Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
119 Cards in this Set
- Front
- Back
b. systems review committee |
Many organizations assign responsibility for evaluating systems requests to a group called
a. technical support group b. systems review committee c. systems analysts d. top managers |
|
b. case for action
|
The final task in the preliminary investigation is to prepare a report to management that includes an evaluation of the systems request, an estimate of costs and benefits, and a ________ , which is a summary of the project request and a specific recommendation.
a. project scope b. case for action c. business case d. total cost of ownership |
|
b. False
|
Projects where management has a choice in implementing them are called voluntary projects.
a. True b. False |
|
c. systems review committee
|
The IT director usually serves as a technical consultant to ensure that members of the ________ are aware of crucial issues, problems, and opportunities.
a. discretionary project b. preliminary investigation c. systems review committee d. business case |
|
c. business case
|
The ________ refers to the reasons, or justification, for a proposal.
a. fishbone diagram b. project scope c. business case d. case for action |
|
b. strategic plan
|
A ________ looks beyond day-to-day activities and focuses on a horizon that is three, five, ten, or more years in the future.
a. business case b. strategic plan c. SWOT analysis d. critical success factor |
|
a. business case
|
The term ________ refers to the reasons, or justification, for a proposal.
a. business case b. strategic planning c. SWOT analysis d. critical success factor |
|
c. biometric device
|
A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern.
a. RFID b. encryption c. biometric device d. EPC |
|
d. JIT
|
________ inventory systems rely on computer-to-computer data exchange to minimize unnecessary inventory.
a. EPC b. CRM c. RFID d. JIT |
|
d. Operational
|
________ feasibility means that a proposed system will be used effectively after it has been developed.
a. Technical b. Schedule c. Economic d. Operational |
|
b. total cost of ownership
|
A system's ________ includes ongoing system support and maintenance costs, as well as acquisition costs.
a. intangible cost b. total cost of ownership c. tangible cost d. constraint |
|
c. fishbone diagram
|
A popular technique for investigating causes and effects is called a ________ .
a. SWOT analysis b. Pareto chart c. fishbone diagram d. scatter diagram |
|
c. interview
|
The ________ is the primary method of obtaining information during the preliminary investigation.
a. survey b. documentation review c. interview d. data analysis |
|
d. business case
|
The ________ refers to the reasons, or justification, for a proposal.
a. case for action b. fishbone diagram c. project scope d. business case |
|
a. strategic planning
|
The process of identifying long-term organizational goals, strategies, and resources is referred to as ________ .
a. strategic planning b. SWOT analysis c. economic feasibility d. preliminary investigation |
|
c. mission statement
|
Strategic planning starts with a ________ that reflects the firm's vision, purpose, and values.
a. case for action b. project scope c. mission statement d. business case |
|
b. Critical success factors
|
________ are high-priority objectives that must be achieved to fulfill the company's mission.
a. Cases for action b. Critical success factors c. Values d. Business cases |
|
c. opportunities
|
The letters SWOT stand for strengths, weaknesses, ________ , and threats.
a. offerings b. options c. opportunities d. objectives |
|
d. Microsoft Excel spreadsheet
|
As a planning tool, some systems developers prefer to use a ________ because it is easy to display priorities and the relative importance of planning assumptions.
a. Microsoft Word table b. text-based method c. CASE tool d. Microsoft Excel spreadsheet |
|
c. CASE tool
|
The most effective approach to IT project planning is to use a ________ to define and document the overall environment.
a. Microsoft Word table b. text-based method c. CASE tool d. Microsoft Excel spreadsheet |
|
b. IT department
|
Some companies still see the role of the ________ as a gatekeeper, responsible for screening and evaluating systems requests.
a. consulting group b. IT department c. middle management team d. senior management team |
|
a. Systems requests
|
________ are often aimed at improving service to customers or users within a company.
a. Systems requests b. Constraints c. Findings d. Values |
|
d. encryption
|
Some common security controls include various levels of user access, ________ , and passwords.
