Chapter 1
Chapter 2
Chapter 4
Chapter 11
Chapter 12
100

These older systems must be considered when planning a new information system to ensure compatibility and smooth integration.

What are legacy systems?

100

These components help businesses by automating responses to sales inquiries, processing online orders, and tracking inventory.

What is Customer Relationship Management (CRM)?

100

This simple graphic organizer is used by systems analysts to visualize the progress and status of a project.

What is a storyboard?

100

This type of documentation provides instructions and details for individuals who will interact directly with the system.

What is user documentation?

100

This type of maintenance focuses on adding enhancements to an operational system and improving its usability.

What is adaptive maintenance?

200

This large database in a knowledge management system lets users search for information using keywords or natural language questions.

What is a knowledge base?

200

This type of project is optional and often initiated to meet a user’s specific request, such as generating a new report on a schedule instead of it being ad hoc.

What is a discretionary project?

200

These types of interview questions restrict or limit the way a respondent can answer.

What are closed-ended questions?

200

This type of documentation includes everything required for processing and distributing both online and printed output.

What is operations documentation?

200

This type of maintenance involves modifying an operational system to improve its efficiency, reliability, or maintainability.

What is perfective maintenance?

300

These systems boost efficiency by offering tools like groupware, which allow users to share data, collaborate on projects, and work together in teams.

What are user productivity systems?

300

These projects must be implemented because management has no choice in the matter.

What are nondiscretionary projects?

300

This type of organizational structure is based on interpersonal relationships, where certain individuals hold more influence or knowledge than what is shown on the official chart.

What is informal organizational structure?

300

This type of testing focuses on individual program components to catch execution errors that might cause abnormal termination and logic errors missed during desk checking.

What is unit testing?

300

This process examines an organization’s assets, threats, and vulnerabilities to determine potential security issues.

What is risk identification?

400

This team in large IT departments is responsible for reviewing and testing applications and system changes to ensure they meet specifications and software quality standards.

What is quality assurance?

400

These limitations occur when a system designed for a specific hardware setup becomes outdated after new hardware is introduced.

What is performance?

400

This term, sometimes referred to as an epic, represents a simple, high-level statement of a requirement in system development.

What is a feature?

400

This organization created the Capability Maturity Model (CMM) to improve software quality, reduce development time, and lower costs.

What is the Software Engineering Institute?

400

This risk control strategy eliminates potential threats by implementing protective safeguards.

What is avoidance?

500

These professionals design and build web pages, monitor traffic, manage web-related hardware and software, and connect web-based applications to a company’s information systems.

What are web support specialists?

500

This group leverages the collective judgment and experience of multiple analysts to assess and evaluate systems projects.

What is a computer resources committee?

500

This sampling method involves selecting every tenth customer from a list to create a representative sample.

What is a systematic sample?

500

Reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart.

What are the steps in sequence to create a structure chart?

500

This security principle ensures that unauthorized users cannot create, modify, or delete information.

What is integrity?

M
e
n
u