Multiple Choice Identify the choice that best completes the
statement or answers the question.
|
|
1.
|
The recommended tool for designing a modular, top-down system is called:
a. | the folklore method | b. | a structure chart | c. | a
pseudocode | d. | a structured walkthrough |
|
|
2.
|
Which of the following refer to having an expert, who is not involved in setting
up or using a system, examine information in order to ascertain its reliability?
a. | mentoring | b. | maintenance | c. | external
training | d. | auditing |
|
|
3.
|
Which testing checks to see if programs that are independent actually work
together as planned?
a. | full systems testing with test data | b. | link testing | c. | program
testing | d. | full systems testing with live data |
|
|
4.
|
A machine that reads characters on the bottom of bank checks and some credit
card bills use the _______ technology.
a. | OMR | b. | Bar coding | c. | MICR | d. | OCR |
|
|
5.
|
A problem that occurs with classification codes is that:
a. | the classifications may not be secure enough. | b. | there may not be
enough letters to form a complete code. | c. | there may be several groups that have the same
first letter. | d. | the data may not be recognized as belonging to any classes. | e. | the classifications
are not easily understood since they are encrypted. |
|
|
6.
|
BQN is the code for Rafael Hernandez Airport at Aguadilla. What type of
code is this?
a. | significant digits | b. | alphabetic derivation | c. | simple
sequence | d. | mnemonic |
|
|
7.
|
Which of the following is not a part of the Six Sigma
methodology?
a. | Standardize the changes. | b. | Implement the solution. | c. | Draw
Conclusions | d. | Define the problem. | e. | Analyze the
cause. |
|
|
8.
|
Which is not a purpose for
coding?
a. | keeping track of something | b. | concealing information | c. | revealing
information | d. | creating information | e. | classifying
information |
|
|
9.
|
In a structured walkthrough, the _______ records what is said so that the others
present can interact without encumbrance.
a. | notetaker | b. | walkthrough coordinator | c. | author of the
program being reviewed | d. | analyst or programmer
peer |
|
|
10.
|
Which is a way to read input from a source document with an optical scanner
rather than off the magnetic media?
a. | mark sense forms (OMR) | b. | punch out forms | c. | bar
codes | d. | optical character recognition (OCR) |
|
|
11.
|
What is not contained in procedure manuals?
a. | what to do next if something worked well | b. | steps to accomplish
different transactions | c. | trouble-shooting | d. | background
comments | e. | instructions on how to recover from problems |
|
|
12.
|
Which can be used as an intermediate step for developing program code?
a. | folkware | b. | structure charts | c. | pseudocode | d. | procedure
manuals |
|
|
13.
|
Which is a way to use peer reviewers to monitor the system's programming
and overall development?
a. | systems development | b. | structured walkthroughs | c. | structure
charts | d. | systems design |
|
|
14.
|
Which is not a possible way to validate
input?
a. | test for missing data | b. | test for correct field
length | c. | using check digits | d. | test for accurate character
data |
|
|
15.
|
Which method is useful for scoring answer sheets for survey
questionnaires?
a. | data strips | b. | bar codes | c. | punch out
forms | d. | mark sense forms (OMR) | e. | MICR |
|
|
16.
|
Which refers to identifying the processes that need computerization as they
arise, analyzing them as systems?
a. | modular program design | b. | bottom-up design | c. | molecular
development | d. | top-down design |
|
|
17.
|
In establishing a coding system, the analyst should do all
except:
a. | allow for modification of codes | b. | keep codes uniform. | c. | make codes
meaningful. | d. | make codes that are diversified or different. | e. | keep codes
concise. |
|
|
18.
|
Which is the correct testing process?
I.
full systems testing with test data II. link testing with test
data III. full systems testing with live
data IV. program testing with test data
a. | IV - II - I - III | b. | IV - I - III - II | c. | II - IV - I -
III | d. | IV - I - II - III | e. | II - IV - III –
I |
|
|
19.
|
At what stage do operators and end-users become actively involved in
testing?
a. | full systems testing with live data | b. | link testing with test data | c. | program testing with
test data | d. | full systems testing with test data |
|
|
20.
|
Which people are not involved in structured
walkthroughs?
a. | a programmer or analyst | b. | a programmer or analyst
peer | c. | a walkthrough coordinator | d. | the information system department
manager |
|
Matching
|
|
|
Matching
a. | indicates the approximate order the
data were entered. | b. | groups data according to a common
characteristic. | c. | used to conceal or disguise information | d. | describes an object
by its membership in many subgroups | e. | helps the data entry person remember how to
enter the data or the end-user remember how to use the information | f. | used to represent
glyphs or syllables or whole words | g. | necessary for instructing either the computer
or the decision maker about what action to take | h. | used to assign codes sequentially within a
category |
|
|
21.
|
block sequence code
|
|
22.
|
mnemonic code
|
|
23.
|
simple sequence code
|
|
24.
|
function code
|
|
25.
|
significant-digit code
|
|
26.
|
classification code
|
|
27.
|
unicode
|
|
28.
|
cipher code
|
True/False Indicate whether the statement is true or
false.
|
|
29.
|
A Six Sigma project leader is called a Green Belt.
|
|
30.
|
The process of putting ambiguous or cumbersome data into short, easily entered
digits or letters is called coding.
|
|
31.
|
Maintenance is performed most often to improve the existing software, rather
than to respond to crisis or system failure.
|
|
32.
|
A disadvantage of alphabetic derivation codes is that there may be names that do
not have the minimum required number of consonants in the name or description.
|
|
33.
|
Numerical codes are much more difficult to sort than alphanumerics.
|
|
34.
|
Internal auditors are used when the Information System process data that
influences a company’s financial statements.
|
|
35.
|
If codes must be long, they should be broken up into subcodes.
|
|
36.
|
Test data is data that have been successfully processed through the existing
system.
|
|
37.
|
Sayings are brief statements representing generalizations or advice.
|
|
38.
|
In a structure chart the rectangles represent the modules.
|
|
39.
|
Bar codes appear on any person or object that needs to be checked into and out
of any kind of inventory system.
|
|
40.
|
On-line manuals on Web sites should include a FAQ page and downloadable
updates.
|
|
41.
|
Customs are stories that users tell regarding how the systes worked.
|
|
42.
|
Six Sigma is more than a methodology, it is a culture built on quality.
|
|
43.
|
Coded data require less time to enter and reduce the number of items
entered.
|
|
44.
|
Active RFID tags are much less reliable because they depend on their own power
supply, which may fail.
|
|
45.
|
The better the system design, the easier it will be to maintain and the less
money the business will have to spend on maintenance.
|