a. XY charts b. CASE tools c. Pareto charts d. encryption |
|
c. Biometric devices
|
________ can identify a person by retina scan or by mapping a facial pattern.
a. CASE tools b. Ishikawa diagrams c. Biometric devices d. Encryption |
|
b. Internal factors
|
________ include the strategic plan, top managers, user requests, information technology department, and existing systems and data.
a. Nondiscretionary projects b. Internal factors c. External factors d. Discretionary projects |
|
c. Top management
|
________ usually initiates large-scale projects because significant resources are required.
a. IT management b. Middle management c. Top management d. Operations management |
|
d. economy
|
An example of an external factor that affects corporate IT choices is the ________ .
a. strategic plan b. existing system and data c. IT department d. economy |
|
b. electronic product code
|
Some industry experts predict that bar code technology will be overshadowed in the future by ________ technology.
a. just-in-time b. electronic product code c. electronic data interchange d. supply chain management |
|
d. just-in-time
|
The purpose of a(n) ________ system is to provide the right products at the right place at the right time.
a. RFID b. electronic product code c. electronic data interchange d. just-in-time |
|
a. CRM
|
________ components can provide automated responses to sales inquiries, Web-based order processing, and online inventory tracking.
a. CRM b. CASE c. EDI d. JIT |
|
a. EPOD
|
Using ________ , a supplier uses RFID tags on each crate, case, or shipping unit to create a digital shipping list.
a. EPOD b. EPC c. EDI d. JIT |
|
c. systems review committee
|
Many organizations assign responsibility for evaluating systems requests to a group called the ________ .
a. top managers b. technical support group c. systems review committee d. systems analysts |
|
a. IT director
|
On a systems review committee, the ________ usually serves as a technical consultant to ensure that committee members are aware of crucial issues, problems, and opportunities.
a. IT director b. business analyst c. database administrator d. systems analyst |
|
d. broad viewpoint
|
A(n) ________ is a potential advantage of a committee approach to systems request evaluation.
a. action on request delay b. member's bias c. internal political difference d. broad viewpoint |
|
a. feasibility study
|
A ________ examines operational, technical, economic, and schedule factors.
a. feasibility study b. constraint c. business case d. mission statement |
|
d. Operational
|
________ feasibility means that a proposed system will be used effectively after it has been developed.
a. Technical b. Schedule c. Economic d. Operational |
|
c. operational
|
An evaluation of whether or not the new system will result in a workforce reduction is part of ________ feasibility.
a. economic b. schedule c. operational d. technical |
|
d. technical
|
An assessment of whether or not a proposed platform has sufficient capacity for future needs is part of ________ feasibility.
a. economic b. schedule c. operational d. technical |
|
d. TCO
|
The estimated costs for a new system are referred to as the ________ , which includes ongoing support and maintenance costs, as well as acquisition costs.
a. JIT b. EPOD c. CRM d. TCO |
|
a. Tangible benefits
|
________ can be measured in dollars and result from a decrease in expenses, an increase in revenues, or both.
a. Tangible benefits b. Intangible costs c. Intangible benefits d. Tangible costs |
|
a. tangible
|
A new scheduling system that reduces overtime is an example of a(n) ________ benefit.
a. tangible b. nondiscretionary c. discretionary d. intangible |
|
d. intangible
|
A user-friendly system that improves employee job satisfaction is an example of a(n) ________ benefit.
a. tangible b. nondiscretionary c. discretionary d. intangible |
|
d. schedule
|
The decision to appoint a project manager is a choice that relates to ________ feasibility.
a. economic b. technical c. operational d. schedule |
|
d. to identify and weed out systems requests that are not feasible
|
The first step in evaluating feasibility is ________ .
a. to set priorities b. to identify nondiscretionary projects c. to identify discretionary projects d. to identify and weed out systems requests that are not feasible |
|
d. discretionary
|
Projects where management has a choice in implementing them are called ________ projects.
a. nondiscretionary b. intangible c. tangible d. discretionary |
|
c. nondiscretionary
|
An example of a(n) ________ project is a system for the annual updates to payroll.
a. tangible b. discretionary c. nondiscretionary d. intangible |
|
b. preliminary investigation
|
The systems analyst conducts a ________ to study the systems request and recommend specific action.
a. discretionary project b. preliminary investigation c. business case d. nondiscretionary project |
|
b. problem
|
When interacting with users, systems analysts should be careful in their use of the word ________ because it has a negative meaning.
a. opportunity b. problem c. investigation d. dilemma |
|
a. fishbone diagram
|
A popular technique for investigating causes and effects is called a ________ .
a. fishbone diagram b. XY chart c. Pareto chart d. scatter diagram |
|
b. project scope
|
Defining the specific boundaries, or extent, of the project is referred to as determining the ________ .
a. critical success factors b. project scope c. project creep d. constraints |
|
c. project creep
|
In order to avoid ________ , the project scope should be defined as clearly as possible.
a. intangible costs b. constraints c. project creep d. intangible benefits |
|
d. constraint
|
A ________ , which is a requirement or condition that the system must satisfy or an outcome it must achieve, can involve hardware, software, time, policy, law or cost.
a. critical success factor b. tangible cost c. business case d. constraint |
|
a. fact-finding
|
The third step a systems analyst performs during a typical preliminary investigation is ________ .
a. fact-finding b. technical feasibility c. strategic planning d. SWOT analysis |
|
d. organization charts
|
During the third step of the preliminary investigation, a systems analyst should obtain ________ to understand the functions and identify the people to interview.
a. surveys b. fishbone diagrams c. systems documentation d. organization charts |
|
d. interview
|
The ________ is the primary method of obtaining information during a preliminary investigation.
a. survey b. operations observation c. documentation review d. interview |
|
d. survey
|
A(n) ________ is not as flexible as a series of interviews, but it is less expensive, generally takes less time, and can involve a broad cross-section of people.
a. operations observation b. data analysis c. documentation review d. survey |
|
c. Pareto chart
|
A widely used tool for visualizing issues that need attention is the ________ , which is drawn as a vertical bar graph.
a. fishbone diagram b. scatter diagram c. Pareto chart d. XY chart |
|
c. scatter diagram
|
The XY chart, sometimes called a(n) ________ , is a problem-solving tool.
a. Ishikawa diagram b. fishbone diagram c. scatter diagram d. Pareto chart |
|
c. observed current operations
|
If a systems analyst ________ during fact-finding, the results should be reviewed and key facts that will be useful in the feasibility analysis should be highlighted.
a. conducted surveys b. conducted interviews c. observed current operations d. gathered cost and benefit data |
|
d. gathered cost and benefit data
|
If a systems analyst ________ during fact-finding, financial statements and impact statements should be prepared.
a. conducted surveys b. conducted interviews c. observed current operations d. gathered cost and benefit data |
|
d. systems analysis
|
During the sixth step of the preliminary investigation, a systems analyst may recommend that the project proceed to the ________ phase.
a. SWOT analysis b. systems implementation c. systems testing d. systems analysis |
|
c. prepare a report to management
|
The final task in a preliminary investigation is to ________ .
a. complete a survey for management b. select a data sample for management c. prepare a report to management d. complete interviews with management |
|
a. case for action
|
The ________ is a section of the preliminary investigation report that includes a summary of the project results and a specific recommendation.
