0% found this document useful (0 votes)
44 views9 pages

CHAPTER 5_Assessment

The document contains a series of multiple-choice and true/false questions related to systems design and development. It assesses knowledge on programming languages, user skill levels, system cutover types, and the importance of secure program libraries. An answer key is provided at the end for reference.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views9 pages

CHAPTER 5_Assessment

The document contains a series of multiple-choice and true/false questions related to systems design and development. It assesses knowledge on programming languages, user skill levels, system cutover types, and the importance of secure program libraries. An answer key is provided at the end for reference.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Assessment

CHAPTER 5
Multiple Choice
1. The following are questions to be asked to test the systems design adequacy except:
a. Were data lost, corrupted, or duplicated by the conversion process?
b. Are input forms and screens properly designed and meeting user needs?
c. What were the areas of significant departures from budget
2. It is a programming language that requires the programmer to specify the precise
order in which the program is executed
a. Object-oriented language
b. Event-driven language
c. Procedural language
3. A phase where detailed description of proposed system is produced
a. Phase 5
b. Phase 6
c. Phase 7
Multiple Choice
4.What user’s skill level is described: have little or no experience with computers and
are embarrassed to ask questions.
a.Frequent light users
b.Occasional users
c.Novices
5.Under this type of cutover, the firm switches to the new system and simultaneously
terminates the old system
a.Phased cutover
b.Cold turkey cutover
c.Parallel operation cutover
Multiple Choice
6.What is the primary purpose of having a secure program library?
a. To allow programmers direct access to all library files.
b. To prevent errors and program fraud.
c. To ensure programs are automatically updated.

7.Which of the following best describes the scope of technical design activities in the
SDLC?
a. Systems analysis, system implementation and maintenance and detailed
systems design
b. Post-implementation review
c. Systems analysis, general systems design, feasibility analysis, and detailed
systems design
Multiple Choice
8.Why is it important for integrated audit tools, such as the Embedded Audit Module
(EAM) and the Integrated Test Facility (ITF), to be specified at the conceptual design stage?
a. To ensure they are included as integral system components and budgeted into the
project.
b. To allow programmers to independently select audit features.
c. To reduce the cost of system implementation.
9.It is an application program source code is stored on magnetic disks?
a. Source Production Library
b. Source Program Library
c. System Program Library
10.When programs are first placed in the libraries they are assigned a version number of?
a. two
b. zero
c. one
True or False
1. In-house development of information systems requires a full-time staff of
analysts and programmers.

2. Commercial systems are always more expensive than in-house development.

3. Turnkey systems are general-purpose systems that are ready for immediate
implementation.

4. The systems development process does not involve any financial implications.
True or False
5. Stakeholders in systems development include only end users and system
professionals.
Answer Key
CHAPTER 5
Multiple Choice True or False
1. c 1. True
2. c 2. False
3. a 3. True
4. c 4. False
5. b 5. False
6. b
7. c
8. a
9. b
10. b

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy