CAPP 63220

subject Type Homework Help
subject Pages 30
subject Words 5106
subject Authors Alan Dennis Barbara Haley Wixom David Tegarden

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The feasibility analysis helps the approval committee determine whether or not to
proceed with a project.
Textual analysis is the review of corporate documents to identify potential objects,
attributes, operations, and relationships.
Timeboxing is a popular technique which sets a fixed deadline for a project and delivers
the system by that deadline no matter what, even if functionality needs to be reduced.
Implementation is a phase in the Unified Process.
page-pf2
In object-oriented systems, the encapsulation means the system simply combines
processes and data into classes.
Virtualization is another term for cloud computing.
Whole system conversion is the conversion location where the separate and distinct
modules of the entire system are installed at one time in three or more phases.
page-pf3
As behavioral models are developed, it is likely that the use cases and structural models
will have to be modified.
Enchanted objects should be in the background simply providing its message for you to
receive at your leisure; not "in your face."
As many as 70% of companies with IT budgets over $5 million are currently
outsourcing development of systems.
The potential adopter is the person for whom the new system is designed and built.
page-pf4
A view is used to simplify a class diagram by subsetting the information available on
the diagram for viewing.
In the UML, the Activity Diagram illustrates all the interactions between the system and
its environment.
It is a good idea to have the users role play the use cases as a way of confirming them
during the analysis phase.
page-pf5
A master file stores core information that is important to the business, is normally kept
for long periods of time, and is regularly updated.
Cost of cloud is one of the set of obstacles for adopting the cloud.
An essential use case describes the specific set of steps to be followed.
Messages should require the user to acknowledge them, rather than being displayed for
a few seconds and then disappearing, with the exception of delay in processing
messages, which should disappear once the delay has passed.
page-pf6
SQL, the standard language for accessing data in tables in relational databases, stands
for Standard Query Language.
You should maximize connascence within an encapsulation boundary and minimize
connascence between the encapsulation boundaries.
A sequence diagram can only be drawn to represent a single scenario in a use case.
page-pf7
The outsourcing is the best design strategy for every project.
MVC is an example of layered design of software architecture.
An activity in a behavioral state diagram represents the movement of an object from
one state to another.
The planning phase is the fundamental process of understanding how an information
system should be built and determining who on the project team will build it.
page-pf8
For sequence, communication and behavioral state diagrams, a frame indicates the
context of the diagram
Mapping between the problem domain objects and an OODBMS is a straightforward
one-to-one mapping.
The symbol below represents an aggregation on a class diagram.
A(n) value added contract, that is gaining in popularity, provides for the outsourcer to
page-pf9
gain a percentage of the completed systems benefits.
RAD (Rapid Application Development) adjusts the SDLC phases to get some of the
system developed and into the hands of the users quickly.
It is critical in change management to understand that the real costs and benefits are far
more important than the perceived costs and benefits, because people act on what is
true, not on what they believe to be true.
The ideal computer system permits users to enter invalid data into the system. This data
is later inexpensively identified and someone is notified to resolve the information
problem.
page-pfa
On large projects, programmers must coordinate changes to the program source code,
and the best way to avoid mistakes is to use a source code library, which requires
programmers to check out programs and prohibits others from working on them at the
same time.
There are two basic strategies to motivating adoption: informational and political. Both
strategies are often used simultaneously.
The three key roles in any major organizational change are the sponsor of the change,
the change agent, and the potential adopter or target of the change.
page-pfb
When writing documentation, all commands contain two parts, an index and an action.
A class diagram is a(n) _____ model.
a. static
b. dynamic
c. evolving
d. obsolete
e. none of these
A(n) _____ formalizes the interactions between a client and server object.
a. relationship
b. contract
c. abstract object
d. concrete object
e. abstraction
page-pfc
The person that identifies opportunities for improvements and designs an information
system to implement them is called a(n) _____.
a. computer programmer
b. end-user
c. systems analyst
d. systems specialist
e. technical writer
A systems analyst draws a lifeline with an X at the end. This lifeline represents _____.
a. a message that cannot be delivered
b. an object that is destroyed at a point in time
c. a message that is delivered at that point in time
d. an object that is complete at that point in time
e. an object that arrives at its final destination
page-pfd
The principal disadvantages(s) with the waterfall development methodology is (are)
_____.
a. a long time elapses between completion of the system proposal and the delivery of
the system
b. if the team misses important requirements, expensive post-implementation
programming may be needed
c. the design must be completely specified on paper before programming begins
d. all of these
e. none of these
A(n) _____ describes information about an object.
a. attribute
b. behavior
c. operation
d. message
e. instance
page-pfe
The most comprehensive and complete deliverable of the analysis phase is _____.
a. project work plan
b. system proposal
c. behavioral models for the to-be system
d. functional models for the to-be system
e. structural models for the to-be system
A simple rule to follow when creating problem domain classes and data access and
manipulation classes is that there should be ______________.
a. One data access and manipulation class for each concrete problem domain class
b. Two data access and manipulation classes for each concrete problem domain class
c. N data access and manipulation classes for each concrete problem domain class,
where N is the number of methods in the problem domain class
d. N data access and manipulation classes for each concrete problem domain class,
where N is the number of subclasses of the problem domain class
e. none of these
page-pff
A disadvantage of purchasing packaged software is that the organization may _____.
a. accept functionality that is not a perfect fit
b. build technical skills and functional knowledge
c. make strategic changes during implementation
d. remove all risk from the project
e. save money on the purchase
_____ is the test that is performed to ensure that all classes work together without error
and meet the business requirements for usability, security, and performance.
a. Acceptance testing
b. Beta testing
c. Integration testing
d. System testing
e. Unit testing
page-pf10
The fundamental part of the user interface that provides information from the system to
the user is the _____ mechanism.
a. input
b. interface
c. layout
d. navigation
e. output
When programmers or project teams set up three areas on different disk drives in which
the programmers can work, these areas are for _____.
a. development, goal setting, and testing
b. development, testing, and contracting
c. development, testing, and production
d. testing, filing, and printing
e. testing, printing, and program logging
An advantage of custom development is that the organization can _____.
page-pf11
a. accept functionality that is not a perfect fit
b. build technical skills and functional knowledge
c. install in a short period of time
d. remove all risk from the project
e. save money on the purchase
The number of errors found will be highest in the _____ stage of testing.
a. unit test
b. integration test
c. system test
d. acceptance test (alpha)
e. acceptance test (beta)
If the logical data model contains fields that depend on another non-primary key field,
then it is in violation of the rules of _____.
a. base normal form
page-pf12
b. first normal form
c. non-normal form
d. second normal form
e. third normal form
In order to approve a system request, the approval committee must know
a. all of the details of the ultimate system to be developed.
b. the high level functionality of the system.
c. what the screens and reports will look like in the final system.
d. who the end users of the system will be and exactly how they will use it in their jobs.
e. all of these.
Which one in the following list is an example of NOSQL data store .
a. Oracle
b. SQL Server
page-pf13
c. Access
d. OODBMS
e. Google's Big Table
One way to identify objects for the class diagram is to scan the use case descriptions for
___________________.
a. relationships
b. object lists
c. patterns
d. nouns
e. verbs
A public attribute is shown in a class diagram with the symbol _____ before the name.
a. "
b. #
c. *
page-pf14
d. +
e. /
Which of the following objects would be most likely to be destroyed at some point in
time in a sequence diagram?
a. customer
b. order
c. order item
d. invoice
e. shopping cart
Which of the following relationships represent the extension of the functionality of the
use case to cover optional behavior?
a. association relationship
b. extend relationship
c. include relationship
d. generalization relationship
page-pf15
e. optional relationship
A(n) _____ is less expensive and easier for novice users to use, but it does not have the
features that are necessary to support mission-critical or large scale systems.
a. database
b. database management system
c. end-user database administrative system
d. end-user database management system
e. enterprise database management system
Constraints can be written in either a natural language, a semiformal language, or a
formal language such as ________________.
a. UML
b. Structured English
c. Use case diagrams
d. English
page-pf16
e. UML's Object Constraints Language
_____ makes it impossible to know which implementation is going to be executed until
the system actually does it.
