Isad Practice Tests
Isad Practice Tests
1. Although programmers perform the actual coding, IT managers usually assign systems
analysts to work with them as part of a team.
True
False
2. Compiling a program using a CASE tool or a language compiler detects syntax errors, which
are language grammar errors.
True
False
3. Commercial software packages must undergo unit and integration testing similar to that of
in-house developed systems, although system testing usually is not performed.
True
False
Commercial software packages must undergo system testing similar to that of in-house
developed systems, although unit and integration testing usually are not performed.
4. The skill set required to develop documentation usually is the same as that required to
develop a system.
True
False
The skill set required to develop documentation usually is not the same as that to develop a
system.
6. Data conversion is easier when a new system replaces a manual system because all data
can be entered manually, unless it must be scanned.
True
False
Data conversion is more difficult when the new system replaces a manual system, because all
data must be entered manually unless it can be scanned.
7. To minimize the need to require information from two different systems, cyclical information
systems usually are converted using the direct cutover method at the beginning of a quarter,
calendar year, or fiscal year.
True
False
8. Phased operation is more expensive than full parallel operation because the analyst has to
work with the entire system at any given time.
True
False
Phased operation is less expensive than full parallel operation because the analyst has to work
with only one part of the system at a time.
9. The post-implementation evaluation of a system verifies that the new system meets specified
requirements, complies with user objectives, and produces the anticipated benefits.
True
False
11. ISO requires a specific development plan, which outlines a step-by-step process for
transforming user requirements into a finished product.
True
False
14. Critics of agile development often claim that because it focuses on quick iterations and fast
releases, it lacks discipline and produces systems of questionable quality.
True
False
15. Test data should contain only correct data.
True
False
Test data should contain both correct data and erroneous data and should test all possible
situations that could occur.
16. Program documentation describes the system’s functions and how they are implemented.
True
False
System documentation describes the system’s functions and how they are implemented.
17. The test environment for an information system contains copies of all programs, procedures,
and test data files.
True
False
18. The main objective of _____ is to avoid problems or to identify them as soon as possible.
application development
quality assurance
cohesion
direct cutover
19. The Software Engineering Institute (SEI) established a new model, called _____, which
incorporates software and systems development into a much larger framework.
Open Database Connectivity (ODBC) model
the Thousand-Yard Model
Capability Maturity Model Integration (CMMI)
the Department of Defense (DoD) model
Eventually the SEI established a new model, called Capability Maturity Model Integration
(CMMI)®, that integrates software and systems development into a much larger framework.
20. _____ requires that a software supplier document all testing and maintain records of test
results.
The Center for the Application of Information Technologies (CAIT)
The International Organization for Standardization (ISO)
The Software Engineering Institute (SEI)
Open Database Connectivity (ODBC)
21. _____ is the process of constructing the programs and code modules that serve as the
building blocks of an information system.
Application development
Application structuring
Application analysis
Application virtualization
22. A _____ consists of related program code organized into small units that are easy to
understand and maintain.
module
stub
decision tree
node
23. _____ graphically represent the logical rules and interaction between program modules
using a series of symbols connected by arrows.
Training plans
Simulations
Flowcharts
Acceptance tests
24. Structured application development usually involves a(n) _____, which proceeds from a
general design to a detailed structure.
test plan
top-down approach
training plan
integrated approach
25. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control
module determines which subordinate modules will be invoked.
condition
class
attribute
Method
A condition line indicates that a control module determines which subordinate modules will be
invoked, depending on a specific condition.
26. In sequence, the steps typically followed to create a structure chart are _____.
a. reviewing the data flow diagrams (DFDs); identifying modules and relationships;
adding couples, loops, and conditions; and analyzing the structure chart
b. analyzing the structure chart and the data dictionary; reviewing the data flow diagrams
(DFDs); identifying modules and relationships; and adding couples, loops, and
conditions
c. adding couples, loops, and conditions; analyzing the structure chart and the data
dictionary; reviewing the data flow diagrams (DFDs); and identifying modules and
relationships
d. identifying modules and relationships; adding couples, loops, and conditions; analyzing
the structure chart and the data dictionary; and reviewing the data flow diagrams (DFDs)
27. A class diagram includes the class _____, which describe the characteristics of objects in
the class.
attributes
events
methods
Keys
28. In _____, two programmers work on the same task on the same computer; one drives
(programs) while the other navigates (watches).
pair programming
dual tasking
driver programming
Multitasking
29. _____ is the process of reviewing program code to spot logic errors, which produce
incorrect results.
