Systems Analysis And Desig, 10th Edition Test Bank

Systems Analysis And Desig, 10th Edition Test Bank prepares you thoroughly with real-world examples, key concepts, and solved practice questions.

James Carter
Contributor
4.7
60
5 months ago
Preview (16 of 107 Pages)
100%
Purchase to unlock

Loading document content...

Preview Mode

Sign in to access the full document!

Systems Analysis And Desig, 10th Edition Test Bank

Page 1

1. A(n) _____ combines technology, people, and data to provide support for business functions. a. server farm b. information system c. object - oriented analysis d. preliminary investigation Analysis: a. Incorrect. See [Page 5 ] b. Correct. c. Incorrect. See [Page 5 ] d. Incorrect. See [Page 5 ] 2. ____ systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision making. a. Business support b. User support c. Network administration d. Application development Analysis: a. Correct . b. Incorrect. See [Page 16 ] c. Incorrect. See [Page 16 ] d. Incorrect. See [Page 16 ] 3. When using a( n) _____ method, system development is organized into phases, with deliverables and milestones to measure progress. a. object - oriented analysis b. adaptive c. structured analysis d. agile Analysis: a. Inc orrect . See [Page 21 ] b. Incorrect. See [Page 2 1 ] c. Correct. d. Incorrect. See [Page 21 ]

Page 2

Page 3

4. The purpose of the _____ phase is to build a logical model of the new system. a. systems analysis b. systems design c. systems implementation d. systems support and security Analysis: a. Correct. b. Incorrect. See [Page 2 3 ] c. Inc orrect. See [Page 2 3 ] d. Incorrect. See [Page 2 3 ] 5. _____ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test. a. Quality c ontrol b. Certification c. