Computer science

Modern Systems Analysis And Design Textbook Questions And Answers

US$14.99 US$24.00

b Chapter: 1 -Problem: 19 /b Choose a relatively small organization that is just beginning to use information systems. What types of systems are being used? For what purposes? To what extent are these systems integrated with one another? With systems outside the organizatio

Description

Chapter: 1 -Problem: 19 >> Choose a relatively small organization that is just beginning to use information systems. What types of systems are being used? For what purposes? To what extent are these systems integrated with one another? With systems outside the organization? How are these systems developed and controlled? Who is involved in systems development, use, and control?
Answer Preview: With the increased adoption of technology, businesses are increasingly relying on information systems to enhance their operations. MakIT Technologies …

,

, Chapter: 9 -Problem: 2 >> List five properties of relations.
Answer Preview: Properties of Relati…

, Chapter: 4 -Problem: 5 >> Discuss several factors that provide evidence for the need for improved ISP today.
Answer Preview: For most businesses and even homes, internet access is just as important as their other utilities. Most businesses use internet access for everything from customer communication (email, VOIP, etc) to …

, Chapter: 8 -Problem: 13 >> List the ideal characteristics of an entity identifier attribute.
Answer Preview: Every entity in the data model must have a primary key …

, Chapter: 10 -Problem: 26 >> As stated in this chapter, most forms and reports are designed for contemporary information systems by using software to prototype output. Packages such as Microsoft Visual Studio.NET have very sophisticated output design modules. Gain access to such a tool at your university or where you work and study all the features the software provides for the design of printed output. Write a report that li
Answer Preview: Microsoft Visual Studio . NET is a powerful software package that provides a wide range of features …

, Chapter: 2 -Problem: 4 >> What methods can a systems analyst employ to verify vendor claims about a software package?
Answer Preview: To verify vendor claims about a software package, an analyst can …

, Chapter: 8 -Problem: 33 >> Consider the Is_married_to unary relationship in Figure 8.14c.a. Assume that we want to know the date on which a marriage occurred. Augment this E-R diagram to include a Date_married attribute.b. Because persons sometimes remarry after the death of a spouse or a divorce, redraw this E-R diagram to show the whole history of marriages (not just the current marriage) for persons. Show the Date_marrie
Answer Preview: a. To augment the E-R diagram to include a Date_married attribute, we simply add the attribute to th…

, Chapter: 11 -Problem: 10 >> Describe the methods used to enhance the validity of data input.
Answer Preview: How do you validate data entry? Add data validation to a cell or a ran…

, Chapter: 4 -Problem: 26 >> Write separate mission statements that you believe would describe Microsoft, IBM, and AT&T. Compare your mission statements with the real mission statements of these companies. Their mission statements can typically be found in their annual reports. Were your mission statements comparable to the real mission statements? Why or why not? What differences and similarities are there among these three
Answer Preview: Mission statements: Every organization is set out to achieve what it is set out to do. There are a goal and statement of the organization to provide a …

, Chapter: 8 -Problem: 42 >> Ask a systems analyst to give you a copy of the standard notation he or she uses to draw E-R diagrams. In what ways is this notation different from the notation in this text? Which notation do you prefer and why? What is the meaning of any additional notation?
Answer Preview: ANS WER The notation used in this text is the most common notati…

, Chapter: 11 -Problem: 3 >> Describe five methods of interacting with a system. Is one method better than all others? Why or why not?
Answer Preview: There are many different methods for human interaction with system. Each interaction method will have the overall efficiency and usability of the computer systems, But we can not particularly say one …

, Chapter: 1 -Problem: 6 >> Describe each major component of a comprehensive CASE system. Is any component more important than any other?
Answer Preview: CASE: Is the implementation of computer facilitated tools and methods in software development. CASE is used to ensure a high-quality and defect-free software. CASE ensures a check-pointed and discipli…

, Chapter: 8 -Problem: 25 >> For the E-R diagram provided in Figure 8.24, assume that this company decided to assign each sales representative to a small, unique set of customers; some customers can now become “members” and receive unique benefits; small manufacturing teams will be formed and each will be assigned to the production of a small, unique set of products; and each purchasing agent will be assigned to a small, uniq
Answer Preview: The required E-R diagr…

, Chapter: 7 -Problem: 22 >> Choose a transaction that you are likely to encounter and develop a written use case for it.
Answer Preview: Use Case of Cash withdrawal from ATM 1. Insert Card The use case begins when the actor Customer inse…

, Chapter: 12 -Problem: 14 >> Why is it important that “Links live forever” when designing an Internet-based electronic commerce system?
Answer Preview: Most old pages do have value for users, so I recommend keeping the pages themselves a…

,

, Chapter: 7 -Problem: 24 >> An auto rental company wants to develop an automated system that can handle car reservations, customer billing, and car auctions. Usually a customer reserves a car, picks it up, and then returns it after a certain period of time. At the time of pickup, the customer has the option to buy or waive collision insurance on the car. When the car is returned, the customer receives a bill and pays the spe
Answer Preview: The use case diagram for the automated system to handle ca…

, Chapter: 11 -Problem: 17 >> Consider the design of a registration system for a hotel. Following the design specification items in Figure 11-2, briefly describe the relevant users, tasks, and displays involved in such a system. Figure 11-2 Transcribed Image Text: Design Specification 1. Narrative Overview a. Interface/Dialogue
Answer Preview: The hotel registration system to be generated should be capable of providing output in graphical and text format and having relevant tasks and users. …

, Chapter: 14 -Problem: 24 >> Interview the Webmaster at a company where you work or where you have a contact. Investigate the procedures followed to maintain this website. Document these procedures. What differences or enhancements did you find, compared with the special website maintenance issues and procedures listed in this chapter?
Answer Preview: Solution. The webmaster at my company follows a few simple procedures to maintain our website. First…

, Chapter: 3 -Problem: 6 >> Describe the activities performed by the project manager during project execution.
Answer Preview: The Project Manager monitors the progress of the team , identifies issues or risks that occur, creat…

,

, Chapter: 10 -Problem: 25 >> Find your last grade report. Given the guidelines presented in this chapter, identify flaws in the design of this grade report. Redesign this report to correct these flaws.
Answer Preview: The assumptions about users and tasks for redesigning the above employees report are as follows: 1. …

, Chapter: 13 -Problem: 6 >> List and define the factors that are important to successful implementation efforts.
Answer Preview: Every organization has to balance the sophistication and complexity of its strategy with the challenges of implementation. I would much rather see a m…

, Chapter: 3 -Problem: 8 >> Describe the activities performed by the project manager during project closedown.
Answer Preview: The activities performed by the project manager during project close down are: (1) closing down the …

, Chapter: 7 -Problem: 14 >> Choose a transaction that you are likely to encounter, perhaps ordering a cap and gown for graduation, and develop a high-level DFD or a context diagram. Decompose this to a level-0 diagram.
Answer Preview: DFD: It stands for Data flow diagram. It exhibits flow of data. It has several symb…

, Chapter: 11 -Problem: 28 >> Go to the Internet and find commercial websites that demonstrate each of the common errors listed in Table 11-15. Table 11-15. Transcribed Image Text: Error Description Avoid opening a new browser window when a user clicks on a link unless it is clearly marked that a new window will be opened; users
Answer Preview: Opening New Browser Window: - https://www ancestry com/ - Opens registration/login in a new window w…

, Chapter: 5 -Problem: 4 >> Describe three commonly used methods for performing economic cost–benefit analysis.
Answer Preview: Net Present Value and Benefit-Cost Ratio are the two most com…

, Chapter: 8 -Problem: 21 >> Assume that entity PART has attributes Part_Number, Drawing_Number, Weight, Description, Storage_Location, and Cost. Which attributes are candidate keys? Why? Which attribute would you select for the identifier of PART? Why? Or do you think that you should create another attribute to be the identifier? Why or why not?
Answer Preview: ANS WER The re are s everal candi date keys for t his e n tity, i ncluding Part_N u mber, D r awing_…

,

, Chapter: 2 -Problem: 2 >> How can you decide among various off-the-shelf software options? What criteria should you use?
Answer Preview: Choosing the right product Pricing and Licensing Model. Does th…

,

, Chapter: 14 -Problem: 1 >> Contrast the following terms:a. Adaptive maintenance, corrective maintenance, perfective maintenance, preventive maintenance.b. Baseline modules, build routines, system librarianc. Maintenance, maintainability
Answer Preview: 1. Adaptive maintenance refers to changes made to a system in response to ne…

, Chapter: 2 -Problem: 6 >> Explain reuse and its advantages and disadvantages.
Answer Preview: Benefits of Reducing and Reusing Prevents pollution cau…

, Chapter: 7 -Problem: 7 >> Explain the guidelines for deciding when to stop decomposing DFDs.
Answer Preview: Ideally, a DFD has at least 3 processes and no more than 7-9 .Decompo…

, Chapter: 12 -Problem: 11 >> Why is it important to separate content from display when designing an Internet-based electronic commerce system?
Answer Preview: In many cases, the design and development aspects of …

, Chapter: 3 -Problem: 17 >> Suppose that you have been contracted by a jewelry store to manage a project to create a new inventory tracking system. Describe your initial approach to the project. What should your first activity be? What information would you need? To whom might you need to speak?
Answer Preview: First and foremost, the customer must do research in order to determine whether or …

, Chapter: 7 -Problem: 13 >> Using the example of a retail clothing store in a mall, list relevant data flows, data stores, processes, and sources/ sinks. Observe several sales transactions. Draw a context diagram and a level-0 diagram that represent the selling system at the store. Explain why you chose certain elements as processes versus sources/sinks.
Answer Preview: ANSWER Relevant data flows: -Customers purchase history -Inventory levels -Sale prices Releva…

, Chapter: 12 -Problem: 8 >> Describe various managerial issues related to deploying a cloud computing model including availability, reliability, scalability, viability, security, privacy, compliance, diversity of offerings, openness, and cost.
Answer Preview: principle of cloud computing availability: The cloud's availability means the technology infrastructure is not the market differentiator it has been …

, Chapter: 2 -Problem: 7 >> Compare and contrast the four approaches to reuse.
Answer Preview: In practice, there are four distinct types of content reuse: Ad hoc reuse of assets . The planned re…

, Chapter: 7 -Problem: 11 >> What does the term limited entry mean in a decision table?
Answer Preview: [limdd entr disizhn tbl] (computer science) A decision table in whi…

, Chapter: 14 -Problem: 20 >> In the section on PVF’s WebStore, it is mentioned that Jim Woo will prepare a list of ISP Web-hosting services. Prepare such a list for website maintenance. Contrast the responsibilities of the ISP with those of PVF.
Answer Preview: ISP merely provides with the hardware and the software (i e. the web server) to maintain a website. …

, Chapter: 1 -Problem: 10 >> When would you use Agile Methodologies versus an engineering-based approach to development?
Answer Preview: Agile should not be used when the software is being developed by teams who are not co- located . If …

, Chapter: 7 -Problem: 39 >> At an organization with which you have contact, ask one or more employees to draw a “picture” of the business process they interact with at that organization. Ask them to draw the process using whatever format suits them. Ask them to depict in their diagram each of the components of the process and the flow of information among these components at the highest level of detail possible. What type of
Answer Preview: The type of diagram drawn by the employees depends on their preferences and the complexity of the pr…

, Chapter: 12 -Problem: 12 >> How can CSSs and XSL help to ensure design consistency when designing an Internet-based electronic commerce system?
Answer Preview: For example, CSS classes allow you to define a partic…

, Chapter: 3 -Problem: 11 >> Describe the steps involved in making a network diagram.
Answer Preview: 4 Easy Steps to Create a Network Diagram Draw a Mock-up. Just like any other …

, Chapter: 8 -Problem: 36 >> In the Purchasing department at one company, a purchase request may be assigned an expediter within the Purchasing department. This expediter follows the purchase request through the entire purchasing process and acts as the sole contact person with the person or unit within the company buying the goods or services. The Purchasing department refers to its fellow employees buying goods and services
Answer Preview: Description of Entities : Entity #1 : Expediter Attributes : ID , Name, Contact Primary ke…

, Chapter: 11 -Problem: 7 >> List and describe the functional capabilities needed in an interface for effective entry and navigation. Which capabilities are most important? Why? Will this be the same for all systems? Why or why not?
Answer Preview: Variables are specially written in letters or symbo…

, Chapter: 7 -Problem: 29 >> In a relatively small company that sells thin, electronic keypads and switches, the rules for selling products specify that sales representatives are assigned to unique regions of the country. Sales come either from cold calling, referrals, or current customers with new orders. A sizable portion of their business comes from referrals from larger competitors who send their excess and/or “difficult”
Answer Preview: Ass um ptions : - Sales reps can collaborate on a sale …

, Chapter: 14 -Problem: 9 >> What is meant by configuration management? Why do you think organizations have adopted the approach of using a systems librarian?
Answer Preview: Configuration management is the process of organizing and maintaining information about an o…

, Chapter: 8 -Problem: 47 >> A student, whose attributes include studentName, Address, phone, and age, may engage in multiple campusbased activities. The university keeps track of the number of years a given student has participated in a specific activity and, at the end of each academic year, mails an activity report to the student showing his or her participation in various activities. Draw a class diagram for this situatio
Answer Preview: Here is a class diagram that represents the situation described: +------------+ | Student | +-…

,

, Chapter: 8 -Problem: 11 >> List the deliverables from the conceptual data modeling part of the analysis phase of the systems development process.
Answer Preview: The analysis phase of your project should result in three important deliverables: a bus…

,

, Chapter: 9 -Problem: 17 >> Consider the E-R diagram of Figure 9-21.a. Transform this E-R diagram into a set of 3NF relations.b. State and justify all referential integrity rules for the 3NF relations you created in Problem and Exercise 9-45a. Figure 9-21 Transcribed Image Text: VENDOR Vendor_ID Address ++ PRICE QUOTE Quote Qu
Answer Preview: 9 45 a 3NF relations VENDOR( Vendor_ID ,Address) PRICE_QUOTE( Vendor_ID,…

, Chapter: 8 -Problem: 44 >> Give an example of aggregation. Your example should include at least one aggregate object and three component objects. Specify the multiplicities at each end of all the aggregation relationships.
Answer Preview: Aggregation (also known as **containment) is a specialised …

, Chapter: 10 -Problem: 13 >> Imagine that you are to design a budget report for a colleague at work using a spreadsheet package. Following the prototyping discussed in the chapter (see also Figure 6-7), describe the steps you would take to design a prototype of this report. Figure 6-7 Transcribed Image Text: Initial Identify Re
Answer Preview: As a language model, I don't have the ability to create visuals, but I can give you a step-by-step g…

, Chapter: 14 -Problem: 22 >> Study an information systems department with which you are familiar or to which you have access. How does this department measure the effectiveness of systems maintenance? What specific metrics are used and how are these metrics used to effect changes in maintenance practices? If there is a history of measurements over several years, how can changes in the measurements be explained?
Answer Preview: Solution. The information systems department at my company uses a few specific metrics to measure t…

, Chapter: 5 -Problem: 1 >> Contrast the following terms:a. Break-even analysis; present value; net present value; return on investmentb. Economic feasibility; legal and contractual feasibility; operational feasibility; political feasibility; schedule feasibilityc. Intangible benefit; tangible benefitd. Intangible cost; tangible cost
Answer Preview: Break-even analysis is the analysis to find out the point where the revenue received is equal to the cost of doing operations or business. At this poi…

, Chapter: 7 -Problem: 13 >> Draw a use case diagram for the situation described in Problem and Exercise 7-39, page 210. Problem and Exercise 7-39Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all the details of the employee hiring system described in the following narrative. You must draw at least a context and a level-0 diagram. If you discover while drawing these diagrams t
Answer Preview: I can provide you with a description of the use case diagram for the situation described in …

, Chapter: 9 -Problem: 6 >> How is a foreign key represented in relational notation?
Answer Preview: : in this example the attribute Pub_id is what is known as …

, Chapter: 12 -Problem: 9 >> Describe how JSON and XML relate to SOAP and REST when implementing web services.
Answer Preview: SOAP vs REST vs JSON are frequently mentioned acronyms when speaking about web services. While SOAP …

, Chapter: 5 -Problem: 1 >> Now that the “No Customer Escapes” project team has been formed and a plan has been developed for distributing project information, Jim can begin working on the project’s scope statement, workbook, and Baseline Project Plan. He first drafted the project’s scope statement and posted it on the project’s intranet (see PE Figure 5-1). Once posted on the intranet, he sent a short e-mail message to all
Answer Preview: 1 As an employee at Petrie Electronics, whether or not one would want to work on this project would depend on their individual interests, skills, and expertise. The scope statement provides a high-lev…

, Chapter: 7 -Problem: 16 >> Choose an example like the one in Problem and Exercise 7-32 and draw a context diagram. Decompose this diagram until it does not make sense to continue. Be sure that your diagrams are balanced. Problem and Exercise 7-32Choose a transaction that you are likely to encounter, perhaps ordering a cap and gown for graduation, and develop a high-level DFD or a context diagram. Decompose this to a level-0
Answer Preview: I can explain how to create a context diagram and decompose it. A context diagram is a high-l…

, Chapter: 8 -Problem: 6 >> What is the significance of triggering operations and business rules in the analysis and design of an information system?
Answer Preview: Effective business rules help set expectations and provide guidelines on how work will be conducted …

, Chapter: 13 -Problem: 30 >> What types of security policies and procedures does your university have in place for campus information systems?
Answer Preview: Our university has a number of security policies and procedures in place for campus …

, Chapter: 2 -Problem: 1 >> Jim Watanabe looked around his new office. He couldn’t believe that he was the assistant director of information technology at Petrie Electronics, his favorite consumer electronics retail store. He always bought his new DVDs and video games for his Xbox 360 at Petrie. In fact, he bought his Blu-ray player and his Xbox 360 at Petrie, along with his surround sound system and his 40-inch flat screen
Answer Preview: 1. There are many different ways that information systems projects can get started in organizations. Some common ways include: a) Business need: A business problem or opportunity is identified, and an …

, Chapter: 7 -Problem: 3 >> List and define the four main concepts that are part of BPMN.
Answer Preview: BPMN diagram symbols are categorized into four main groups: flow objects…

, Chapter: 10 -Problem: 9 >> What is meant by usability and what characteristics of an interface are used to assess a system’s usability?
Answer Preview: When evaluating user interfaces for usabilit…

, Chapter: 14 -Problem: 15 >> According to Figure 14-4, corrective maintenance is by far the most frequent form of maintenance. What can you do as a systems analyst to reduce this form of maintenance? Figure 14-4 Transcribed Image Text: Maintenance Type Corrective-adds no value Preventive Perfective Adaptive
Answer Preview: Answer To reduce corrective conservation the answer is clear do a better job in assaying, designing, …

, Chapter: 3 -Problem: 18 >> Can a project have two critical paths? Why or why not? Give a brief example to illustrate your point.
Answer Preview: You can have more than one critical path in a project , so that several paths run concurrently. This …

, Chapter: 7 -Problem: 16 >> Draw a use case diagram for the situation described in Problem and Exercise 7-42. Problem and Exercise 7-42Develop a context diagram and a level-0 diagram for the contracting system described in the following narrative. If you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Supply these extra explanations along with the diagrams.Government Solution
Answer Preview: To draw a use case diagram for the situation described in Problem and Exercise 7-42, you could follo…

,

, Chapter: 13 -Problem: 1 >> What are the deliverables from coding, testing, and installation?
Answer Preview: The deliverables from coding, testing, and installation are…

, Chapter: 5 -Problem: 5 >> List and discuss the different types of project feasibility factors. Is any factor most important? Why or why not?
Answer Preview: Scheduling feasibility is the most important for project success. A project will fa…

,

, Chapter: 12 -Problem: 19 >> Suppose you were designing applications for a standard file server environment. One issue discussed in this chapter for this distributed processing environment is that the application software on each client PC must share in the responsibilities for data management. One data management problem that can arise is that applications running  concurrently on two clients may want to update the same data
Answer Preview: One approach to managing concurrent updates to the same data in a file server environment is to use …

, Chapter: 4 -Problem: 24 >> Choose an organization that you have contact with, perhaps your employer or university. Follow the “Outline of an information systems plan” shown in Figure 4-15 and complete a short information systems plan for the organization you chose. Write at least a brief paragraph for each of the seven categories in the outline. If IS personnel and managers are available, interview them to obtain informatio
Answer Preview: 1. Executive Summary The organization that I have chosen to complete a short information systems pla…

, Chapter: 9 -Problem: 3 >> What problems can arise when merging relations (view integration)?
Answer Preview: What problems can arise during view integration or m…

, Chapter: 13 -Problem: 28 >> Your university or school probably has some form of microcomputer center or help desk for students. What functions does this center perform? How do these functions compare to those outlined in this chapter?
Answer Preview: The different function types covered here are: One one functio…

, Chapter: 3 -Problem: 14 >> Which of the four phases of the project management processdo you feel is most challenging? Why?
Answer Preview: The project planning phase is often the most challenging phase for …

, Chapter: 10 -Problem: 27 >> Investigate the displays used in another field (e.g., aviation). What types of forms and reports are used in this field? What standards, if any, are used to govern the use of these outputs?
Answer Preview: An electrocyclic reaction is the concerted cyclization of a conjugate…

, Chapter: 14 -Problem: 10 >> How are automated tools used in the maintenance of information systems?
Answer Preview: There are a number of ways that automated tools can be used in the maintenance of informatio…

, Chapter: 3 -Problem: 16 >> Search computer magazines or the web for recent reviews of project management software. Which packages seem to be most popular? What are the relative strengths and weaknesses of each software package? What advice would you give to someone intending to buy project management software for his or her PC? Why?
Answer Preview: There are many popular project management software packages , each wi…

, Chapter: 11 -Problem: 29 >> Research the topic “natural language interface” on the web. Determine the status of applications available with natural language interaction. Forecast how long it will be before natural language capabilities are prevalent in information systems use.
Answer Preview: A natural language interface is a form of user interface that allows users to interact with the system via natural human language. Input is fed into t…

, Chapter: 12 -Problem: 20 >> An extension of the three-tiered client/server architecture is the n-tiered architecture, in which there are many specialized application servers and other functions (e.g., load balancers). Extend the reasons for utilizing the three tiered architecture outlined in the chapter to an n-tiered architecture.
Answer Preview: An n-tiered architecture extends the benefits of a three-tiered architecture by introducing addition…

, Chapter: 4 -Problem: 25 >> Choose an organization that you have contact with, perhaps your employer or university. List significant examples for each of the items used to create planning matrices. Next, list possible relationships among various items and display these relationships in a series of planning matrices.
Answer Preview: No organization design or method of management is perfec…

, Chapter: 12 -Problem: 10 >> In what ways do Internet standards such as BIND, HTTP, and HTML assist designers in building Internet-based systems?
Answer Preview: Because they ensure that the web works equally wel…

, Chapter: 1 -Problem: 16 >> Explain how object-oriented analysis and design differs from the traditional approach. Why isn’t RUP (Figure 1-11) represented as a cycle? Is that good or bad? Explain your response. Figure 1-11 Transcribed Image Text: Resource Inception Elaboration Construction Transition Time
Answer Preview: The traditional approach uses traditional projects this approach leads software developers to focus …

, Chapter: 13 -Problem: 2 >> Explain the code-testing process.
Answer Preview: Step-1: Assess Development Plan and Status This initiative may be prerequisite to putting together Verification, Validation, and Testing Plan wont to evaluate implemented software solution. During thi…

, Chapter: 14 -Problem: 18 >> Suppose you were a system librarian. Using entity relationship diagramming notation, describe the database you would need to keep track of the information necessary in your job. Consider operational, managerial, and planning aspects of the job.
Answer Preview: The system l ibrarian would need a database to keep track of information such as b…

,

, Chapter: 3 -Problem: 12 >> In which phase of the SDLC does project planning typically occur? In which phase does project management occur?
Answer Preview: Project planning typically occurs during the plann…

,
Answer Preview: 1. Properly document the system: A systems analyst can manage the cost of documentation by ensuring …

,

, Chapter: 1 -Problem: 18 >> Imagine an information system built without using a systems analysis and design methodology and without any thinking about the SDLC. Use your imagination and describe any and all problems that might occur, even if they seem a bit extreme or absurd.
Answer Preview: The significant objective of system analysis and design is to improve authoritative systems . Reg…

, Chapter: 12 -Problem: 26 >> Are you using any services offered in the cloud? If so, what service model is offered by your provider? If not, what are your primary reasons for not using services offered in the cloud?
Answer Preview: Cloud services are infrastructure, platforms, or software that are hosted by third-party providers and made available to users through the internet. T…

, Chapter: 3 -Problem: 13 >> What are some reasons why one activity may have to precede another activity before the second activity can begin? In other words, what causes precedence relationships between project activities?
Answer Preview: Finish-to-start (FS): This is the most common type of relationship. The predecessor activity must fi…

, Chapter: 13 -Problem: 21 >> You have been a user of many information systems including, possibly, a class registration system at your school, a bank account system, a word-processing system, and an airline reservation system. Pick a system you have used and assume you were involved in the beta testing of that system. What criteria would you have used to judge whether this system was ready for general distribution?
Answer Preview: 1 Functionality: The system should be able to perform all of the tasks that it is de…

, Chapter: 2 -Problem: 9 >> Review the criteria for selecting off-the-shelf software presented in this chapter. Use your experience and imagination and describe other criteria that are or might be used to select off-the-shelf software in the real world. For each new criterion, explain how use of this criterion might be functional (i.e., it is useful to use this criterion), dysfunctional, or both.
Answer Preview: Answer) While cost effective is the main criterion and customization is to b…

, Chapter: 13 -Problem: 14 >> Describe the delivery methods many vendors employ for providing support.
Answer Preview: There are many channels in which both functional and technical appl…

, Chapter: 4 -Problem: 7 >> What are three generic competitive strategies?
Answer Preview: Generic Strategies These three approaches are examples of "generic strategies," because they can be applied to products or services in all industries, …

, Chapter: 13 -Problem: 22 >> Why is it important to keep a history of test cases and the results of those test cases even after a system has been revised several times?
Answer Preview: Quite simply, the test cases are the cases which are necessary to test the system. Meeting a test ca…

, Chapter: 1 -Problem: 4 >> List and explain some of the problems with the traditional waterfall SDLC.
Answer Preview: No working software is produced until late during the life cycle. High amo…

, Chapter: 13 -Problem: 8 >> What is the difference between system documentation and user documentation?
Answer Preview: System documentation represents documents that describe the sys…

, Chapter: 12 -Problem: 23 >> Building on the research conducted in Problem and Exercise 12-53, what challenges does each device present for designers when delivering an electronic commerce application? Are some devices more suitable for supporting some applications than others? Problem and Exercise 12-53There is a strong movement toward wireless mobile computing using thin-client technology. Go to the Web and visit some of th
Answer Preview: The challenges of delivering an electronic commerce application on each device vary depending on the …

, Chapter: 7 -Problem: 35 >> Talk with a systems analyst who works at an organization. Ask the analyst to show you a complete set of DFDs from a current project. Interview the analyst about his or her views concerning DFDs and their usefulness for analysis.
Answer Preview: Interview er : Hi , I 'm here to ask you about your views on D FD s and their usefulness for analys…

, Chapter: 14 -Problem: 11 >> What is the difference between reverse engineering and reengineering tools?
Answer Preview: R ever se engineering tools are used to analyze an exist…

, Chapter: 7 -Problem: 4 >> What is the difference between a swimlane and a pool? When do you use each one?
Answer Preview: In UML, the generic swimlane is represented by a concept that is called an Activity Partition . . In …

, Chapter: 13 -Problem: 27 >> Suppose you were responsible for establishing a help desk for users of Hoosier Burger’s inventory control system (described in previous chapters). Which support system elements would you create to help users be effective? Why?
Answer Preview: Interface elements include but are not limited to: Inp…

, Chapter: 8 -Problem: 12 >> Explain the relationship between minimum cardinality and optional and mandatory participation.
Answer Preview: All minimum cardinality tells you is the minimum allowed number of …

, Chapter: 12 -Problem: 18 >> The Internet is a network of networks. Using the terminology in this chapter, what type of distributed network architecture is used on the Internet?
Answer Preview: Internet architecture is a meta-network , which refers to a congregation of thousands of dis…

,

, Chapter: 13 -Problem: 31 >> Interview someone you know or have access to who works for a medium to large organization. Ask for details on a specific instance of organizational change: What changed? How did it happen? Was it well planned or ad hoc? How were people in the organization affected? How easy was it for employees to move from the old situation to the new one?
Answer Preview: I spoke to a friend who works for a large organization that recently underwent …

, Chapter: 7 -Problem: 2 >> Explain the rules for drawing good DFDs.
Answer Preview: Each process should have at least one input and a…

, Chapter: 13 -Problem: 32 >> Reexamine the data you collected in the interview in Field Exercise 1. This time, analyze the data from a political perspective. How well does the political model explain how the organization dealt with change? Explain why the political model does or does not fit. Field Exercise 1Interview someone you know or have access to who works for a medium to large organization. Ask for details on a specifi
Answer Preview: The political model does not fit the data well. The political model would suggest that the organizat…