Desk checking
Cohesion assurance
Results walkthrough
Direct cutover examination
30. In addition to analyzing logic and program code, a project team usually holds a session with
users, called a _____, to review the interface with a cross-section of people who will work with
the new system and ensure that all the necessary features have been included.
function assessment
closure meeting
design walk-through
unit test
REFERENCES
https://quizlet.com/302960062/chapter-11-managing-systems-implementation-truefalse-flash-car
ds/
https://quizlet.com/517413720/4420-quizzes-flash-cards/
https://quizlet.com/671053569/chp-11-managing-system-implementation-tf-flash-cards/
https://quizlet.com/586580178/system-analysis-design-final-flash-cards/
https://quizlet.com/206747569/chapter-11-flash-cards/
https://quizlet.com/598916868/wk-4-apply-systems-implementation-flash-cards/
https://quizlet.com/282561264/chapter-11-flash-cards/
https://quizlet.com/398061454/ch-11-flash-cards/
PRACTICE TEST 2: TRANSITION AND SUPPORT
3. The main objective of training is to show users how the system can help them perform their
jobs.
True
False
4. Maintenance expense stay consistently the same during the system’s operational life.
True
False
Maintenance expenses vary significantly during the system’s operational life and include
spending to support maintenance activities.
Operational costs include items such as supplies, equipment rental, and software leases.
6. Acceptance means that nothing is done; companies usually accept a risk only when the
protection clearly is not worth the expense.
True
False
9. A continuous backup only backs up files that are new or changed since the last full backup.
True
False
A differential backup only backs up files that are new or changed since the last full backup.
10. An incremental backup only includes recent files that have never been backed up by any
method.
True
False
11. Backup media can include tape, hard drives, optical storage, and online storage.
True
False
12. When a user submits a maintenance request, the system administrator makes an initial
determination.
True
False
13. The systems support and _____ phase begins when a system becomes operational and
continues until the system reaches the end of its useful life.
implementation
verification
security
Testing
14. If significant changes take place in an existing system or if a new version is released, the IT
department might develop a _____.
user training package
user presence software
maintenance module
utility index
15. A _____ is a centralized resource staffed by IT professionals who provide users with the
support they need to do their jobs.
help desk
white spot
maintenance software module
utility point
A help desk, also called a service desk, is a centralized resource staffed by IT professionals
who provide users with the support they need to do their jobs.
16. _____ costs include expenses for items such as supplies and equipment rental.
Operational
Corrective
Maintenance
Adaptive
17. _____ expenses vary significantly during a system’s operational life and include spending to
support maintenance activities.
Secure
Maintenance
Principal
Capital
22. Many IT departments use a job title of _____ to designate positions that require a
combination of systems analysis and programming skills.
tester/programmer
strategist/analyst
programmer/analyst
designer/debugger
25. A _____ is a formal reference point that measures system characteristics at a specific time.
feature line
baseline
product point
viewport
26. To measure system performance, companies use _____, which uses a set of standard tests
on one system to compare its performance and capacity to that of other systems.
metric analysis
benchmark testing
threat analysis
allocation testing
27. _____ is the overall time between a request for system activity and the delivery of the
response.
Response time
Throughput time
Refresh rate
Base rate
28. _____ measures the time between submitting a request for information and the fulfillment of
the request.
Bandwidth
Turnaround time
Throughput
Frequency
29. _____ is a process that monitors current activity and performance levels, anticipates future
activity, and forecasts the resources needed to provide desired levels of service.
Restructuring
Capacity planning
Resource sizing
Reorganizing
30. _____ protects information from unauthorized disclosure and safeguards privacy.
Availability
Integrity
Confidentiality
Accessibility
31. _____ prevents unauthorized users from creating, modifying, or deleting information.
Availability
Integrity
Confidentiality
Evacuation
32. _____ ensures that authorized users have timely and reliable access to necessary
information.
Availability
Integrity
Confidentiality
Concealability
38. _____, a risk control strategy, eliminates risks by adding protective safeguards.
Avoidance
Acceptance
Conveyance
Transference
39. One of his firm's clients details an incident in which a hacker — a former employee —
thieved trade secrets from the client and threatened to release them to the competition if he was
not paid. In which of the following categories should George place this incident?
Vandalism
Trespass and espionage
Extortion
Software attack
During extortion, a hacker steals trade secrets and threatens to release them if not paid.
40. Another of George's clients has software that is outdated and has become increasingly
vulnerable to attack. How does George categorize this threat?
Human error
Technical obsolescence
Service failure
Espionage
When outdated software is slow, difficult to use, and vulnerable to attacks, this indicates
technical obsolescence.
REFERENCES
https://quizlet.com/555575869/csit-241-chapter-12-quiz-flash-cards/
https://quizlet.com/351497134/chapter-12-flash-cards/
PRACTICE TEST 3: DATA DESIGN
1. In a table or file, each column represents a record and each row represents a field.
True
False
In a table or file, each column represents a field, or characteristic of the entity, and each row
represents a record, which is an individual instance, or occurrence of the entity.
A primary key is a field or combination of fields that uniquely and minimally identifies a particular
member of an entity. A primary key can be based on a single field or composed of two or more
fields.
4. Field X is functionally dependent on field Y if the value of field X depends on the value of field
Y.
True
False
5. The basic elements of logical storage are alphabetic or numeric characters, such as the letter
A or the number 9.
True
False
6. Audit log files, which record details of all accesses and changes to a file or database, can be
used to recover changes made since the last backup.
True
False
7. Systems that interact with a DBMS are relatively independent of how the physical data is
maintained.
True
False
8. A secondary key is a field in one table that must match a primary key value in another table in
order to establish the relationship between the two tables.
True
False
A foreign key is a field in one table that must match a primary key value in another table in order
to establish the relationship between the two tables.
9. An M:N relationship is different from 1:1 or 1:M relationships because the event or transaction
that links the two entities is actually a third entity, called an associative entity, that has its own
characteristics.
True
False
10. College course numbers usually are assigned using a block sequence code.
True
False
11. A logical record is a set of field values that describes a single person, place, thing, or event.
True
False
12. A _____, which is a framework for organizing, storing, and managing data, consists of files
or tables that interact in various ways.
data structure
data roster
data object
data log
13. A(n) _____ is a collection of tools, features, and interfaces that enables users to add,
update, manage, access, and analyze data.
data logger framework
database management system
integrated development environment
advanced host controller system
14. _____ means that a system can be expanded, modified, or downsized easily to meet the
rapidly changing needs of a business enterprise.
Scalability
Compatibility
Cardinality
Functionality
15. Typically, a database management system is managed by a person called a _____, who
assesses overall requirements and maintains the database for the benefit of an entire
organization rather than a single department or user.
database administrator
business intelligence analyst
database consumer
big data analyst
16. A(n) _____ allows a user to specify a task without specifying how the task will be
accomplished.
procedural language
query by example language
query language
imperative language
18. A _____ controls database operations, including storing, retrieving, updating, and deleting
data.
data manipulation language
data device language
data definition language
data query language
19. The complete definition of a database, including descriptions of all fields, tables, and
relationships, is called a _____.
viewport
schema
framework
cell
20. During the systems design phase, _____ are used to organize, access, and maintain data
structures.
glossary fields
common fields
content fields
key fields
21. In the accompanying figure, a _____ is a field or combination of fields that uniquely and
minimally identifies a particular member of an entity.
primary key
secondary key
candidate key
foreign key
22. In the accompanying figure, any field that serves as a primary key is called a _____.
candidate key
secondary key
combination key
foreign key
23. In the accompanying figure, a _____ is a field in one table that must match a primary key
value in another table in order to establish the relationship between the two tables.
secondary key
candidate key
combination key
foreign key
24. If a primary key combines two or more fields, then it is called a _____.
foreign key
composite key
dedicated key
candidate key
25. A _____, which is not unique, is a field or combination of fields that can be used to access
or retrieve records.
no-frills key
super key
secondary key
foreign key
26. One type of validity check, called _____, is a set of rules that avoids data inconsistency and
quality problems.
candidate integrity
foreign integrity
referential integrity
combinatorial integrity
27. A(n) _____ is a graphical model of an information system that depicts the logical
relationships and interaction among system entities.
entity-relationship diagram (ERD)
illustration flow chart
query relationship diagram (QRD)
data chart
28. In an entity-relationship diagram, entities are commonly represented as _____.
triangles
circles
rectangles
hexagons
29. _____ describes the numeric relationship between two entities and shows how instances of
one entity relate to instances of another entity.
Scalability
Compatibility
Cardinality
Functionality
30. A common method of cardinality notation is called _____ because of the shapes, which
include circles, bars, and symbols that indicate various possibilities.
big O notation
dark resistor’s notation
crow's foot notation
hash topology notation
31. _____ is the process of creating table designs by assigning specific fields or attributes to
each table in a database.
Encapsulation
Normalization
Abstraction
Encryption
32. A _____ specifies the fields and identifies the primary key in a particular file.
frame design
table design
viewport
window
34. A table is in _____ if it is in first normal form and if all fields that are not part of the primary
key are functionally dependent on the entire primary key.
second normal form
zeroth normal form
third normal form
fourth normal form
36. Some abbreviation codes are called _____ codes because they use a specific combination
of letters that are easy to remember.
harmonic
sequence
mnemonic
rhapsodic
37. _____ is an integrated collection of data that can include seemingly unrelated information,
no matter where it is stored in the company.
A data warehouse
A data frame
Pseudo-data
Metadata
38. _____ is designed to serve the needs of a specific department, such as sales, marketing, or
finance.
A data mart
A data frame
Pseudo-data
Metadata
39. _____ is strictly hardware related because it involves the process of reading and writing
binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
Logical storage
Virtual storage
Simulated storage
Physical storage
40. _____ is the process of converting readable data into unreadable characters to prevent
unauthorized access to the data.
Encapsulation
Normalization
Standardization
Encryption
REFERENCES
https://quizlet.com/341165993/ch-9-data-design-flash-cards/
https://quizlet.com/280989742/chapter-9-flash-cards/
https://quizlet.com/172892716/ics-123-flash-cards/
https://quizlet.com/24821003/chap-9-flash-cards/
PRACTICE TEST 4: USER INTERFACE DESIGN
1. An interface designer does not need to understand the underlying business functions or how
the system supports individual, departmental, or enterprise goals.
True
False - they should think like a user and understand business functions
The interface designer must understand the underlying business functions and how the system
supports individual, departmental, and enterprise goals.
2. To develop a user-centered interface, a designer must learn to think like a user and see the
system through a user’s eyes.
True
False
3. Interface design should call for attention to the interface, rather than facilitating design
objectives.
True
False - design objectives should take precedence over the interface
User-selected help displays information about any task when the user requests it.
5. To create an attractive user interface layout and design, when the user enters data that
completely fills the field, the data must move automatically to the next field.
True
False - users should be active in their use of the interface, this doesn't follow that
principle
When the user enters data that completely fills the field, do not move automatically to the next
field. Instead, require the user to confirm the entry by pressing the Enter key or Tab key at the
end of every fill-in field.
6. Every page in a report should include a page header, which appears at the top of the page
and includes the column headings that identify the data.
True
False
7. Using batch input, data entry is performed continuously.
True
False - batch input is when info is entered on a specified time schedule (daily, weekly,
monthly, or longer
8. Sensitive data can be encrypted, or coded, so only users with decoding software can read it.
True
False
9. A combination check is a data validation rule that tests to ensure that a data item fits the
required data type.
True
False - data type check
11. Most users work with a varied mix of input, screen output, and data queries as they perform
their day-to-day job functions.
True
False
12. Human-computer interaction (HCI) describes the relationship between computers and the
people who use them to perform their jobs.
True
False
13. From a user’s viewpoint, coding is the most critical part of the system design.
True
False
From a user’s viewpoint, the interface is the most critical part of the system design.
15. All screen designs should be documented for later use by programmers.
True
False
17. A natural language feature requires users to type commands or requests in programming
code using a set of instructions and symbols.
True
False
A natural language feature allows users to type commands or requests in normal text phrases.
18. Prototypes and mock-ups can be used to obtain feedback throughout the design process.
True
False
19. In very complex systems, the prototype can become unwieldy and difficult to manage.
True
False
20. A secure system includes _____ that can log every instance of data entry and changes.
audit trails
trap trails
batch trails
control trails
21. Apple was a pioneer in user interface development, introducing the _____, complete with
mouse and screen icons, in the early 1980s.
command line interface
binary line interface
character user interface
graphical user interface
22. A user interface (UI) is the key to _____, which includes user satisfaction, support for
business functions, and system effectiveness.
testability
usability
encapsulation
abstraction
23. In older systems, often the user interface mainly consisted of _____ screens that allowed a
user to send commands to the system.
physical-control
process-control
quality-control
network-control
When developing older systems, analysts typically designed all the printed and screen output
first and then worked on the inputs necessary to produce the results. Often, the user interface
mainly consisted of process-control screens that allowed the user to send commands to the
system.