a. Information hiding
b. Dynamic binding
c. Inheritance
d. Reuse
e. Encapsulation
The process of understanding how an information system can support business needs,
design the system, build it, and deliver it to users is the _____.
a. analysis phase of the SDLC
b. object oriented approach
c. rule for creating a CASE tool
d. systems development life cycle
e. waterfall development methodology
page-pf17
Overall, the consistent notation, integration among the diagramming techniques, and
application of the diagrams across the entire development process makes ________ a
powerful and flexible tool set for analysts and developers.
a. CASE
b. UML
c. DFDs
d. EPCs
e. Flow Charts
In an object-oriented system, changes can take place at the following level of
abstraction.
a. variable
b. method
c. class/object
d. cluster (examples: partition, package)
e. all of these
page-pf18
A JAD facilitator is _____.
a. the person who sets the meeting agenda and guides the discussion
b. the person who records the discussion
c. participates in the discussion
d. is also a power user
e. none of these
Ethan is considering the replacement of the existing network for his organization. He
has projected organizational growth at 50% per year for the next five years. With this
growth, many new employees will surely be hired and trained. He has received a large
amount of money from a small business grant for the initial development. The
architecture Ethan should select is _____.
a. server-based
b. client-based
c. client-server
d. network-based
e. client-network server
page-pf19
When an analyst discovers that a set of classes have a similar set of attributes and
methods, it may make sense to _____ out the similarities into a separate class.
a. refine
b. abstract
c. factor
d. partition
e. separate
Many countries have ____ norms for expressing information such as dates that are
unique to the country. Knowledge of these norms is important when developing global
information systems.
a. cultural
b. specialized
c. variable
d. idiosyncratic
e. unstated
page-pf1a
Understanding the as-is system, identifying improvements, and developing
requirements for the to-be system are the steps of the _____ phase.
a. analysis
b. design
c. implementation
d. planning
e. SDLC
Which one of the following is not part of the security requirements?
a. System value estimates
b. Capacity requirements
c. Access control requirements
d. Encryption and authentication requirements
e. Virus control requirements
page-pf1b
Explain how the factor "project skills" influences the selection of a design strategy for a
project.
What is meant by a service-oriented architecture?
page-pf1c
Explain the five general types of navigation controls for user documentation topics.
The communication diagram is used for modeling process flow.
Discuss the reasons why on-line documentation is expected to be the dominant form of
documentation for the future.
page-pf1d
Explain four sources for identifying navigation terms.
Briefly describe the purposes of use case modeling in software development.
page-pf1e
Explain the object persistence format type known as Object-relational databases.
Information systems consultants, Drew and Becky, have just visited the site of a
potential customer. Video-Audio-Images Extra, Inc., is an old established organization
that was one of the first companies to videotape weddings, high school musicals, and
church presentations. Today they have transformed into a multinational company that
performs audio and video recording and mixing, digital re-mastering, and computer
graphics for feature films, MTV videos, commercials and video games. During the
interview Becky learned that the company has a legacy database system that should
soon be replaced. The new system should be able to handle only accounting,
purchasing, human resources, and inventory control for the company. What object
persistence format would you recommend to Becky and Drew? Support your answer.
page-pf1f
Briefly explain what the creators of the Unified Modeling Language (UML) mean by
use-case driven, architecture centric, and iterative and incremental.
page-pf20
Describe the patterns method for identifying candidate objects for a structural model.
Distinguish between logical models and physical models.
page-pf21
What is a relationship? What are the types of relationships that you may have on a class
diagram? Define each of these.
Briefly describe the primary advantage that concept maps have over traditional textual
requirements documents techniques?
page-pf22
What are the different ways to optimize an object system?
Explain how the "time frame" factor influences the selection of a design strategy for a
project.
page-pf23
What is a use-case point? For what is it used?
The Dean of Admissions at State University would like to have an online application
process for all prospective students. The online application will have the following
field: first, middle, and last name; street, city, state, and zip address; phone; date of
birth; and social security number. What types of input validation would you perform on
each field? Support your answer.
page-pf24
Describe the textual analysis method for identifying candidate objects for a structural
model.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.