a. case for action b. systems request summary c. mission statement d. business case |
|
biometric device
|
Can identify a person by retina scan or by mapping a facial pattern
|
|
business case
|
The reasons, or justification, for a proposal
|
|
case for action
|
Summary of a project request and a specific recommendation
|
|
computer resources committee
|
Group that is also known as a systems review committee
|
|
constraint
|
Requirement or condition a system must satisfy or an outcome it must achieve
|
|
critical success factor
|
Must be achieved to fulfill a company's mission
|
|
customer relationship management
|
Systems that integrate all customer-related events and transactions
|
|
discretionary projects
|
Projects where management has a choice in implementing them
|
|
economic feasibility
|
Means the projected benefits of a proposed system outweighs the estimated costs
|
|
electronic product code
|
Technology that uses RFID tags to identify and monitor the movement of products
|
|
encryption
|
Security control that codes data to keep it safe from unauthorized users
|
|
feasibility study
|
Examines operational, technical, economic, and schedule factors
|
|
fishbone diagram
|
Analysis tool that represents possible causes of a problem as a graphical outline
|
|
intangible benefits
|
Advantages that are difficult to measure in dollars but are important to a company
|
|
intangible costs
|
Costs that are difficult to measure in dollars but are important to a company
|
|
interview
|
Primary method of obtaining information during the preliminary investigation
|
|
Ishikawa diagram
|
Analysis tool that is also referred to as a fishbone diagram
|
|
mission statement
|
Reflects a firm's vision, purpose, and values
|
|
nondiscretionary projects
|
Projects where management has no choice in implementing them
|
|
operational feasibility
|
Means that a proposed system will be used effectively after it has been developed
|
|
Pareto chart
|
Widely used tool for visualizing issues that need attention
|
|
preliminary investigation
|
Conducted to study a systems request and recommend a specific action
|
|
project creep
|
Process of projects expanding gradually without specific authorization
|
|
project scope
|
Defines the specific boundaries, or extent, of a project
|
|
scatter diagram
|
Problem-solving tool that is sometimes referred to as a XY chart
|
|
schedule feasibility
|
Means that a project can be implemented in an acceptable time frame
|
|
strategic planning
|
Process of identifying long-term organizational goals
|
|
SWOT analysis
|
Examines a firm's technical, human, and financial resources
|
|
systems development
|
Typically starts with a systems request
|
|
systems request
|
Formal way of asking for IT support and starting point for most projects
|
|
systems review committee
|
Group of key managers and users responsible for evaluating systems requests
|
|
tangible benefits
|
Benefits that can be measured in dollars
|
|
tangible costs
|
Costs that can usually be measured in dollars
|
|
technical feasibility
|
Technical resources needed to develop, purchase, install, or operate a system
|
|
user survey
|
Fact-finding form that users complete and return for tabulation
|
|
xy chart
|
Important problem-solving tool that shows a correlation between variables
|
|
b. False
|
The letters SWOT stand for strengths, weaknesses, options, and threats.
a. True b. False |
|
a. True
|
Stronger controls and reduced cost are two of the main reasons for systems requests.
a. True b. False |
|
a. True
|
Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product, from the factory floor to the retail checkout counter.
a. True b. False |
|
a. True
|
Customer relationship management systems integrate all customer-related events and transactions, including marketing, sales, and customer service activities.
a. True b. False |
|
a. True
|
Many organizations assign responsibility for evaluating systems requests to a computer resources committee.
a. True b. False |
|
a. True
|
Economic feasibility means that the projected benefits of a proposed system outweigh the estimated costs.
a. True b. False |
|
b. False
|
Projects where management has a choice in implementing them are called voluntary projects.
a. True b. False |
|
a. True
|
Gathering data about project usability, cost, benefits, and schedules is the objective of fact-finding.
a. True b. False |
|
a. True
|
The XY chart, which is a problem-solving tool, is sometimes called a scatter diagram.
a. True b. False |
|
b. False
|
The first section of a typical preliminary investigation report is the case for action.
a. True b. False |
|
critical success factors
|
High-priority objectives that must be achieved to fulfill the company's mission are called _______.
|
|
systems request
|
The starting point for most projects is called a(n) _______ , which is a formal way of asking for IT support.
|
|
encryption
|
Some common security controls include passwords, various levels of user access, and _______, or coding data to keep it safe from unauthorized users.
|
|
systems review committee
|
A(n) _______ evaluates systems requests at most large companies.
|
|
schedule
|
When assessing _______ feasibility, a systems analyst must consider the interaction between time and costs.
|
|
feasibility
|
The first step in evaluating _______ is to identify and weed out systems requests that are not achievable.
|
|
nondiscretionary
|
A type of project where management has no choice in implementing it is referred to as a(n) _______ project.
|
|
fishbone diagram
|
An Ishikawa diagram, which is a popular technique for investigating causes and effects, is also called a(n) _______.
|
|
Pareto chart
|
Systems analysts may use a(n) _______, which is a widely used tool for visualizing issues that need attention.
|
|
findings
|
The ______ section of a typical preliminary investigation report contains the results of the investigation, including a description of the project's scope, constraints, and feasibility.
|