24. In a _____ system, the distinction blurs between input, output, and the interface itself.
user-centered
topology-centered
system-centered
network-centered
25. _____ describes the relationship between computers and the people who use them to
perform their jobs.
Human-computer interaction (HCI)
Peripheral component interconnect (PCI)
Media control interaction (MCI)
Peripheral connect (PC)
26. A _____ language feature allows users to type commands or requests in normal text
phrases.
normal
natural
standard
basal
27. A(n) _____ is a data validation rule that can be used for data items that must have certain
values.
existence check
validity check
batch check
reasonableness check
28. The term "_____" is familiar to IT professionals, who know that the best time to avoid
problems is when the data is entered.
good input, bad output (GIBO)
garbage in, garbage out (GIGO)
poor start, poor finish (PSPF)
weak hand, weak hold (WHWH)
29. A _____ collects input data, triggers or authorizes an input action, and provides a record of
the original transaction.
transaction document
recovery document
source document
tester document
30. In a source document, the _____ contains codes, identification information, numbers, and
dates that are used for storing completed forms.
control zone
heading zone
totals zone
authorization zone
33. For upper-level managers who often want to see total figures and do not need supporting
details, a(n) _____ is appropriate.
detail report
exception report
summary report
exigency report
Betty's lead needs to get a report of all of the purchases made only by his employees, using
their employee discount, in a given week. In which of the following folders is she likely to find
this category of report?
Exception reports
Summary reports
Detail reports
Control reports
An exception report displays only those records that meet a specific condition or conditions.
35. Betty's manager wants to see just the total sales figures without many of the supporting
details. In which of the following folders is she likely to find this category of report?
Exception reports
Summary reports
Detail reports
Control reports
36. List at least six guidelines for creating an interface that is easy to learn and use.
37. Briefly describe (including examples in your answer) at least six of the types of data
validation rules used in the input process.
● Completeness check: ensures that all required data have been entered. For instance, a
form will not be processed and will be returned to the user if any required information is
missing.
● Format check: ensures that data are of the right format (e.g., MM/DD/YYYY) or the right
type (e.g., numeric or alphanumeric). For example, numeric fields will not permit users to
type text data or the entered data must be checked to make sure it is numeric.
● Range check: used to verify that numeric data falls between a specified minimum and
maximum value. For example, rejecting birthdates prior to 1790 because people do not
live for more than 200 years.
● Validity check: ensures that data items have certain values
● Combination check: this is performed on two or more fields to ensure consistency or
reasonableness when considered together
● Sequence check: used when data must be in a predetermined sequence
39. Explain how podcasts are used for sales and marketing.
Using podcasts for sales and marketing is a way of promoting and selling a product or
service through audio content. This is where the podcaster(s) share the brand's story to reach
new audiences and promote word-of-mouth marketing. Podcasts cover a lot and a wide range
of topics and interests. Their goal, in the context of sales and marketing, is to allow brands to
tailor their content to their target audiences who have an interest in their offerings.
40. Give some examples of how the user interface continues to evolve.
One common example is the use of mobile devices, such as smartphones and tablets.
With the use of such devices, people become open or exposed to a range of gestures, such as
the difference between a tap, a long tap, and pinching in and pinching out to zoom in and out of
images, websites, and maps.
REFERENCES
https://quizlet.com/577990373/isa-387-ch-8-flash-cards/
https://quizlet.com/547504206/csit-241-chapter-8-flash-cards/
https://quizlet.com/679545806/chapter-8-flash-cards/
https://quizlet.com/198472971/systems-analysis-dr-wilson-exam-3-flash-cards/
https://quizlet.com/289048213/chap-3-14-flash-cards/
https://www.flux-academy.com/blog/introduction-to-user-interface-design-6-important-principles
https://quizlet.com/789109423/chapter-8-flash-cards/
https://www.toptal.com/designers/ui/touch-the-world-is-our-interface#:~:text=The%20evolution%
20of%20UI%20design%20can%20be%20broken%20down%20into,and%20technology%20has
%20become%20essential.