, Chapter: 7 -Problem: 25 >> Develop a context diagram and as many nested DFDs as you consider necessary to represent all the details of the training logistics system described in the following narrative. If you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Supply these extra explanations along with the diagrams.Training, Inc., conducts training seminars in major US cities.
Answer Preview: The context diagram for the training logistics system is shown below. It shows the external entities interacting with the system, as well as the different processes that take place within the system. …

, Chapter: 13 -Problem: 10 >> What is self-training?
Answer Preview: Definition of self-training from the workplace per…

, Chapter: 8 -Problem: 31 >> Draw an E-R diagram to represent the sample customer order in Figure 8-4. Figure 8-4. Transcribed Image Text: PVF CUSTOMER ORDER ORDER NO: 61384 CUSTOMER NO: 1273 NAME: Contemporary Designs 123 Oak St. Austin, TX 28384 ADDRESS: CITY-STATE-ZIP: ORDER DATE: 11/04/2014 PROMISED DATE: 11/21/2017 PRODUCT
Answer Preview: Here is an E-R diagram to represent the sample custom…

, Chapter: 13 -Problem: 9 >> What are the common methods of computer training?
Answer Preview: Technology-Based Learning. Common methods of learning …

, Chapter: 9 -Problem: 16 >> Transform the E-R diagram of Figure 8-23 into a set of 3NF relations. Make up a primary key where needed and one or more nonkey attributes for each entity. Figure 8-23 Transcribed Image Text: TOOL ++ Used_on PROJECT Project ID * TASK Task_ID Time {Skill} Includes Works_on Done_at ++ EMPLOYEE Employe
Answer Preview: 6a. 3NF Relationships CUSTOMER (Customer ID, Customer Name, Customer Address, Customer_ Phone, Custo…

, Chapter: 13 -Problem: 33 >> Ask a systems analyst you know or have access to about implementation. Ask what the analyst believes is necessary for a successful implementation.
Answer Preview: A successful implementation requires careful planning …

, Chapter: 12 -Problem: 3 >> Describe the advantages of a client/server architecture.
Answer Preview: Client-server architecture is a computing model in which the server hosts, delivers and manages most …

, Chapter: 14 -Problem: 12 >> What are some special maintenance issues and procedures that are especially relevant for websites?
Answer Preview: There are a few special maintenance issues and procedures t…

,

, Chapter: 12 -Problem: 12 >> How can CSSs and XSL help to ensure design consistency when designing an Internet-based electronic commerce system?
Answer Preview: For example, CSS classes allow you to define a partic…

, Chapter: 14 -Problem: 2 >> List the steps in the maintenance process and contrast them with the phases of the SDLC.
Answer Preview: The maintenance process includes the following steps: 1. Planning: This phase involves identifying t…

,

, Chapter: 11 -Problem: 7 >> List and describe the functional capabilities needed in an interface for effective entry and navigation. Which capabilities are most important? Why? Will this be the same for all systems? Why or why not?
Answer Preview: Variables are specially written in letters or symbo…

, Chapter: 13 -Problem: 11 >> What is e-learning?
Answer Preview: A learning system based on formalised teaching bu…

,

, Chapter: 14 -Problem: 9 >> What is meant by configuration management? Why do you think organizations have adopted the approach of using a systems librarian?
Answer Preview: Configuration management is the process of organizing and maintaining information about an o…

, Chapter: 13 -Problem: 29 >> Suppose you were responsible for organizing the user documentation for Hoosier Burger’s inventory control system (described in previous chapters). Write an outline that shows the documentation you would suggest be created, and generate the table of contents or outline for each element of this documentation.
Answer Preview: 1. Introduction -What is the inventory control system? -What does it do? -How wil…

,

,

, Chapter: 11 -Problem: 21 >> List the physical input devices described in this chapter that you have seen or used. For each device, briefly describe your experience and provide your personal evaluation. Do your personal evaluations parallel the evaluations provided in Tables 11-3 and 11-4? Tables 11-3Tables 11-4 Transcribed Image Text:
Answer Preview: Here are some of the physical input devices I have personally seen or used, along with my evaluations: Keyboard - I use a keyboard daily for typing, d…

,

, Chapter: 9 -Problem: 17 >> Consider the E-R diagram of Figure 9-21.a. Transform this E-R diagram into a set of 3NF relations.b. State and justify all referential integrity rules for the 3NF relations you created in Problem and Exercise 9-45a. Figure 9-21 Transcribed Image Text: VENDOR Vendor_ID Address ++ PRICE QUOTE Quote Qu
Answer Preview: 9 45 a 3NF relations VENDOR( Vendor_ID ,Address) PRICE_QUOTE( Vendor_ID,…

, Chapter: 13 -Problem: 25 >> Is it good or bad for corporations to rely on vendors for computing support? List arguments both for and against reliance on vendors as part of your answer.
Answer Preview: SOLUTION- The companies should use the software service provider that includes outside supplier , cl…

,

, Chapter: 14 -Problem: 22 >> Study an information systems department with which you are familiar or to which you have access. How does this department measure the effectiveness of systems maintenance? What specific metrics are used and how are these metrics used to effect changes in maintenance practices? If there is a history of measurements over several years, how can changes in the measurements be explained?
Answer Preview: Solution. The information systems department at my company uses a few specific metrics to measure t…

, Chapter: 14 -Problem: 21 >> Study an information systems department with which you are familiar or to which you have access. How does this department organize for maintenance? Has this department adopted one of the three approaches outlined in Table 14-2 or does it use some other approach? Talk with a senior manager in this department to discover how well this maintenance organization structure works. Table 14-2
Answer Preview: The information systems department in my organization is organized into three main divisions: system …

,

, Chapter: 12 -Problem: 9 >> Describe how JSON and XML relate to SOAP and REST when implementing web services.
Answer Preview: SOAP vs REST vs JSON are frequently mentioned acronyms when speaking about web services. While SOAP …

, Chapter: 12 -Problem: 27 >> Design consistency within an Internet site is an important way to build customer loyalty and trustworthiness. Visit one of your favorite websites and analyze this site for design consistency. Your analysis should consider general layout, colors and fonts, labeling, links, and other such items.
Answer Preview: Consistency is a key factor in web design for both …

,

, Chapter: 13 -Problem: 30 >> What types of security policies and procedures does your university have in place for campus information systems?
Answer Preview: Our university has a number of security policies and procedures in place for campus …

, Chapter: 12 -Problem: 1 >> Stephanie Welsh worked for Petrie’s database administrator. She had been overseeing two interns who were helping her translate conceptual database designs into physical designs. As they were finishing up the task she had assigned to them, she realized that they would soon need something else to do.She called Sanjay Agarwal, one of the most talented interface designers in Petrie’s IT shop.“Hi Sanja
Answer Preview: 1 Based on guidelines and articles posted since the list in PE Figure 12-1 was compiled, some essential and relevant elements to the design of "No Customer Escapes" are: Mobile responsiveness: with th…

,

, Chapter: 14 -Problem: 15 >> According to Figure 14-4, corrective maintenance is by far the most frequent form of maintenance. What can you do as a systems analyst to reduce this form of maintenance? Figure 14-4 Transcribed Image Text: Maintenance Type Corrective-adds no value Preventive Perfective Adaptive
Answer Preview: Answer To reduce corrective conservation the answer is clear do a better job in assaying, designing, …

, Chapter: 12 -Problem: 15 >> Briefly describe the role of a content management system and its benefits.
Answer Preview: A CMS allows authors to make rapid changes to your con…

,

, Chapter: 13 -Problem: 1 >> What are the deliverables from coding, testing, and installation?
Answer Preview: The deliverables from coding, testing, and installation are…

, Chapter: 13 -Problem: 3 >> What are structured walk-throughs for code? What is their purpose? How are they conducted? How are they different from code inspections?
Answer Preview: Struct ured walk - through s for code are a process w…

,

, Chapter: 12 -Problem: 19 >> Suppose you were designing applications for a standard file server environment. One issue discussed in this chapter for this distributed processing environment is that the application software on each client PC must share in the responsibilities for data management. One data management problem that can arise is that applications running  concurrently on two clients may want to update the same data
Answer Preview: One approach to managing concurrent updates to the same data in a file server environment is to use …

, Chapter: 13 -Problem: 18 >> Which installation strategy would you recommend for PVF’s Purchasing Fulfillment System? Which would you recommend for Hoosier Burger’s inventory control system? If you recommended different approaches, please explain why. How is PVF’s case different from Hoosier Burger’s?
Answer Preview: For PVF a parallel or stage change will work better as it …

,

, Chapter: 12 -Problem: 30 >> In this chapter, file servers were described as one way of providing information to users of a distributed information system. What file servers are available, and what are their relative strengths, weaknesses, and costs? What other types of servers are available and/or for what other uses are file servers employed (e.g., print servers)?
Answer Preview: There are several types of file servers available , ranging from basic server software , to more rob…

, Chapter: 12 -Problem: 22 >> There is a strong movement toward wireless mobile computing using thin-client technology. Go to the Web and visit some of the major computer vendors that are producing thin-client products such as smartphones and tablets. Investigate the features of each category of device and prepare a report that contrasts each type of device on at least the following criteria: screen size, networking options an
Answer Preview: Screen Size Smartphones: Smartphones usually have small screens, ranging from 3 5 to 6 in…

,

, Chapter: 14 -Problem: 3 >> What are the different types of maintenance and how do they differ?
Answer Preview: The four types of maintenance are: 1. Preventive maintenance 2. Predict…

, Chapter: 12 -Problem: 29 >> Visit an organization that has installed a LAN. Explore the following questions.a. Inventory all application programs that are delivered to client PCs using a file server architecture. How many users use each application? What are their professional and technical skills? What business processes are supported by the application? What data are created, read, updated, or destroyed in each application
Answer Preview: Solution: a) LAN is installed in an organization. File server architecture is implemented by making a computer server for the other computers. All the …

,

, Chapter: 13 -Problem: 7 >> Explain Lucas’s model of implementation success.
Answer Preview: Answer: Lucas identified two methods for determining if an implementation has …

, Chapter: 12 -Problem: 21 >> You read in this chapter about the advantages of client/server architectures. What operational and management problems can be created by client/server architectures? Considering both the advantages and disadvantages of the client/server model, suggest the characteristics of an application that could be implemented in a client/server architecture.
Answer Preview: Problems that can arise in client/server architectures are : 1 Overloading of the system due to impr…

,

, Chapter: 12 -Problem: 28 >> Go to the Web and find a site that provides personalized content and a site that allows you to customize the site’s content to your preferences. Prepare a report that compares and contrasts personalization and customization. Is one method better than the other? Why or why not?
Answer Preview: TL;DR: In a science experiment, the controlled or const…

, Chapter: 12 -Problem: 34 >> The references in this chapter point to a number of sources that provide website design guidelines (see additional references in the References list). Visit these sites and summarize, in a report, guidelines not addressed in this chapter. Did you find inconsistencies or contradictions across the sites you studied? Why do these differences exist?
Answer Preview: A fixed value. In Algebra, a constant is a number on its own, …

,

, Chapter: 13 -Problem: 24 >> Discuss the role of a centralized training and support facility in a modern organization. Given advances in technology and the prevalence of self-training and consulting among computing end users, how can such a centralized facility continue to justify its existence?
Answer Preview: Let me first introduced Centralized …

, Chapter: 13 -Problem: 35 >> Talk with people you know who use computers in their work. Ask them to get copies of the user documentation they rely on for the systems they use at work. Analyze the documentation. Would you consider it good or bad? Support your answer. Whether good or bad, how might you improve it?
Answer Preview: What are the advantages of using a computer? Increase your productiv…

,

, Chapter: 13 -Problem: 37 >> Let’s say your professor has asked you to help him or her train a new secretary on how to prepare class notes for electronic distribution to class members. Your professor uses word-processing software and an e-mail package to prepare and distribute the notes. Assume the secretary knows nothing about either package. Prepare a user task guide that shows the secretary how to complete this task.
Answer Preview: To prepare class notes for electronic distribution, the secretary should follo…

, Chapter: 14 -Problem: 7 >> What managerial issues can be better understood by measuring maintenance effectiveness?
Answer Preview: Some managerial issues that can be better understo…

,

, Chapter: 9 -Problem: 28 >> Find a systems analyst or database administrator within a company that uses a database management system to organize the company’s corporate data. Ask this person to describe how he or she uses normalization and which level of normal form is used for each database table. Are all tables in third normal form? Why do they denormalize, if they do?
Answer Preview: I work as a systems analyst for a company that uses a relational datab…

, Chapter: 14 -Problem: 23 >> With the help of other students or your instructor, contact a system librarian in an organization. What is this person’s job description? What tools does this person use to help him or her in the job? To whom does this person report? What previous jobs did this person hold, and to what job does this person expect to be promoted in the near future?
Answer Preview: The system librarian's job is to maintain and update the library's …

,

, Chapter: 10 -Problem: 6 >> What type of labeling can you use in a table or list to improve its usability?
Answer Preview: We can use this labeling to improve the use table or …

, Chapter: 14 -Problem: 14 >> In what ways is a request to change an information system handled differently from a request for a new information system?
Answer Preview: There are a few key ways in which a request to change an information system is handled dif…

,

, Chapter: 3 -Problem: 35 >> Identify someone who manages an information systems project in an organization. Describe to him or her each of the project planning elements in Figure 3-9. Determine the extent to which each of these elements is part of that person’s project planning process. If that person is not able to perform some of these planning activities, or if he or she cannot spend as much time on any of these activitie
Answer Preview: ANSWER The person who manages an information systems project in our organization is the pr…

,

, Chapter: 12 -Problem: 2 >> Describe the limitations of a file server architecture.
Answer Preview: A file server is identified as a stand alone system. Because of dedicated file servers enable faster …

,

, Chapter: 5 -Problem: 34 >> Find an organization that does not use BPP for their IS projects. Why doesn’t this organization use this method? What are the advantages and disadvantages of not using this method? What benefits could be gained from implementing the use of BPP? What barriers are there to implementing this method?
Answer Preview: 1. Why doesnt this organization use this method? There could be a variety of reasons why an organiza…

, Chapter: 13 -Problem: 22 >> Why is it important to keep a history of test cases and the results of those test cases even after a system has been revised several times?
Answer Preview: Quite simply, the test cases are the cases which are necessary to test the system. Meeting a test ca…

, Chapter: 14 -Problem: 13 >> Maintenance has been presented as both the final stage of the SDLC (see Figure 14-1) and as a process similar to the SDLC (see Figure 14-3). Why does it make sense to talk about maintenance in both of these ways? Do you see a conflict in looking at maintenance in both ways?Figure 14-3 Transcribed Image Text:
Answer Preview: Solution; It makes sense to talk about maintenance both as a final stage and as a process similar to …

,

, Chapter: 7 -Problem: 1 >> Draw an activity diagram that models the following employee reimbursement process. Employees of West Nile Valley University have to follow a specific procedure to get reimbursed for travel they undertake on behalf of the university. First, they have to gather and prepare all of the receipts the university requires for reimbursement. At the same time, they complete the official reimbursement form.
Answer Preview: Activity diagram : Activity diagram is one of the UML diagram which is used to modeling the activiti…

, Chapter: 13 -Problem: 8 >> What is the difference between system documentation and user documentation?
Answer Preview: System documentation represents documents that describe the sys…

, Chapter: 13 -Problem: 16 >> What are the common security threats to systems? How can they be addressed?
Answer Preview: Common Network Security Threats Explained Computer virus. Rogue security software. Trojan horse. Adware and spyware. Computer worm. DOS and DDOS attack. Phishing. Rootkit. What are the solution of sec…

,

, Chapter: 6 -Problem: 1 >> Describe systems analysis and the major activities that occur during this phase of the systems development life cycle.
Answer Preview: Systems analysis is " the process of studying a procedure or business to identify its goal an…

, Chapter: 12 -Problem: 23 >> Building on the research conducted in Problem and Exercise 12-53, what challenges does each device present for designers when delivering an electronic commerce application? Are some devices more suitable for supporting some applications than others? Problem and Exercise 12-53There is a strong movement toward wireless mobile computing using thin-client technology. Go to the Web and visit some of th
Answer Preview: The challenges of delivering an electronic commerce application on each device vary depending on the …

, Chapter: 12 -Problem: 16 >> Under what circumstances would you recommend that a file server approach, as opposed to a client/server approach, be used for a distributed information system application? What warnings would you give the prospective user of this file server approach? What factors would have to change for you to recommend the move to a client/server approach?
Answer Preview: GIVEN THAT : step: 1 of 3 Circumstances where file server approach is more useful than client server: This is recommended for small organizations wher…

,

, Chapter: 6 -Problem: 23 >> Choose a work team at your work or university and interview them in a group setting. Ask them about their current system (whether computer-based or not) for performing their work. Ask each of them what information they use and/or need and from where/whom they get it. Was this a useful method for you to learn about their work? Why or why not? What comparative advantages does this method provide as
Answer Preview: Interview are very useful source to obtain detailed in formation about the personnel feeling,perception and opinion, they allow more detailed question they usually achieve a high respo

Additional Information

Book:
Modern Systems Analysis And Design
Isbn:
ISBN: 9780134204925
Edition:
8th Edition
Author:
Authors: Joseph Valacich, Joey George
Image:
6183695ca2740_2538.jpg

12 Reviews for Modern Systems Analysis And Design Textbook Questions And Answers

Rayan Curtis
awesome work
Declan Stein
Complete and original work. Wonderful job!
Joshua Knight
Thank u
Guillermo Durham
Hoemwork_Solutions is one stop shopping for educations. New students look no farther. If you an A this is where you come.
Rodolfo Escobar

Add a review

Your Rating

39227

Character Limit 400