PDF Download
FREE COMPUTERS AND STUDY GAMES ABOUT CTS 285
EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -150 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: The term____refers to a system's ability to handle increased business volume and transactions in the future.
Answer:
scalability Question 2: Sequence diagrams, state transition diagrams, and activity diagrams are dynamic modeling tool that can help a systems analyst understand how objects behave and interact with the system
Answer:
True Question 3: A scalable design can expand to meet new business requirements and volumes.
Answer:
True
Question 4: In an interview, _____ limit or restrict the response.
Answer:
closed-ended questions
Question 5: A project manager's planning:
Answer:
includes identifying project tasks and estimating completion time and costs Question 6: _____is a possible causes of cost overruns related to human resource issues.
Answer:
turnover Question 7: ____limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.
Answer:
Performance Question 8: In the model of the SDLC shown in the accompanying figure, the ___ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.
Answer:
systems planning phase
Question 9: A popular techniques for investigating causes and effects is called
a(n)____diagram, which is an analysis tool that represents the possible causes of a problem a a graphical outline.
Answer:
fishbone Question 10: ____software controls the flow of data, provides data security, and manages network operations.
Answer:
System Question 11: A major advantage of O-O design is that systems analysts can save time and avoid errors by using modular modular objects.
Answer:
True
Question 12: ____resemble verbs that describe what and how an object does something.
Answer:
Methods Question 13: Most large companies require systems that combine transactions processing, business support, knowledge management, and user productivity features.
Answer:
True Question 14: In object-oriented analysis, an object is a member of a(n)___. which is a collection of similar objects.
Answer:
class Question 15: Project managers always must be aware of the___path, so they can monitor the vital tasks and keep the project on track.
Answer:
critical Question 16: More complex systems have fewer processes, and analysts need only work through very few levels to identify the functional primitives
Answer:
False Question 17: The_____is a widely used method of visualizing and documenting software systems design.
Answer:
UML Question 18: Before beginning a preliminary investigation, it is important to let people know about the investigation and explain the systems analyst's role.
Answer:
True
Question 19: In a sequence diagram, a lifeline is identified by a(n)___line.
Answer:
dashed Question 20: ___is a full-featured program that holds the dominant share of the project management software market.
Answer:
Microsoft Project
Question 21: A(n)___chart displays complex task patterns and relationships.
Answer:
PERT/CPM
Question 22: The iteration structure is the completion of:
Answer:
a process step that is repeated until a specific condition changes Question 23: The number of___needed to describe to an object depends on the business requirements of the information system and its users.
Answer:
attributes Question 24: A use case___is a visual summary of several related use cases within a system or subsystem.
Answer:
diagram
Question 25: In a DFD, the Gane and Sarson symbol for a store is a____.
Answer:
flat rectangle that is open on the right side and closed on the left side.Question 26: ____provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems,and corporate IT infrastructure.
Answer:
Systems support and security