.
used to assign codes sequentially within a category
 

 38. 

simple sequence code
 

 39. 

classification code
 

 40. 

unicode
 

 41. 

function code
 

 42. 

mnemonic code
 

 43. 

cipher code
 

 44. 

block sequence code
 

 45. 

significant-digit code
 



 
         Start Over