Eerste deeltentamen Modelleren en Systeemontwikkeling

Similar documents
Software Maintenance

IBM Software Group. Mastering Requirements Management with Use Cases Module 6: Define the System

Different Requirements Gathering Techniques and Issues. Javaria Mushtaq

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Nearing Completion of Prototype 1: Discovery

PROCESS USE CASES: USE CASES IDENTIFICATION

Implementing a tool to Support KAOS-Beta Process Model Using EPF

Online Marking of Essay-type Assignments

ADAPTIVE PLANNING. 1 Powered by POeT Solvers Limited

Software Development Plan

Three Strategies for Open Source Deployment: Substitution, Innovation, and Knowledge Reuse

Strategy and Design of ICT Services

Occupational Therapist (Temporary Position)

CPS122 Lecture: Identifying Responsibilities; CRC Cards. 1. To show how to use CRC cards to identify objects and find responsibilities

Ministry of Education, Republic of Palau Executive Summary

CERTIFIED PROJECT MANAGEMENT SPECIALIST (CPMS) STUDY GUIDE

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

Major Milestones, Team Activities, and Individual Deliverables

GACE Computer Science Assessment Test at a Glance

Get with the Channel Partner Program

Diploma in Library and Information Science (Part-Time) - SH220

Including the Microsoft Solution Framework as an agile method into the V-Modell XT

Description of Program Report Codes Used in Expenditure of State Funds

Visit us at:

STABILISATION AND PROCESS IMPROVEMENT IN NAB

Unit 7 Data analysis and design

Certified Six Sigma - Black Belt VS-1104

Davidson College Library Strategic Plan

Modeling user preferences and norms in context-aware systems

G95 SOFT SYSTEMS METHODOLOGY AND SIMULATION MODELING. Brian Lehaney. Ray 1. Paul. Faculty of Business University of Luton Luton, Beds, LUI 3m, UK

ESTABLISHING A TRAINING ACADEMY. Betsy Redfern MWH Americas, Inc. 380 Interlocken Crescent, Suite 200 Broomfield, CO

IT4305: Rapid Software Development Part 2: Structured Question Paper

PESIT SOUTH CAMPUS 10CS71-OBJECT-ORIENTED MODELING AND DESIGN. Faculty: Mrs.Sumana Sinha No. Of Hours: 52. Outcomes

STANDARD OPERATING PROCEDURES (SOP) FOR THE COAST GUARD'S TRAINING SYSTEM. Volume 7. Advanced Distributed Learning (ADL)

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

I N T E R P R E T H O G A N D E V E L O P HOGAN BUSINESS REASONING INVENTORY. Report for: Martina Mustermann ID: HC Date: May 02, 2017

Cambridge NATIONALS. Creative imedia Level 1/2. UNIT R081 - Pre-Production Skills DELIVERY GUIDE

PowerCampus Self-Service Student Guide. Release 8.4

Computer Science 141: Computing Hardware Course Information Fall 2012

TEACHING QUALITY: SKILLS. Directive Teaching Quality Standard Applicable to the Provision of Basic Education in Alberta

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2

Volunteer State Community College Strategic Plan,

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

An Open Framework for Integrated Qualification Management Portals

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

The IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs. 20 April 2011

Strategic Practice: Career Practitioner Case Study

Pod Assignment Guide

Orange Elementary School FY15 Budget Overview. Tari N. Thomas Superintendent of Schools

VIA ACTION. A Primer for I/O Psychologists. Robert B. Kaiser

Infrared Paper Dryer Control Scheme

An Introduction to Simio for Beginners

MINISTRY OF EDUCATION

Friday, October 3, 2014 by 10: a.m. EST

FY16 UW-Parkside Institutional IT Plan Report

La Grange Park Public Library District Strategic Plan of Service FY 2014/ /16. Our Vision: Enriching Lives

Administrative Services Manager Information Guide

WSU Five-Year Program Review Self-Study Cover Page

Evaluation of Systems Engineering Methods, Processes and Tools on Department of Defense and Intelligence Community Programs - Phase II

An Industrial Technologist s Core Knowledge: Web-based Strategy for Defining Our Discipline

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online

Software Development: Programming Paradigms (SCQF level 8)

LOOKING FOR (RE)DEFINING UNIVERSITY AUTONOMY

CENTRAL MAINE COMMUNITY COLLEGE Introduction to Computer Applications BCA ; FALL 2011

Master of Science (MS) in Education with a specialization in. Leadership in Educational Administration

Additional Qualification Course Guideline Computer Studies, Specialist

M55205-Mastering Microsoft Project 2016

Project Management for Rapid e-learning Development Jennifer De Vries Blue Streak Learning

Task Types. Duration, Work and Units Prepared by

Visual CP Representation of Knowledge

LEAD AGENCY MEMORANDUM OF UNDERSTANDING

WORK OF LEADERS GROUP REPORT

HOUSE OF REPRESENTATIVES AS REVISED BY THE COMMITTEE ON EDUCATION APPROPRIATIONS ANALYSIS

Is M-learning versus E-learning or are they supporting each other?

Houghton Mifflin Online Assessment System Walkthrough Guide

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

The Ohio State University Library System Improvement Request,

EDIT 576 DL1 (2 credits) Mobile Learning and Applications Fall Semester 2014 August 25 October 12, 2014 Fully Online Course

The Seven Habits of Effective Iterative Development

EdX Learner s Guide. Release

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

Examining the Structure of a Multidisciplinary Engineering Capstone Design Program

Designing Educational Computer Games to Enhance Teaching and Learning

Kristin Moser. Sherry Woosley, Ph.D. University of Northern Iowa EBI

On-Line Data Analytics

CIS 121 INTRODUCTION TO COMPUTER INFORMATION SYSTEMS - SYLLABUS

Programme Specification. MSc in International Real Estate

Generating Test Cases From Use Cases

Using SAM Central With iread

IMPORTANT STEPS WHEN BUILDING A NEW TEAM

CORE CURRICULUM FOR REIKI

MANAGEMENT CHARTER OF THE FOUNDATION HET RIJNLANDS LYCEUM

TEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD *

Abstract. Janaka Jayalath Director / Information Systems, Tertiary and Vocational Education Commission, Sri Lanka.

The Characteristics of Programs of Information

Position Statements. Index of Association Position Statements

PROPOSAL FOR NEW UNDERGRADUATE PROGRAM. Institution Submitting Proposal. Degree Designation as on Diploma. Title of Proposed Degree Program

HSMP 6611 Strategic Management in Health Care (Strg Mgmt in Health Care) Fall 2012 Thursday 5:30 7:20 PM Ed 2 North, 2301

Statewide Strategic Plan for e-learning in California s Child Welfare Training System

Leader s Guide: Dream Big and Plan for Success

Transcription:

Eerste deeltentamen Modelleren en Systeemontwikkeling donderdag 18 december 2003, 12:00 13:30 1. Internal quality factors are properties of a software product that a. influence their ability to react appropriately to abnormal conditions b. are perceptible only to computer professionals who have access to the actual software text c. are perceptible to those who purchase the software or contract out its development d. ensure that the software may serve for the construction of many different applications e. determine the demands placed on hardware resources, such as processor time, space occupied in internal and external memories, bandwidth used in communication devices 2. Portability is a. the ease of transferring software products to various hardware and software environments b. the ease of adapting software products to changes of specification c. the ability of software elements to serve for the construction of many different applications d. the ease with which people of various backgrounds and qualifications can learn to use software products and apply them to solve problems e. the ease of installation, operation and monitoring 3. Objects are characterized by a. reliability, modularity and flexibility b. flexibility, compatibility and portability c. identity, state and behaviour d. state, behaviour and inheritance e. overriding and overloading 4. Let Professor be a subtype of Person. The definition Person p = new Professor(); has the effect that a. p has static type Professor and dynamic type Person b. p has static type Person and dynamic type Professor c. p has static and dynamic type Person d. p has static and dynamic type Professor e. a compiler error message will be generated 5. The Liskov Substitution Principle states that a. a class should be open for extension but closed for modification b. code duplication should be avoided in the interest of extendibility c. clients should access services through an interface or abstract class d. subclasses should be able to perform all the tasks of their superclass e. methods should guarantee invariants even if they raise an exception 1/7

6. The four phases of the Systems Development Life Cycle are. a. analysis, gathering, modeling, and diagramming b. construction, installation, testing, and converting c. designing, charting, formatting, and structuring d. planning, analysis, design, and implementation e. system request, feasibility, planning, and staffing 7. The analysis phase of the SDLC answers which questions. a. who will create the system and when will it be used b. who will the system be for, what the system will do, when will it be used, and where will it be used c. why build the system, what the system will be, and how the system will work d. why build the system, who will the system be for, when will it be used, and how the system will work e. why build the system, who will the system be for, when will it be used, and where will it be used 8. The principal disadvantage(s) with the waterfall development methodology is (are). a. a long time elapses between completion of the system proposal and the delivery of the system b. it identifies system requirements long before programming begins c. it minimizes changes to the requirements as the project proceeds d. the design must be completely specified on paper before programming begins e. a long time elapses between completion of the system proposal and the delivery of the system and the design must be completely specified on paper before programming begins 9. When the methodology requires that the system be broken into a series of versions that are developed sequentially, the analyst is performing development. a. parallel b. phased c. prototyping d. rapid Application e. throwaway prototyping 10. Modern object-oriented systems analysis and design approaches using UML emphasize and development that undergoes continuous testing and refinement throughout the life of the project. a. iterative, incremental b. quick, dirty c. slow, methodical d. quick, incremental e. iterative, methodical 2/7

11. The of a system describes why the information system should be built and why it should be funded. a. project sponsor b. business need c. functionality d. expected value e. feasibility analysis 12. Which of the following factors could be included in a technical risk assessment? a. Cost of a new Web server b. Cost of hiring a Webmaster c. No previous use of Java within the IS department d. Some fear of job loss among order entry department personnel e. All of the above 13. Examples of development costs include all EXCEPT. a. consultant fees b. hardware expenses c. salaries for the project team d. software licensing fees 14. The organizational management of a business may perform which one of the following roles? a. allocating time to the project b. encouraging users to accept the project c. making decisions that influence the project d. initiating the project e. providing resources 15. Kathryn has little experience estimating the time it will take to complete a systems project. She has just completed the planning phase of the project. What method should she use to estimate the time required to build the system? a. adjusted project complexity b. function points c. industry standards d. Microsoft Project e. more complex approach 16. When estimating the project time schedule after the size of a project has been determined, the next step is to estimate the that is required for each task. a. abundance b. effort c. function point d. system size e. time 3/7

17. The project team has just determined that the deadline for completion will not be met. In order to deliver a high quality system on schedule, the team has requested that the features be prioritized. has been applied to this project. a. Effort estimation b. Function points analysis c. RAD d. Schedule time e. Timeboxing 18. A good technique to help minimize conflict among team members is to a. clearly define their roles on the project b. hold team members accountable for their tasks c. develop a project charter that lists the project s norms d. develop a project charter that lists the project s ground rules e. all of the above are good techniques to use 19. The most common reason for schedule and cost overruns that surface after the project is underway is. a. scope creep b. the lack of a project manager c. the use of meetings to define project requirements d. the use of prototyping to define project requirements 20. requires technology skills and significant business expertise in the functional area being examined. a. Buying a PC b. Coding the to-be-system c. Identifying improvement opportunities d. Planning a CASE analysis e. Writing a systems proposal 21. Omar has decided to ask the users and managers to identify problems with the current system and to recommend how to solve these problems in the future system. They have recommended small incremental changes. Omar is identifying improvement opportunities through. a. duration analysis b. outcome analysis c. problem analysis d. root cause analysis e. technology analysis 22. Hussain, a systems analyst for State University, has organized a group of systems people from six universities for regular meetings, campus visits, and cost information sharing. This is an example of benchmarking. a. formal b. informal c. outcome d. proxy e. simplification 4/7

