Name:     ID: 
 
    Email: 

itmg440_sp09_v3

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

The pilot study is the safest conversion approach.
 

 2. 

Aplications where the rewards for excellence are high and where the penalities for failure are high should probably should be outsourced.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 3. 

The percentage of all large systems that may be considered operating failures is:
a.
60 percent
d.
75 percent
b.
65 percent
e.
80 percent
c.
70 percent
 

 4. 

The process that reads and analyzes a programs’s existing code, files, and database descriptions, producing output that shows design-level components, such as entities, attributes, and processes is called:
a.
prototyping
d.
data flow diagram
b.
forward engineering
e.
flowcharting
c.
reverse engineering
 

 5. 

Description of how an information system works from either a technical or end-user standpoint best describes:
a.
test plan
d.
documentation
b.
information plan
e.
conversion plan
c.
information architecture
 

 6. 

The IT-enabled organizational change that has the lowest risk and lowest return is:
a.
automation
d.
paradigm shift
b.
reengineering
e.
disintermediation
c.
rationalization
 

 7. 

Which of the following is not a method in the Math class?
a.
abs()
c.
random()
b.
exp()
d.
sqrt()
 

 8. 

Which of the following is an equality operator?
a.
!=
c.
>=
b.
=
d.
<=
 

 9. 

Salvaging aging software by upgrading it so users can avoid a long and expensive replacement project is the purpose of::
a.
outsourcing
d.
prototyping
b.
object-oriented development
e.
JAD
c.
software reengineering
 

 10. 

This approach argues that the information requirements of an organization are determined by a small number of critical success factors.
a.
enterprise analysis
d.
conceptual analysis
b.
strategic analysis
e.
disintermediation
c.
informational analysis
 

 11. 

System failure can be attributed to system’s desogm when:
a.
the system’s data have a high level of inaccuracy or inconsistency
d.
an on-line system is operationally inadequate
b.
the cost to implement the system is way over budget
e.
information required for a specific business fuction may be inaccessible because the data is incomplete
c.
information may not be provided quickly enough to be helpful
 

 12. 

During the systems analysis process, determining whether the solution is achievable, given the organization’s resources and constraints, is achieved through:
a.
requirements analysis
d.
logical design
b.
feasibility study
e.
physical design
c.
conceptual analysis
 

 13. 

The ____ class serves as an intermediary between the input buffer and the Java program.
a.
BufferedInputStream
c.
InputStreamReader
b.
BufferedReader
d.
System.in
 

 14. 

If the project structure is low, the project technology level is high, and the project size is large, than the degree of risk is:
a.
low
d.
medium-low
b.
very low
e.
very high
c.
medium
 

 15. 

Testing, training, and conversion are associated with the:
a.
installation stage of the systems lifecycle
d.
design stage of the systems lifecycle
b.
post-implementation stage of the systems lifecycle
e.
programming stage of the systems lifecycle
c.
systems stydt stage of the systems lifecycle
 

 16. 

In regards to error messages, which of the selections listed below is most preferred?
a.
Enter correct phone number, phone number is invalid
b.
Phone number is invalid, enter correct phone number
 

 17. 

A(n) ____ approach to programming results in programs that are easier to develop, debug, and maintain than previously accepted approaches.
a.
structured
c.
functional
b.
object-oriented
d.
high-level
 

 18. 

What is Carl’s home state?
a.
Alabama
c.
Arizona
b.
California
d.
Mississippi
 

 19. 

The keyword, ____, is required by the drawImage() method to hold the location of the image while it is being loaded from disk.
a.
catch
c.
this
b.
extends
d.
var
 

 20. 

Which of the following is not a primitive type in Java?
a.
boolean
c.
long
b.
char
d.
String
 

 21. 

The Java 2 Runtime Environment contains all the following tools except the ____.
a.
Java APIs and Class Libraries
c.
Java Compiler
b.
Java Applet Viewer
d.
Java Virtual Machine
 

 22. 

Tangible benefits include each of the following except:
a.
improved asset utilization
d.
reduced rate of growth in expenses
b.
increased productivity
e.
reduced facility costs
c.
low operational costs
 

 23. 

Which of the following is not a comparison operator?
a.
=
c.
==
b.
<=
d.
>
 

 24. 

The most common form of IT-enabled organizational change is:
a.
disintermediation
d.
rationalization
b.
paradigm shifts
e.
automation
c.
reengineering
 

 25. 

The _________ is the execution of instructions in a top to bottom fashion.
a.
iteration construct
d.
sequence construct
b.
control construct
e.
selection construct
c.
determinat construct
 

 26. 

A declaration statement can do all the following tasks except ____.
a.
assign an initial value to the variable when declaring a variable
b.
call a constructor to declare an instance of a class when declaring a variable
c.
declare a data type and name an identifier
d.
declare multiple variables with different data types.
 

 27. 

All of the following are conceptual constructs of object-oriented programming except ____.
a.
encapsulation
c.
iteration
b.
inheritance
d.
polymorphism
 

 28. 

The user resistance theory focusing on factors inherent in the design of the system is the:
a.
counter-implementation theory
d.
distermediation theory
b.
people-implementation theory
e.
systems-oriented theory
c.
interaction theory
 

 29. 

A(n) ____ is a small program that can be downloaded and executed as part of a displayed Web page.
a.
applet
c.
control structure
b.
servlet
d.
superclass
 

 30. 

A ____ error can surface during execution due to an unanticipated action of the user.
a.
logic
c.
syntax
b.
semantic
d.
system
 

 31. 

The Structure Theorem does NOT refer to which control stucture?
a.
structure
c.
repitition or DOWHILE
b.
GOTO
d.
se;ectopm pf IF-THEN ELSE
 

 32. 

True statements about prototyping include each of the following except:
a.
prototyping is most useful when there is uncetainity about requirements or design solutions
d.
prototyping is very well suited for large, complex applications
b.
prototyping is especially valuable for the design of the end-user interface of an information system
e.
prototyping is more likely to produce systems gthat fulfill user requirements
c.
prototyping encourages intense end-use involvement throughout the systems development
 

 33. 

Steps in protoyping include:
a.
identifying the user’s basic requirements
d.
revising and enhancing the prototype
b.
developing an initial protoype
e.
all of the above
c.
using the prototype
 

 34. 

A structure chare would most likely be prepared during the:
a.
implementation stage of the systems lifecycle
d.
project definition stage of the systems lifecycle
b.
design stage of the systems lifecycle
e.
systems study stage of the systems lifecycle
c.
programming stage of the systems lifecycle
 

 35. 

Indentation rules are part of a programmer's ____ convention.
a.
class
c.
language
b.
coding
d.
naming
 

 36. 

The ____ method accepts horizontal and vertical coordinates as parameters that identify where to draw the graphic.
a.
drawImage()
c.
getImage()
b.
getDocumentBase()
d.
setBackground()
 

 37. 

Which of the following is not a validation check as described in chapter notes?
a.
Completeness check
d.
Digit Check
b.
Format Check
e.
Spelling Check
c.
Range Check
 

 38. 

A(n) ____ is any word you choose to name an item in a Java program.
a.
argument
c.
parameter
b.
identifier
d.
variable
 

 39. 

Assume condition P is tested. If condition P is true, statement K is executed. If condition P id false than statement K is skipped and statement L is executed. The situation just described is and example of a(n):
a.
iteration construct
d.
sequence constuct
b.
control construct
e.
selection construct
c.
determinant construct
 

 40. 

The actionPerformed() method is part of the ____.
a.
ActionEvent class
c.
Applet class
b.
ActionListener interface
d.
Button class
 

 41. 

True statements about CSF Analysis include each of the following except:
a.
the only principle method used in CSF analysis is personal interviews
d.
this method is not biased to top management
b.
only top managers are interviewed
e.
a unique strength of the CSF method is not that is takes into account the changing environment with organizations and managers must deal
c.
this method produces systems that are more custom tailored to an organization
 

 42. 

Advantages of using software packages for systems development include each of the following except:
a.
the time frameand costs for developing the new system should be considerably reduced
d.
vendors supply much of the ongoing maintenance and support for the system
b.
most of the design work has already been done
e.
purchaser testing can be accomplished in a relatively shorter period of time
c.
the packages are geared to the most common requirements of the organizations
 

 43. 

The getText() method can retrieve text from any of the following AWT or Swing components except ____.
a.
Button
c.
JTextField
b.
Label
d.
TextField
 

 44. 

True statements concerning management support and commitment during the implementation process include each of the following:
a.
management support is more critical for small businessess than for large organizations because of limited budgets
d.
if a manager considers a new system to be a priority, the system will more likely be treated as such by his or her subordinates
b.
management backing ensures that a systems project will recieve sufficient funding andresources to be successful
e.
management support can sometimes backfire
c.
if an information system has the backing and committment of management at various levels, it is more likely to be perceived positively by both users and the the technical informational services staff
 

 45. 

A ____ is an object that displays text in the applet window.
a.
Button
c.
Label
b.
CheckBox
d.
TextField
 

 46. 

Software that helps companies integrate all facets of the business, including planning, manufacturing, sales and marketing is:
a.
RAD
d.
CASE
b.
ERP
e.
XPL
c.
CAD
 

 47. 

The System class extends methods from its superclass, which is the ____ class.
a.
Array
c.
Object
b.
Exception
d.
JavaBean
 

 48. 

If the project structure is high, the product technology structure is high, and the project size is small, then the degree of risk is :
a.
low
d.
medium-low
b.
very low
e.
very high
c.
medium
 

 49. 

The IT-enabled organizational change that has the highest risk and the highest return:
a.
reengineering
d.
disintermediation
b.
rationalization
e.
automation
c.
paradigm shift
 

 50. 

An IDE also is called a ____.
a.
builder tool
c.
scripting tool
b.
mini-browser
d.
text editor
 



 
Submit          Reset Help