logo image

Chapter 01

In launching a new information system, the greatest risk occurs when a company ____.
tries to decide how the system will be implemented before determining what the system is supposed to do
____ software controls the flow of data, provides data security, and manages network operations.
system
Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.
enterprise applications
Over 40 years ago, a concept called Moore’s Law accurately predicted that computer processing power would double about every ____.
24 months
When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.
legacy systems
For complex operations, analysts apply computer-based modeling tools that use a standard language called ____.
business process modeling notation (BPMN)
Systems analysts use a process called ____ to represent company operations and information needs.
business process modeling
A business ____ is an overview that describes a company’s overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.
profile
Which of the following is one of the main sectors of e-commerce?
B2C
____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
EDI
Transaction processing (TP) systems ____.
process data generated by day-to-day business operations
Business support systems ____.
provide job-related information support to users at all levels of a company
Knowledge management systems are called expert systems because they ____.
simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied
User productivity systems ____.
include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and high-speed Internet access
In a typical company organizational model, top managers ____.
develop long-range plans, called strategic plans, which define the company’s overall mission and goals
In a typical company organizational model, middle managers ____.
provide direction, necessary resources, and performance feedback to supervisors and team leaders
A ____, or requirements model, describes the information that a system must provide.
business model
A(n) ____ describes the logic that programmers use to write code modules.
process model
____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.
Modeling
____ methods include the latest trends in software development.
Agile/Adaptive
The ____ method of developing systems is well-suited to project management tools and techniques.
structured analysis
The ____ method of developing systems produces code that is modular and reusable.
object-oriented analysis
The ____ method of developing systems stresses team interaction and reflects a set of community-based values.
agile/adaptive
Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.
SDLC
Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.
process-centered
In the ____, like that shown in the accompanying figure, the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase in the SDLC.
waterfall model
In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.
systems planning phase
In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to build a logical model of the new system.
systems analysis phase
In the model of the SDLC shown in the accompanying figure, the purpose of the ____ is to create a physical model that will satisfy all documented requirements for the system.
systems design phase
In the model of the SDLC shown in the accompanying figure, during ____, the new system is constructed.
systems implementation
In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.
systems support and security
Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.
O-O
In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.
class
In object-oriented design, built-in processes called ____ can change an object’s properties.
methods
Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback.
spiral
When building an information system, all of the following basic guidelines should be considered except ____.
ensure that users are not involved in the development process
The ____ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.
application development
____ provides vital protection and maintenance services for system software and hardware, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.
Systems support and security
A systems analyst needs ____.
all of the above

Need essay sample on "Chapter 01"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy