Name: 
 

CS-110 Intro to CIS Final Review



Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

System development life cycles often group many activities into larger categories called which of the following?
a.
clusters
c.
units
b.
feature sets
d.
phases
 

 2. 

Which of the following measures how well a proposed system will work?
a.
Operational feasibility
c.
Schedule feasibility
b.
Technical feasibility
d.
Economic feasibility
 

 3. 

Which of the following is an advantage of custom software?
a.
It matches an organization’s requirements exactly.
b.
It is less expensive and takes less time to design and implement than packaged software.
c.
It is mass produced, copyrighted, prewritten, and available for purchase.
d.
All of the above.
 

 4. 

Which of the following has as its purpose the assessment of the feasibility of each alternative solution and then recommend the most feasible solution for a project?
a.
software
c.
sourcing
b.
proposal
d.
map
 

 5. 

Which of the following identifies the product(s) a systems analyst wants from a vendor?
a.
request for quotation (RFQ)
c.
request for information (RFI)
b.
request for system services (RFSS)
d.
request for proposal (RFP)
 

 6. 

Which of the following is a less formal method that uses a standard form to request information about a product or service?
a.
request for quotation (RFQ)
c.
request for proposal (RFP)
b.
request for system services (RFSS)
d.
request for information (RFI)
 

 7. 

Which of the following is a professional who is hired based on expertise in a specialized area of computers, including service and advice?
a.
technology analyst
c.
IT consultant
b.
computer logician
d.
outsourcer
 

 8. 

For each input and output, a systems analyst typically develops a sample of the input or output that contains actual data. What is this sample called?
a.
adaptation
c.
mock-up
b.
prototype
d.
feasibility scheme
 

 9. 

In this phase, system developers perform four major activities: (1) develop programs and apps, (2) install and test the new system, (3) train users, and (4) convert to the new system. What is this phase?
a.
implementation
c.
operational
b.
planning
d.
analysis
 

 10. 

Which of the following is true of a unit test?
a.
It verifies that each individual program or object works by itself.
b.
It verifies that all programs in an application work together properly.
c.
It verifies that an application works with other applications.
d.
It is performed by end-users and verifies that the new system works with actual data.
 

 11. 

Which of the following is true of a systems test?
a.
verifies that each individual program works by itself
b.
verifies that all programs in an application work together properly
c.
verifies that an application works with other applications
d.
is performed by end-users and verifies that the new system works with actual data
 

 12. 

Which of the following is true of an integration test?
a.
verifies that each individual program works by itself
b.
verifies that all programs in an application work together properly
c.
verifies that an application works with other applications
d.
is performed by end-users and verifies that the new system works with actual data
 

 13. 

With this kind of conversion, a user stops using the old system and begins using the new system on a certain date. What is this kind of conversion?
a.
phased conversion
c.
parallel conversion
b.
direct conversion
d.
pilot conversion
 

 14. 

With this kind of conversion, each location converts to a new system at a separate time. What is this kind of conversion?
a.
phased conversion
c.
parallel conversion
b.
direct conversion
d.
pilot conversion
 

 15. 

The purpose of this phase is to provide ongoing assistance for an information system and its users after the system is implemented. What is this phase?
a.
planning phase
c.
support and security phase
b.
analysis phase
d.
implementation phase
 

 16. 

Companies today often have a person who is responsible for the physical security of an organization’s property and people and also is in charge of the digital security of computing resources. What is the title of this person?
a.
CIT
c.
CTO
b.
CSO
d.
CRO
 

 17. 

Which of the following is an object-oriented programming language that is an extension of the C programming language?
a.
C+
c.
C++
b.
C-
d.
C=
 

 18. 

Which of the following is a set of technologies from Microsoft that allows almost any type of program to run on the Internet or an internal business network?
a.
.JIT
c.
.NET
b.
.RPG
d.
.VPE
 

 19. 

Wireless devices use a subset of XML that allows webpage developers to design pages specifically for microbrowsers. What is the name of this subset?
a.
WXL
c.
MXL
b.
WML
d.
MML
 
 
COGNITIVE ASSESSMENT
 

 20. 

Which of the following describes an information system?
a.
a network of computers that enables the transfer of information from one computer to another, such as the Internet
b.
a collection of hardware, software, data, people, and procedures that work together to produce quality information
c.
a group of data professionals who work together to enhance communications systems
d.
a series of activities such as analysis and design in the process of distributing information on a large scale
 

 21. 

You are applying for a job as a system analyst. What will your job entail?
a.
reviewing existing systems and selecting one to use for your organization
b.
converting the system design into a programming language
c.
providing technical support to users and system programmers
d.
designing and developing an information system
 

 22. 

What occurs during scope creep?
a.
one bad programming decision leads to another and work must be undone
b.
the project manager decides to remove certain planned activities in order to save time
c.
one activity leads to another that was not originally planned
d.
feasibility of the project is reevaluated
 

 23. 

Which of the following is NOT true about project requests?
a.
A project request falls under the analysis phase of an SDLC.
b.
In a large organization, these often must be formal, written statements.
c.
They are sometimes called requests for system services.
d.
Some changes are outside the control or an organization, such as response to competition.
 

 24. 

Which two activities make up the design phase of an SDLC?
a.
use data modeling to determine necessary procedures; acquire hardware and software
b.
get approval of the system proposal; use data modeling to determine necessary procedures
c.
develop the details of the new or modified information system; get approval of the system proposal
d.
acquire hardware and software; develop the details of the new or modified information system
 

 25. 

What is a VAR?
a.
a tool used to solicit proposals for hardware and software necessary for system development
b.
a vendor with an automated response system for customer service requests and tech support
c.
a company that purchases products from manufacturers and resells them to the public, also offering additional services with the product
d.
an analysis method that compares the value of a current system with additional requirements being requested by users
 

 26. 

A systems analyst develops a technical design that contains programming-like notations. What is this design called?
a.
layout chart
c.
data model
b.
mock-up
d.
project flowchart
 

 27. 

What is the theory behind user buy-in?
a.
rolling out a completed system with incentives for users gets them excited about a new system
b.
the users who have contributed to the process of system development get to be the first to implement it
c.
systems analysts should do web research and read technical reports in order to understand how a system will be used
d.
if users are involved in system development, they are more likely to use and accept the new system
 

 28. 

What purpose do CASE tools serve?
a.
evaluate vendor proposals
b.
determine system requirements
c.
support one or more activities of system development
d.
calculate how the system will be evaluated
 

 29. 

Which conversion strategy converts each location to the new system at a separate time?
a.
phased
c.
pilot
b.
parallel
d.
direct
 

 30. 

Which of the following characteristics describes a low-level language?
a.
designed for a single purpose
b.
uses plain English terms to instruct the computer
c.
easily portable to other types of computers
d.
machine-dependent
 

 31. 

What type of programming language is used by programmers to write instructions using symbolic instruction codes?
a.
executable
c.
procedural
b.
assembly
d.
first-generation
 

 32. 

Which of the following is NOT true about procedural languages?
a.
They are third-generation languages.
b.
The programmers use English-like words to write instructions.
c.
A compiler is an embedded program used to aid in the code-writing process.
d.
The translation process is very complex.
 

 33. 

Which of the following is NOT true about object-oriented programming (OOP) languages?
a.
A major benefit of OOP is the ability to reuse and modify existing objects.
b.
OOP languages do not work well in a RAD environment.
c.
An OOP language is event driven.
d.
Java and C# are examples of complete OOP languages.
 

 34. 

RAD is an acronym for which of the following terms?
a.
rapid application development
c.
real-time access direction
b.
rapid achievement direction
d.
real-time application decision
 

 35. 

Which company developed the Java programming language?
a.
Microsoft
c.
Sun Microsystems
b.
Oracle
d.
Bell Laboratories
 

 36. 

What does a 4GL programming language enable users and programmers to do?
a.
create apps for mobile devices
b.
develop applications in a procedural environment
c.
access data in a database
d.
use graphical language to create multi-platform programs
 

 37. 

Which of the following is NOT true about macros?
a.
A macro is a series of statements that instructs a program or app how to complete a task.
b.
Because they are used with application software, macros pose no risk to security.
c.
Macros can be used to automate routine tasks in a word processing program, for example.
d.
A macro recorder captures a set of steps as you perform them and saves it so you can perform them again.
 

 38. 

In HTML, how is a tag used?
a.
to add a nonexecutable comment or note in the code
b.
to save a file or page with a unique name
c.
to specify how a webpage is displayed when viewed on the web
d.
to specify which browser should be used to view the page
 

 39. 

What is the purpose of RSS 2.0 and ATOM?
a.
to convert a website created for a PC into a mobile website
b.
to enable comments and interaction between a user and a website
c.
to translate HTML into a webpage that can be viewed using multiple browsers
d.
to create specifications that content aggregators use to distribute content to subscribers
 

 40. 

Which of the following is a free, open source scripting language?
a.
JavaScript
c.
PHP
b.
Perl
d.
Tcl
 

True/False
Indicate whether the statement is true or false.
 

 1. 

Although the system development life cycle contains a set of three phases, several ongoing activities take place during the entire process.
 

 2. 

System development only involves representatives from the IT department.
 
 
nar002-1.jpg
 

 3. 

In a Gantt chart like the one in the accompanying figure, the horizontal axis across the top or bottom of the chart displays a list of required activities.
 

 4. 

A project that is feasible at one point of the system development cycle might become infeasible at a later point.
 

 5. 

Systems analysts and other IT professionals use several techniques to gather data and information.
 

 6. 

To obtain information from a large number of people, system developers use interviews.
 

 7. 

The request for system services triggers the last phase in the SDLC: planning.
 

 8. 

When reviewing project requests, projects that receive the lowest priority are those mandated by management or some other governing body.
 

 9. 

Interviewers, including systems analysts, ask three types of questions: static, dynamic, and open-ended.
 

 10. 

Detailed analysis sometimes is called physical design because the systems analysts develop the proposed solution without regard to any specific hardware or software.
 

 11. 

With an RFI, the vendor quotes a price for the listed product(s).
 

 12. 

Some vendors will give a demonstration of the product(s) specified in a vendor proposal.
 

 13. 

A CASE tool is an environment that allows software developers to test their programs with fictitious data without adversely affecting other programs, information systems, or data.
 
 
nar003-1.jpg
 

 14. 

A source program is the one used by programmers to convert machine language into assembly language as shown in the accompanying figure.
 

 15. 

An interpreter reads a code statement, converts it into one or more machine language instructions, and then executes those machine language instructions before moving to the next code statement.
 

 16. 

Java uses a just-in-time compiler to convert the machine-independent code into machine-dependent code that is executed immediately.
 

 17. 

A visual programming language is a language that uses a visual or graphical interface for creating all source code.
 

 18. 

A visual programming language provides a graphical interface called a visual programming environment that allows developers to drag and drop objects to build programs and apps.
 

 19. 

When using an application generator, the developer (a programmer or user) works with menu-driven tools and graphical user interfaces to define the desired specifications.
 

 20. 

Many smart phones and other mobile devices use XML as their markup language.
 

Completion
Complete each statement.
 

 1. 

The ____________________ becomes the first item in the project notebook.
 

 

 2. 

During the ____________________ phase, four major activities are performed: (1) review and approve the project requests, (2) prioritize project requests, (3) allocate resources to approved projects, and (4) form a project development team for each approved project.
 

 

 3. 

The ____________________ phase consists of two major activities: (1) conduct a preliminary investigation and (2) perform detailed analysis.
 

 

 4. 

The purpose of the ____________________ study is to determine the exact nature of a problem or improvement and decide whether it is worth pursuing.
 

 

 5. 

A(n) ____________________ language is a set of words, symbols, and abbreviations that enables a programmer to communicate instructions to a computer or mobile device.
 

 

 6. 

____________________ language instructions use a series of binary digits (1s and 0s) or a combination of numbers and letters that represent binary digits.
 

 
 
nar003-1.jpg
 

 7. 

A(n) ____________________ language, as shown in the accompanying figure, represents the second generation of programming languages. In this kind of language, a programmer writes instructions using symbolic instruction codes.
 

 

 8. 

A(n) ____________________ is an item that can contain both data and the procedures that read or manipulate that data.
 

 

 9. 

____________________ is a method of developing software in which the programmer writes and implements a program in segments instead of waiting until the entire program is completed.
 

 

 10. 

____________________ is an object-oriented programming language developed by Sun Microsystems.
 

 



 
Check Your Work     Start Over