Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

System Analysis Design and Development

A comprehensive course that equips students with the skills and methodologies to analyze, design, and develop effective information systems to meet their needs.

system

analysis

design

development

requirements

modeling

architecture

prototyping

testing

implementation

maintenance

integration

documentation

user interface

scalability

List of allocated and transferred budget to project sites.

  • Operational

Which of the following classification of codes is NOT comprehensive?

  • Serial number
  • Group Classification code
  • Block codes
  • None of the choices
  • Serial number and block codes
  • Significant Code
  • Group classification code and significant code

This is an industry standard notation to represent a class.

  • ERD
  • SDLC
  • UML
  • DBMS

The purpose of parallel run is to

  • to see whether outputs of a newly computerized system matches those of currently running manual or legacy system
  • test an operational information system
  • have redundancy for reliability
  • test a system being newly designed

The software development team of TRA Global Software Company is understanding the existing system. The team is now in stage ________________________.

  • System Design
  • Requirements Determinations
  • Requirements Specifications
  • System Implementation

The last step in object oriented modelling is

  • Assign object to its collaborations
  • determine responsibilities of each object
  • develop an object interaction/collaboration graph
  • document each class

In ER Model, student, teacher, professor and school are

  • Properties
  • Relations
  • Actors
  • Entity
  • Nouns

Use Decision trees when there are many conditions to be tested.

  • TRUE

Yearly manufacturing production of quota of mobile phones.

  • Strategic

Which of the following is a control technique during input preparation?

  • Data entry validation
  • Responsive screen layout
  • Regularly saving the record
  • Account Login

Loops are allowed in DFD.

  • [No Answer]

Pie charts are normally used when

  • relative distribution of data in specified categories is to be shown
  • trends as a function of time is to be illustrated
  • it is required to illustrate geographical distribution of data
  • percent use of resources under various heads is to be shown

In UML, information hiding

  • allows improvement of modification of methods used by other objects without affecting other parts of a system
  • None of the choices
  • is a powerful programming technique because it reduces complexity
  • All of the above

Which of the following is NOT a major responsibility of a systems analyst?

  • Analyze current systems/applications used by the organization
  • Know the operation and management structure of the organization
  • Propose information technology solution through an information system that solves the requirements of an organization
  • Write programs to meet specifications

Data cannot flow from store to external entity.

  • TRUE

Given the goal, “Processed data at the fastest time within the working hours.”

  • The goal is quantified.
  • The goal is not quantified.

In a cigarette manufacturing, which of the following information is statutory?

  • Total number of cigarette ream produced in a year.
  • The total defective machines for repair.
  • List of supplies of raw materials
  • The sales tax collected.

TRUE or FALSE. The “cost of database migration service” is an intangible cost.

  • FALSE

In Entity Relationship, a tuple is

  • another term for database
  • an attribute
  • a collection of information
  • a table
  • a column of relation
  • a row of relation

A "flat file" is also called

  • 2NF
  • 1 is to Many
  • 3NF
  • 1NF
  • Many to Many

In designing a DFD, start from the broad overview of the system.

  • TRUE

It is a communication protocol used to retrieved web pages.

  • Encryption
  • Firewall
  • HTTP
  • Description
  • HTML

Which of the following printer produces poor quality of printing?

  • Ink Jet
  • Line
  • Laser
  • Dot matrix

Available stocks in the every warehouse.

  • Operational

Which of the following is used to secure an E Commerce

  • None of the choices
  • Digital certificate
  • Encryption
  • All of the choices
  • Secure Socket Layer

The following are requirements of a good code EXCEPT

  • None of the choices
  • Lengthy
  • All of the choices
  • Expandable
  • Precise
  • Meaningful

The ______ requires the operational information.

  • Line Manager
  • Top Manager
  • Middle Manager
  • All workers

A member of a class is __________________.

  • a method
  • an object instance
  • an entity
  • an attribute

A 3 NF relation is converted to BCNF by

  • dependent non-key attributes are put in a separate table
  • removing multivalued dependencies
  • removing composite keys
  • dependent attributes of overlapping composite keys are put in a separaterelation

Inheritance in object-oriented modelling can be used to

  • generalize classes
  • generalize and specialize classes
  • specialize classes
  • create new classes

In ER Model, a relationship is represented by a

  • Parallelogram
  • Diamond shape
  • Arrow lines
  • Box

When designing a system, the following are good sources of information EXCEPT ____.

  • None of choices
  • User experiences
  • Existing application system
  • Paper based forms
  • Business process
  • Electronic forms

What statutory information is expected from a school?

  • Number of school buildings for construction
  • None of the choices
  • Number of university employees
  • Number of enrollees, graduates and dropout rate

TRUE or FALSE. The “the cost of a hi-end server for application software” a tangible cost.

  • TRUE

Arlene was assigned to produce the daily progress report of service contractors. To whom will Arlene submits the reports?

  • All of the choices
  • Operational Management
  • Top Management
  • Middle Management

Develop a long questionnaire to capture all the issues and concerns on the system.

  • True
  • False

Ronnie is the IT Security Officer of the TRA Corporation. His task is to secure/protect the data and programs of the company. Which of the following action he will do?

  • Implement a biometric authentication open entering into the server room where database is located.
  • Create a mirror copy of the data and system
  • Make a regular backup copy
  • None of the choices
  • All of the choices
  • Implement physical locks

The following are entities EXCEPT

  • Volunteer & Officer
  • None of the choices
  • Officer
  • Collect & Conduct
  • Monthly
  • Collect
  • Conduct
  • All of the choices
  • Volunteer

Which of the following classification of codes is NOT expandable?

  • Significant Code
  • Serial number and block codes
  • Group Classification code
  • Serial number
  • Block codes
  • Group classification code and significant code
  • None of the choices

TRA Global Software Company was contracted to develop a system that would track the procurement process of XYZ Corporation. The Procurement Manager of XYZ Corp had identified several applications encompassing the proposed procurement system to TRA Global Software Company. At what stage of the software development cycle is this activity?

  • Feasibility Analysis
  • Requirements Determinations
  • System Implementation
  • Systems Design
  • Requirements Specifications

TRUE or FALSE. Use Structured English when there are large number of conditions to check and logic is complex.

  • True
  • False

Decision trees are drawn _________________

  • After the system analysis stage
  • Right to Left
  • Top to bottom
  • Depending on the complexity of the problem
  • Left to Right

Conditions need always to be BINARY.

  • FALSE

John is estimating the cost and benefit of the proposed procurement system. At what stage of the software development cycle is this activity?

  • Systems Design
  • Requirements Specifications
  • System Implementation
  • Requirements Determinations
  • Feasibility Analysis

Errors are found in an operational information system will result to

  • redesigning the system
  • lost of trust in the IS
  • report to the programmers
  • system shutdown

A rectangle represents

  • An input or output of the system
  • An external entity
  • A data storage
  • Start of the DFD

Deficiencies in a system are pinpointed by identifying

  • Poor operation
  • Missing function and excessive cost of operation
  • Poor management and poor operation
  • Excessive cost of operation
  • All of the choices
  • None of the choices
  • Missing function
  • Poor management

Aldrin is the Systems Analyst of the company. As a System Analyst, he need to ensure logs are kept, who did in critical data entry and processing. What does Aldrin need to implement?

  • An Audit Trail
  • None of the choices
  • Inventory of records
  • Backup and save all the tables

Jonathan is the Report Designer of the TRA Corporation under System Department. He is tasked to design reports of the newly developed web application system. Which of the following he need to consider in his design?

  • Volume of the report
  • All of the choices
  • Purpose of the report
  • User of the report
  • Frequency of the report

Relationships are identified from the word statement of a problem by

  • picking words which are adjectives
  • picking words which are pronouns
  • picking words which are verbs
  • picking words which are nouns

A data element in a data dictionary may have

  • only decimal value
  • no value
  • only whole number in value
  • only positive value

Why is there a need to control in information system?

  • Information system took time to design. Redesigning the system will took a time to redevelop.
  • To comply with the technology requirement of the company.
  • To prevent virus attack
  • Information system stores large volume of data.

A circle in a DFD represents _____.

  • An entity
  • A process
  • A storage
  • Start of the process

George is assigned present a report in a management meeting to be attended by school directors of different university campuses. Which of the following is the best report he need to present?

  • All of the choices
  • Summary report of number of enrollees in every campus
  • List of names of students enrolled in every campus
  • Summary report of number of enrollees in every campus per course

Aldrin want to conduct a testing of the developed information system together with the manual system using live data. What kind of testing Aldrin will conduct?

  • Parallel Test
  • Full Testing
  • Pilot Testing
  • System Testing

By ______________ we mean ability to manipulate objects of different distinct classes knowing only their common properties

  • Abstraction
  • Inheritance
  • Encapsulation
  • Polymorphism

A subsystem of a complex system must specify

  • with which subsystems it co-operates
  • how it performs a task
  • what task it performs
  • how it co-operates with other systems

Designing screens uses principles

  • which are unique
  • similar to those used for printed reports
  • different from those used for printed reports
  • which are well specified

John is one of the System Analysts of TRA Global Software Corporation. Which of the following manners should he observe during the interview?

  • Set a time limit for the interview
  • Request to record the interview
  • Ask questions to the interviewee after every topic
  • All of the choices

In the ER Diagram, normally entities are

  • None of the choices
  • Adjective
  • Verbs
  • Nouns

Who uses the report for tactical management?

  • Top Management
  • Operational Management
  • Middle Management
  • All of the choices

This is acomputer-to-computer exchange of business documents in a standard electronic format between business partners.

  • HTML
  • Email
  • EDI
  • XML

Entities are represented by

  • Rectangle
  • Circle
  • Diamond
  • Ellipse

__________ may include increased sales due to improved customer services or to managers having better information on which to base decisions.

  • Tangible savings
  • Tangible benefits
  • Intangible benefits
  • Cost/Benefit Analysis

Which of the following is a representation of flow of information?

  • DFD
  • Use Case
  • OD
  • UML

Who among the following should be interviewed at the start of the project?

  • Rank in File Staff
  • Supervisors
  • Senior Manager

In DFD, the symbol use to represent a data store is

  • An Ellipse
  • A cylinder
  • Parallel lines
  • A square box

Aldrin is the web developer of TRA Corporation. He is created a website a university. He store the html files under the folder name students including the home page html file. Which of the following address will be the valid home page of the university?

  • http://myuniversity.edu/students.home.html
  • http://myuniversity.edu/home.html folders are not displayed on the address
  • http://myuniversity.edu/students/home.html
  • http://myuniversity/students/home.html

If a DFD is too detailed it will have too many data flows and will be easy to understand.

  • If a DFD is too detailed it will have too many data flows and will be easy to understand.
  • Answer:
  • FALSE

TRUE or FALSE. The “personnel cost” is a tangible cost.

  • TRUE

Hiding implementation details of methods from outside world.

  • Polymorphism
  • Encapsulation
  • Inheritance
  • Abstraction

Ronnie is the IT Engineer of the TRA Global Software Company. He identified the type of server, desktop computers needed to implement the proposed information system. What stage is the software development in?

  • System Implementation
  • Hardware Study
  • Server inventory Stage
  • Server installation and implementation

Data cannot flow from process to external entity.

  • FALSE

Which of the following is NOT a disadvantage factor of E Commerce?

  • EDI
  • Security of internet
  • Privacy of data
  • None of the choices

Which of the following is BEST for checking for completeness?

  • Decision Table
  • Any of the choices
  • Decision Trees
  • Structured English

The goals of the project are set

  • Before data gathering
  • During data gathering
  • After data gathering
  • Anytime within the SDLC

In Entity Relationship, the Employee number, Gender, Salary are examples of

  • Cardinality
  • Entity
  • Attributes
  • Tuples
  • Relationship

The ___________ tag is used to link a web page to another page.

  • Open tag
  • Anchor tag
  • Connect tag
  • Link tag

Which of the following statements is INCORRECT with respect to a Data Dictionary?

  • Data dictionary and data source both are the same
  • It is a repository of the elements in a system
  • None of the choices
  • Is important documentation which would be useful to maintain a system

In this stage, glitches of the system are being identified.

  • System Implementation
  • Systems programming
  • System evaluation
  • Systems Maintenance
  • Systems Design

Objects with similar meaning and purpose grouped together as ____________.

  • Method
  • Attribute
  • Class
  • Model

TRUE or FALSE. A decision table is said to be complete if it has at least 2 possible distinct elementary rules.

  • True
  • False

The goal of this stage is to assess if it is possible to meet the requirements specified, subjected to constraints of budget, human resource and hardware.

  • Systems Design
  • Feasibility Analysis
  • System Implementation
  • Requirements Determinations
  • Requirements Specifications

Buttons which can be clicked using a mouse are placed in screens as

  • they are convenient to use
  • it is the modern trend
  • large number of buttons can be used
  • using a keyboard is error prone

During data gathering, interviews are conducted for the purpose of _____.

  • Familiarization of the data processing
  • Initial introduction of the system requirements
  • Gathering of input and output forms
  • Presentation of the proposed information system

Computer systems are designed by

  • breaking of the system into smaller self-contained co-operating subsystems
  • simplifying requirements of system
  • breaking up the systems into independent parts
  • modular design

The _____________________ is where user presented several alternatives and asked to type his/her choice.

  • textbox
  • screen
  • keyboard
  • menu

HTML can be read by a text editor.

  • True
  • False

TRUE or FALSE. The for keyword is a loop structure.

  • True
  • False

Web@AT Corporation is newly established software company. Mr. Ang want to have a fast and reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast connection.

  • Check the telephone line if capable of DSL connection
  • Upgrade the company server.
  • Connect Mr. Ang computer to the server.
  • Request subscription fee to the Account Office.

This is a process of accessing state without changing value.

  • Data upload
  • Query
  • Indexing
  • Migration

Research and Development department is developing new product models to increase sales.

  • OPERATIONAL

Use ___________________ to attach EDI forms to e-mail messages

  • MIME
  • DTD
  • XML
  • VAN

The versions of IP address that coexist in the internet are _______________ and ____________.

  • Version 4 & 6
  • Version 1 & 5
  • Old and New
  • Version 6 & 10
  • Version 3 & 5

In Entity Relationship, the Student number, Course, Date Enrolled, Gender are examples of

  • Entity
  • Tuples
  • Attributes
  • Cardinality
  • Relationship

Aldrin is the network engineer of the TRA Corporation. TRA Corporation has offices in Cebu, Iloilo and in Davao. As a network engineer, he need to connect the LAN of different offices to the main office in Makati City. What computer hardware network equipment he need to use to connect these offices.

  • Router
  • Internet
  • ISP
  • Switch
  • Wireless
  • Cable

List of volunteers in every barangay.

  • Operational

A data flow diagram

  • Starts from a broad overview and expand it to a hierarchy of detailed diagrams
  • None of the choices
  • Provides attributes of the external entities
  • Is a good communication tool between Systems Analyst and Head of the company requesting for the systems development.
  • All of the choices

A firewall is used in a system connected to a wide area network to

  • prevent spread
  • to extinguish fire spreading via network cables
  • to scan for viruses in files
  • prevent unauthorized access by hackers

Information System is being tested as a whole system. What kind of testing is being conducted?

  • Full Testing
  • Parallel Test
  • System Testing
  • Pilot Testing

Provides overview of the system to be designed.

  • Context Diagram
  • Relational Diagram
  • None of the choice
  • Procedural Diagram

In a DFD, a process is represented by a

  • Circle
  • Ellipse
  • Rectangle
  • Parallel lines

What is the best printer to use when printing multiple copies with carbon paper?

  • Dot matrix
  • Ink Jet
  • Line
  • Laser

A _________________ DFD is similar to a document flow diagram.

  • Relational
  • Physical
  • None of the choices
  • Logical

Questionnaires can be useful in information gathering when users ____.

  • Are widely distributed geographically
  • Are not well informed
  • Do not have time for interviews
  • All of the choices

This system is unstructured and difficult to obtain precise information.

  • Management Information System
  • None of the choices
  • Decision Support System

What stage should be completed before the training of users on how to operate the information system be conducted?

  • System Implementation
  • SystemsTurnover
  • Systems Design
  • Systems Maintenance

Marketing techniques of school branches and providing incentives to the best performing branch.

  • Tactical

This is a computer-to-computer exchange of business documents in a standard electronic format between business partners.

  • Email
  • EDI
  • HTML
  • XML

It is a combination of permutation and substitution on blocks of 64 bits. A message is broken up into 64 bit blocks and each block is separately encrypted.

  • HTML
  • SES
  • XML
  • EMS
  • DES

Which of the following is an entity

  • None of the choices
  • Programmer & Employee
  • Programmer
  • Sell
  • All of the choices
  • Sell & Visit
  • Visit
  • Employee

Large detailed reports are highly structured.

  • The statement is incomplete to identify if it is TRUE or FALSE.
  • The statement is FALSE. Replace large detailed reports with moderately structured.
  • The statement is TRUE.
  • The statement is FALSE. Replace highly structured with structured.

Who among the following uses reports for strategic management?

  • Middle Management
  • Supervisors
  • Operational Management
  • Rank in File
  • Top Management

An instance of an object is created by a

  • constructor operation
  • open operation
  • update operation
  • query operation

Aldrin is the Sr. Programmer of TRA Global Software Company. He received the list of modules to be fixed. He is now debugging the system. The software development is in ___________________.

  • System evaluation
  • System Implementation
  • Systems Design
  • Systems modification

This is the address of the web page on the internet.

  • HTML
  • URL
  • XML
  • DTD

DFD stands for _____________

  • Data File Diagram
  • Data Flow Diagram
  • Direct File Direction
  • Disk Flow Direction

Which of the following tell about Triple DES?

  • 3 & 5
  • 2 & 4
  • 1, 2 & 5
  • 1, 2 & 4

This is the technique for breaking a code, given samples of encrypted messages

  • EncryptLog
  • CodeBlast
  • Cryptanalysis
  • CodeExplode

This is a set of procedures that manage a database and provide application program access the database in a form requested by the application programs.

  • Flowcharting
  • ER Process Diagram
  • DMBS
  • Information System

Each row in a table contains a

  • Member of the entity set
  • All of the choices
  • Methods
  • Attributes

In a ______________ Key Encryption transmission of key without compromising is not easy.

  • Private
  • Universal
  • Global
  • Public

The Answer

  • Question text

For interactive data input, customized screens are designed for easy data entry. Errors in data entry are instantly detected by a ________________ during data entry and can be immediately corrected.

  • desktop computer with high specifications
  • database operator
  • validation program
  • high speed internet connection

To model an information system using objects the requirements specification is examined and all _____________ in it are picked as potential operations.

  • Phrases
  • Nouns
  • Verbs
  • Class

New classes are created from current classes by using the idea of _____________.

  • Polymorphism
  • Encapsulation
  • Abstraction
  • Inheritance

What are the two methods of business processing?

  • On-Line Transaction and Batch Processing
  • Online and Offline
  • Managers and Rank and File processing
  • Client and Server Data Processing

This gives a single point reference of data repository of an organization.

  • System Requirement Specification
  • Documentation
  • Data dictionary
  • None of the choices
  • Data Flow Diagram

Each column in the relation corresponds to _____________

  • An attribute of the entity
  • Data of the entity
  • Entity set
  • Records

EDIFACT standard was developed by

  • International Standard Institute
  • American National Standard Institute
  • United Nations Economic Commission for Europe
  • European Common Market

A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be detected during operation.

  • System Testing
  • Full Testing
  • Pilot Testing
  • Parallel Test

Diamond shape is represented by

  • Relationship
  • Process
  • Data Entity
  • Entity

Data dictionary may be used to eliminate redundancy.

  • FALSE
  • TRUE

This is concerned with the quality and reliability of raw as well as processed data.

  • Data Security
  • Data Privacy
  • Data Piracy
  • Data Integrity

What is the most important and difficult task of a Systems Analyst?

  • Interview the end user of the system
  • SRS development
  • Interview the top management
  • Data Gathering

Each computer connected to the internet must

  • be internet compatible
  • be an brand hi end personal computer or laptop
  • have a modem connection
  • have a unique IP address

Mr. Reyes is the Strategic Manager of the company. In the management meeting, he needs to present the _____________________________.

  • Day to day policies of the company
  • Long term plan of the company
  • Improvement plan of the company
  • All of the choices.

Decision table includes

  • Actions, conditions, possibilities
  • Conditions
  • Actions and conditions
  • Rules
  • Possibilities
  • Actions
  • All of the choices

Relationship are normalized to ensure that

  • Simplifies retrieval of required data
  • Collection of relations do not unnecessarily hold duplicate data
  • All of the choices
  • When data is deleted accidentally, required data is not deleted
  • When a data item is modified it is modified in all relations where it appears no inconsistency is there
  • None of the choices

Which of the following is a quantified goal?

  • Report Submission should be regularly
  • Report submission should be made every 30th day of every month
  • Report submission should be made every 30th day of every month and report should cover municipalities with 4th and 5th income class
  • Report Submission should be regularly and report submission should be made every 30th day of every month
  • Report should cover municipalities with 4th and 5th income class

Detailed enrollment list and Grade sheet are reports needed by

  • Top Management
  • Operational Management
  • Middle Management
  • All of the choices

At the end of the feasibility analysis,

  • a meeting should be set to discuss the hardware component of the system
  • a document consisting of an executive summary on the feasibility of the project is submitted to the management which requested the study.
  • systems development will start
  • a prototype of the system will be presented to the management which requested the study

In evaluating alternative solutions, the methods must be technically, operationally and Answer

  • [No Answer]

This is a potential threat wherein an interruption in an authorized user's access to a computer network.

  • Virus
  • All of the choices
  • Denial of Service
  • Spyware
  • Worm

What is the most important role of a systems analyst in business?

  • What is the most important role of a systems analyst in business?
  • Select one:
  • Specialized in programming technology
  • Problem solving
  • Knowing what data needs to be collected
  • Technical understanding of information systems

This tool uses a simple stick figure. The simple stick figure is used to represent an actor and is given a name that characterizes the role that the actor is playing.

  • DFD
  • Use Case
  • UML
  • OD

This is concerned with protecting data from erasure, theft, unauthorized access and unauthorized modifications.

  • Data Security
  • Data Integrity
  • Data Privacy
  • Data Piracy

Which of the following is NOT an advantage of using decision table?

  • Allows systematic creation of test data
  • Easy detection of program error
  • Simple representation of complex decision rules
  • Good documentation of rules in data processing

If the process p is expanded, the process at the next level will be labeled as

  • 1.0, 2.0, 3.0
  • p.a, p.b, p.c
  • None of the choices
  • p.1, p.2, p.3

This method of top down analysis and breaking down DFDs to give more and more detail is known as splitting.

  • FALSE

The first step in object oriented modelling is

  • Find objects and their classes
  • Identify operations performed on the attributes
  • List all the methods
  • Identify attributes

TRUE OR FALSE. Cost-benefit analysis ensures that an information system is developed at minimum cost.

  • FALSE

Data gathering for system analysis can be done in ________.

  • Several interviews and group discussion
  • Two interviews
  • One interview
  • Continuous throughout the SDLC

Processing the college entrance exam in a university every year is an example of

  • Batch Processing
  • Real time processing
  • OLTP
  • None of the choices

TRUE or FALSE. For every condition, there should only be 2 actions.

  • True
  • False

Structured English and Decision Table are procedural.

  • FALSE

One entity may be

  • related to only two other entities
  • related to many other entities
  • related to only one other entity
  • related to itself

Given employee (employee number, salary, department code, supervisor code). What is the unique relation key.

  • Employee number
  • All of the choices
  • Supervisor code
  • Department code

Each statement in DTD declares the element of HTML language.

  • True
  • False

The current version of HTML is _______________.

  • Version 5
  • Version 6
  • Version 7
  • Version 4
  • Version 2010

Page footing is

  • the labels printed at the end of each control group
  • same as report heading
  • the labels printed at the end of each page
  • the labels printed at the end of a report

E-R Model has the ability to describe

  • 1 to 1
  • Many to Many
  • 1 to Many
  • All of the choices

A data dictionary is usually developed

  • when data flow diagram is developed
  • after designing the database
  • during data gathering stage
  • during feasibility analysis

External entities can process data.

  • FALSE

BoyeCodd Normal Form (BCNF) is needed when

  • there are two possible keys and they are dependent on one another
  • there is more then one possible composite key
  • there are two or more possible composite overlapping keys and one attribute of a composite key is dependent on an attribute of another composite key
  • two non-key attributes are dependent

To use a ________, a ___________ model of data needed for current and future applications is designed. ___________ modelling is useful for this.

  • DBMS, conceptual, Entity Relationship
  • Conceptual, DBMS, Entity Relationship
  • DBMS, Entity Relationship,conceptual
  • Entity Relationship, DBMS, conceptual,

In DFD, a pair of parallel lines represents ______.

  • Start of the process
  • A process
  • An entity
  • A storage

In a hotel information system, this type of information is strategic.

  • Putting up a restaurant and bar
  • Approved license permit on health sanitation
  • Increase number of hotel staff
  • Data on hotel reservations

It is also known as information hiding.

  • Inheritance
  • Abstraction
  • Polymorphism
  • Encapsulation

Ana is the Procurement Manager of XYZ Corporation. TRA Global Software Corporation had started the data gathering for XYZ Corporation. Ana has informed TRA that they have an existing running application system. What is the next step the TRA should do?

  • Analyze the existing application system.
  • Design an updated information system using new programming technology.
  • Interconnect the existing and new application system.
  • Recommend to XYZ Corporation to set a cutoff on using the existing application system.

Page footing refers to which of the following?

  • the labels printed at the end of a report
  • the labels printed at the end of each page
  • same as report heading
  • the labels printed at the end of each control group

In ____________ data entry, batches of data are formed and entered. They are checked by a validation program and the corrected records are stored in a file.

  • On-line
  • Off-line
  • Mobile
  • Real-time

To reduce errors in input, it is essential to ______________.

  • upgrade the desktop computer used for entering data.
  • carefully design the forms used for entering data.
  • migrate the system to online mode.
  • hire a new employee.

Which of the following is an OPTIONAL when designing reports?

  • Important items should be easy to find in the report
  • Use of page and report footer
  • All of the choices
  • All columns must be labelled
  • Report should be able read left to right and top to bottom

TRA Global Software was contracted to develop the procurement process of the XYZ Corporation. Arlene is the assigned Systems Analyst of the proposed project. The proposed system will interface at different department of the organization (Procurement, Accounting, Finance and Administrative) Which of the following is NOT a characteristics of a goal of the project that Arlene need to consider?

  • Must be quantified
  • None of the choices
  • Broken into sub-goals
  • Realized with constraints of the organization and the system
  • Agreeable to the lead department (Procurement)

Which of the following is NOT a recommended technique during interview?

  • Allot a whole data interview
  • In order that the client understand the proposed system, use IT/jargon terms.
  • All of the choices
  • Gather only quantitative data

Which of the following can be used to present reports to Top Management?

  • Pie Chart
  • All of the choices
  • Map
  • Bar Graph

Jonathan is the programmer of the TRA Global Software Company. He is currently developing the modules of the information system. What stage is the software development in?

  • Systems Specifications
  • Systems Design
  • Systems Modification
  • System Implementation

Which of the following is NOT included in the SRS document?