23. Gwynne has eliminated the complexity of the day-to-day operations for the order entry system at Lands End by moving special cases to exception processes. She is identifying improvement opportunities through. a. activity elimination b. breaking assumptions c. outcome analysis d. process simplification e. technology analysis 24. An interview style that seeks a broad and roughly defined set of information is commonly called. a. closed b. open c. structured d. unstructured 25. A systems analyst would like to run a well-structured JAD session. The least common type of question asked should be. a. bottom ended b. closed ended c. long and detailed d. open ended e. unstructured 26. Each use case is associated with role(s) that users have in the system. a. one b. one or more c. many d. zero, one, or more e. all 27. The event that causes a use case to begin is called a(n). a. action b. trigger c. hammer d. anvil e. stakeholder 28. Use cases are typically written to document the normal flow of events. When an exception occurs in that flow, it is documented in the use case with flows. a. alternate b. extended c. optional d. included e. loop 5/7

29. The correct sequence of the major steps in creating use case diagrams is. a. identify the major use cases, expand the major use cases, confirm the major use cases, create the use-case diagram b. identify the major use cases, expand the major use cases, create the use-case diagram, confirm the major use cases c. create the use-case diagram, identify the major use cases, expand the major use cases, confirm the major use cases d. create the use-case diagram, identify the major use cases, confirm the major use cases, expand the major use cases e. identify the major use cases, confirm the major use cases, expand the major use cases, create the use-case diagram 30. When drawing the use-case diagram, an analyst should do the steps in this order:. a. draw the use cases on the diagram, identify the system boundary, place the actors on the diagram, and draw the lines connecting the actors to the use cases b. identify the system boundary, draw the use cases on the diagram, place the actors on the diagram, and draw the lines connecting the actors to the use cases c. place the actors on the diagram, draw the use cases on the diagram, identify the system boundary, and draw the lines connecting the actors to the use cases d. identify the system boundary, place the actors on the diagram, draw the use cases on the diagram, and draw the lines connecting the actors to the use cases gives the correct order of steps 31. Which of the following are used to create objects? a. concrete objects b. abstract objects c. concrete classes d. abstract classes e. concrete instances 32. Which of the following would most likely not be an example of an attribute? a. employee name b. customer address c. stock number d. ISBN number e. cancel appointment 33. If a student signs up for a class, which type of relationship would you use to model the relationship between the two? a. generalization b. association c. aggregation d. composition e. implementation 34. A collaboration consists of. a. two instances of a class talking with each other b. two instances of a class knowing the value of each others attributes c. a set of classes that share common operations d. a set of classes that are all related to one another e. a set of classes involved in a use case 6/7

35. Attributes and operations marked by # in a class diagram are. a. visible in subclasses and in the package b. calculated from other attributes c. visible everywhere d. visible only within the same class e. stored at the class level rather than the object level 36. A systems analyst uses to model the changes that occur in the underlying data in a system. a. use-case models b. structural models c. behavioral models d. interaction diagrams e. statechart diagrams 37. A systems analyst draws a lifeline with an X at the end. This lifeline represents. a. a message that cannot be delivered b. an object that is destroyed at a point in time c. a message that is delivered at that point in time d. an object that is complete at that point in time e. an object that arrives at its final destination 38. On a sequence diagram, an object name of Students:List would indicate that. a. Students is an instance of the List class b. List is an instance of the Students class c. List is a method of the Students class d. the Students and Lists objects are combined for that step in the sequence diagram e. a message is being passed from the Students class to the List class 39. When an object sends a message to itself in a sequence diagram, that is referred to as. a. recursive-messaging b. self-messaging c. self-delegation d. recursive-delegation 40. In a statechart diagram, a(n) triggers a change in an object s state. a. event b. transition c. activity d. initial state e. final state 7/7