  • Project scope
  • Non Functional requirements
  • Functional requirements
  • Programming Codes
  • Project limitations

Objects also promote their reuse in many systems.

  • True
  • False

For large volume output and multiple copies, what type of printer you need to use

  • Dot matrix
  • Line
  • Ink Jet
  • Laser

TRA Global Software Company had developed the SRS and XYZ Corp. had approved the document.

  • System Implementation
  • System Evaluation
  • Systems Design
  • Final Specifications

Given the IP address, 192.168.1.10 and 192.168.1.100. Are the IP addresses in the same network?

  • True
  • False

The _____________________ is a catalogue of all data used in an application, their names, type and their origin.

  • Data dictionary
  • None of the choices
  • System Requirement Specification
  • Documentation
  • Data Flow Diagram

Which of the following classification of codes is NOT concise?

  • Serial number and Block codes
  • Significant Code
  • All of the choices
  • Block codes
  • Group Classification code
  • Serial number
  • Group Classification code and Significant Code
  • None of the choices

A ____ mark in the decision table means that an action must be taken.

  • Y
  • Any character
  • Check
  • X

This is a standards used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet. These is being used by computer to send data over the internet.

  • Router
  • http
  • LAN
  • Internet Protocol
  • World Wide Web
  • Switch

Middle Managers use

  • Strategic
  • Tactical
  • Operational
  • Statutory

This is the address of a web page on the internet.

  • URL
  • HTML
  • XML
  • DTD

Mr. Cruz, the IT Manager, has developed a 10 year IT plan. This plan will be used as a reference in building the IT department. What type of information did Mr. Cruz develop?

  • Strategic
  • Operational
  • Statutory
  • Tactical

Report showing the completed, on-going and not yet started projects.

  • Operational

IP addresses are converted to

  • binary string
  • hexadecimal string
  • phanumeric string
  • hierarchy of domain names

Entities are identified from the word statement of a problem by

  • picking words which are verbs
  • picking words which are pronouns
  • picking words which are nouns
  • picking words which are adjectives

Mr. Yu wants to have a report on the number enrollees in all university campuses. This will be used for analyze in putting up a new campus. Mr.Yu is in the _________________.

  • Middle Management
  • Top Management
  • All of the choices
  • Operational Management

Which of the following does NOT considered as potential threats to security of the Information System?

  • Natural disasters
  • Hacking
  • All of the choices
  • Disk crashes
  • File wipeout/theft by unauthorized users
  • None of the choices

Let the interviewee do most of the talking.

  • True
  • False

Which of the following describes DFD?

  • All of the choices
  • preliminary step to create an overview of the system
  • DFD specifies which entities generate documents
  • DFD has entities and data flows

The ______________ data entry is suitable if the number of records is very large.

  • Off-line
  • Mobile
  • On-line
  • Real-time

This is concerned with protecting data regarding individuals from being accessed and used without the permission/knowledge of concerned individuals.

  • Data Piracy
  • Data Integrity
  • Data Security
  • Data Privacy

A query operation on an object

  • is not allowed
  • has no side effects
  • has side effect
  • changes the state of an object

These are used for formatting and creating links from one webpage to another.

  • Markups
  • All of the choices
  • Tags
  • Special annotations
  • None of the choices

Functions and procedures are

  • Functions and procedures are
  • Select one:
  • not useful in designing computer systems
  • have side effects which require special care if they are used as subsystems
  • old fashioned and they are not useful
  • useful in designing computer systems

This acts on behalf of all users of an organization wanting to use the internet.

  • Server application
  • Web application
  • Proxy application gateway
  • Internet Application Protocol

Identify whether the type of information is Strategic, Tactical, Operational or Statutory

  • Operational

The main models of interactive data input are

  • Menus, Templates, Commands
  • Online, Off-line, Batch
  • Keyboard, Mouse, monitor
  • Forms, Reports, Data

What is metadata?

  • Retrieval of data
  • Data about data
  • Flow of data
  • Types of data
  • Manipulation of data

In the E commerce, a customer sends an order over the internet.

  • Order need to be decrypted
  • Order need to be encrypted
  • Order need to be compressed
  • Order need to be submitted in the website

This is an industry standardnotation to represent a class.

  • DBMS
  • ERD
  • SDLC
  • UML

Which of the following is the best hierarchy of design of a report?

  • Detail lines, Report heading, Page heading, Control heading,
  • Report heading, Page heading, Control heading, Detail lines
  • Page heading, Report heading, Control heading, Detail lines
  • Control heading, Report heading, Page heading, , Detail lines

After encryption, a transformed data is also known as

  • Plain text
  • None in the choices
  • Cipher text
  • Hyphernym text

This ________________ is a procedure used to transform a set of relations into another set which has some desirable properties.

  • Normalization
  • Migration
  • Indexing
  • Export Transport Load

Which of the following does NOT describe Structured English?

  • Structured English is similar to Pascal programming
  • Structured English should be written or follow the programming syntax rules and convention
  • Structured English should be understandable to the user
  • Structured English shows decision structure

A relation is said to be in BCNF when

  • it has overlapping composite keys
  • it has no overlapping composite keys which have related attributes
  • it has no composite keys
  • it has no multivalued dependencies

The objective of using structured English is to

  • develop algorithms corresponding to processes in a DFD
  • ease writing programs for DFDs
  • expand a DFD so that a user can understand it
  • describe computational procedures reasonably precisely which can be understood by any user

George is the Systems Analyst of the TRA Global Software Corporation, the company was contracted to develop a hotel information system. George is assigned to conduct an information gathering. Which of the following should George not avoid during the information gathering stage?

  • Schedule the interview.
  • Ask for a copy of all documents related to the system.
  • None of the choices
  • Discuss the proposed system.
  • Ask for a copy of all documents related to the system and discuss the proposed system.
  • Conduct the interview to staff and managers individually and discuss the proposed system.
  • Conduct the interview to staff and managers individually.
  • All of the choices
  • Make a list of questions to be asked.

Two data stores cannot be connected by a data flow

  • TRUE

In the feasibility analysis stage of the SDLC, which of the following activity comes next after setting the goals?

  • Find alternative methods of meeting the goals
  • Start the development stage
  • Convert the goal to data flow diagram
  • Create a proto type of the system and present to the company

Line and dot matrix printers are examples of

  • Heavy duty Printers
  • Fast Printers
  • Impact Printers
  • Non-Impact Printers

A __________ Key Encryption eliminates the key distribution problem

  • Public
  • Universal
  • Private
  • Global

This is needed to find economic feasibility of proposed solution.

  • Income Expenditure Analysis
  • Financial Management
  • Accounting & Budget Analysis
  • Cost-Benefit Analysis
  • Work and Financial Analysis

Grade sheets and product list are reports needed by

  • Top Management
  • All of the choices
  • Middle Management
  • Operational Management

Aldrin want to conduct a testing of the developed information system together with the manual system using data used from manual system to test system when it is first implemented. What kind of testing Aldrin will conduct?

  • System Testing
  • Pilot Testing
  • Full Testing
  • Parallel Test

The process of unscrambling the message is called

  • Encryption
  • Decryption
  • Extraction
  • Compression

SRS is developed by ________.

  • the systems analyst
  • All of the choices
  • the top and midlevel managers where it discusses information management.
  • the end user or the system owner

What is the correct Structured English of the following problem?

  • if student year = 1
  • if course = BSIT
  • else discount = 50%
  • endif
  • else
  • discount = 10%
  • if student year = 1 AND course = BSIT
  • then discount = 50%

Two corporate intranets may be interconnected using a leased line from PSTN -such a network is called __________

  • Wireless Network
  • An extranet
  • LAN
  • An internet

UML stands for

  • User Management Library
  • User Multi Language
  • Universal Modelling Language
  • Uniform Modelling Library

Which is the most important attribute of a systems analyst?

  • very good writing skills
  • very good flow charting and modelling language
  • excellent in web programming skills
  • very good server administration

This is a model used in project management that describes the stages involved in the development of a project starting from the feasibility study through the maintenance and enhancement of the system.

  • Software Coding
  • SDLC
  • Conceptual Model
  • Prototyping

This is the stage wherein user testing is being conducted.

  • System Implementation
  • Systems Maintenance
  • Systems programming
  • System evaluation
  • Systems Design

In the ER Diagram, relationships are

  • Adjective
  • None of the choices
  • Verbs
  • Nouns

Logical operators are used in constructing a Structured English, which of the following is not a logical operator?

  • NOT
  • AND
  • OR
  • None of the choices
  • IF

Mr. Ang wants to have a report on the number enrollees in all university campuses. This will be used for analyze in putting up a new campus. Mr. Ang is in the _________________.

  • All of the choices
  • Middle Management
  • Operational Management
  • Top Management

Which of the following classification of codes is NOT precise?

  • Group Classification code
  • None of the choices
  • Serial number
  • Significant Code
  • Block codes

Control in design of an information system is used to

  • inspect the system and check that it is built as per specifications
  • ensure privacy of data processed by it
  • ensure that the system processes data as it was designed to and that the results are reliable
  • protect data from accidental or intentional loss

When sending data from the source to destination, the message is ____________.

  • compressed using .zip
  • broken up into packet
  • none of the choices
  • converted to ip address during sending

Ronnie want to protect his data when sending from the main office to the branch office.

  • File compression either zip or rar
  • Encryption
  • Decryption
  • Firewall

Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative website. He wants to use user defined tags. What markup language he will use?

  • XML
  • SGML
  • UDML
  • HTML

Picking necessary operation and attributes to specify objects.

  • Encapsulation
  • Polymorphism
  • Abstraction
  • Inheritance

Organizational measures in control mean

  • assignment of appropriate responsibilities to individuals in data processing in an organization
  • a set of well organized methods
  • proper organization of data
  • creation of an organization for controlling system

In a DFD, a line with arrow represents _______.

  • Direction of data entry
  • Flow of data
  • Control flow
  • Direction of data retrieval

TRUE or FALSE. The “cost of delay in data processing” is an intangible cost.

  • TRUE

Data can flow from process to process

  • TRUE

In the analysis a system of the proposed system, The time spent by XYZ Corporation office staff to perform a task

  • is an indirect cost
  • Need to be reimbursed to the TRA Software Global Software
  • Need to be charge to the company expenses
  • is a direct cost

By auditing around the computer we mean

  • the inputs and the corresponding outputs are compared and checked for correctness
  • the programs and procedures are checked for correctness
  • programs are written to check the functioning of the computer har
  • special synthetic data is input and outputs checked for correctness

An advantage of symmetric key is easy and fast transformation of plain text to cipher text.

  • True
  • False

Keep the number of processes at each level ____.

  • None in the choices
  • One
  • Less than 7
  • Minimum of 7
  • Zero

Audit in the design of information system is used to

  • protect data from accidental or intentional loss
  • ensure privacy of data processed by it
  • ensure that the system processes data as it was designed to and that the results are reliable
  • inspect the system and check that it is built as per specifications

In object modelling, special properties of objects are

  • methods, attributes, classes
  • entity, relationship, attributes
  • encapsulation, inheritance and polymorphism
  • none of the choices

Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an informative website. He wants to use user defined tags.

  • XML
  • HTML
  • SGML
  • UDML

Which of the following is INCORRECT?

  • Firewall with a proxy function replaces the source address of transaction requestor with its own IP address
  • Firewall with proxy agent only implemented when FTP & TELNET service and not to HTTP.
  • All statements are CORRECT
  • IP Address of the organization are hidden when implementing firewall with a proxy function

Given the DFD below:

  • None of the choices are correct.
  • The DFD is incorrect, the symbol of customer and billing system was interchanged.
  • The DFD is incorrect, data flow violated the rule of 1 input 1 output
  • The DFD is incorrect, the arrow lines are not in order
  • The DFD is incorrect, there should be a data store in the diagram
  • The DFD is correct.

Which of the following why there is a need for codes?

  • For unique identifier and for cross referencing between applications
  • All of the choices
  • For cross referencing between applications
  • For unique identifier
  • None of the choices
  • For efficient storage and retrieval

Given the email address, [email protected], what is the domain?

  • @
  • amauonline
  • Inquiry
  • .com

As a guideline in DFD, nouns are used to name an external entity.

  • TRUE

Ferdie is the Systems Analyst of the TRA Global Software Company. He needs to document the complex decision logic. What tools does he need to use?

  • Truth Table
  • Decision Flow Chart
  • Decision Table
  • Logic Table

The while keyword is a selection structure.

  • FALSE

An example of non-impact printer

  • Dot Matrix
  • Ink Jet
  • Laser & Ink Jet
  • All of the choices
  • Ink Jet & Line
  • Line
  • Laser

Which of the following is BEST in sequencing conditions by priority?

  • Decision Table
  • Structured English
  • Decision Trees
  • Any of the choices

Systems Analyst used DFD as a tool in designing a system. DFD stands for ______.

  • Data Flow Diagram
  • Data Flow Design
  • Document Flow Design
  • Document Flow Diagram

A matrix showing the attended and needed trainings of every employee per work category.

  • Tactical

A relationship is in 2NF if,

  • If duplicate tuples exists
  • It is in 1NF
  • If there are only 2 attributes
  • If key attributes is independent on composite attribute

A decision table should be used

  • When designing prototype
  • To guide the project manager during the SDLC phases
  • None of the choices
  • When set of rules on conditions with action that needs to apply
  • When normalizing the data
  • All of the choices
  • To document all conditional statements

Which one of the following statements is FALSE about data dictionary?

  • Updating the data elements means modifying the data dictionary
  • The data analyst normally maintains the data dictionary.
  • None of the choices
  • Data dictionary contains the name and description of each data element

Which of the following is a valid ER Diagram?

  • Question text

The ER diagram is interpreted as follows:

  • A Manager may supervise up to N employees; Some Managers may not supervise any employees
  • A Manager supervises exactly N employees
  • A Manager supervises upto N employees
  • A Manager will superviseemployees based on some conditions

Refer to the diagram below and identify the stages of the software development life cycle.

  • *System prototyping, **system testing, ***system implementation
  • *System Analysis, **system implementation, ***system training
  • *Feasibility Analysis, **system implementation, ***system evaluation
  • *System Interview, **system implementation, ***system training

This is processing control that is use to check intermediate results in long and complex calculations.

  • Check points
  • Relationship check
  • Control Check
  • Two way check

A category of a DFD that focuses on business activities.

  • Relational DFD
  • Physical DFD
  • Logical DFD
  • Individual DFD

List of existing projects and the number of beneficiaries per project.

  • Operational

Every member of an entity set is described by its _______________.

  • Attributes
  • Classes
  • Methods
  • Size

HTTP is a language used to create web pages.

  • None of the choices
  • TRUE
  • FALSE
  • Depends on the browser you are using.
Comments
Paypal Donation

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Massage Machines

Knowledge Management

Intrusion Detection System

Retail Merchandising

Forensic Science

Geographic Information Systems

Engineering

Thesis Writing 2

Strategic Business Analysis

Risk Management

Quantitative Methods

Reading and Writing Skills

Real Estate Consulting and Investment Analysis

Research in Psychology 2

Introduction to Information Systems

Investment and Portfolio Management

International Marketing

Data Structures and Algorithms

Application Lifecycle Management

Modeling and Simulation

Algorithms and Complexity

Software Development

Kitchen and Bath Specialty

Fashion Design

Fashion Graphic Arts

Electronics Engineering Technology

Desktop Publishing

Computer-Aided Design

Construction

Architectural Studies

Art and Design

Web Enhanced Animation Graphics

Management Information Systems

Software Engineering 2

Computer Aided Drawing

Cell Theory

Web Application Development

Psychology

Family Child Care

Training and Development

Special Topics in Human Resource Management

Science Technology and Society

Mobile Application Design and Development

Introduction to Multimedia

Computer Programming

2D and 3D Digital Animation

French

Fine Arts

Art Appreciation

Additive Manufacturing

Web Design

Quality Assurance Testing

Web Development

Unified Functional Testing

Initiating Major Organizational Shifts

Strategic Management

Fundamentals of Nursing Practice

Health Assessment

Air Conditioning and Refrigeration Service

Refrigeration Service

Maintenance Technology

Industrial Electronics Maintenance

Computer Support Technician

Property Management System

Information Systems Operations and Maintenance

Configuration Management

Mechatronics

Strategy Management and Acquisition

Project Management

Numerical Methods


Show All Subject
Affiliate Links

Shopee Helmet

Shopee 3D Floor

Lazada Smart TV Box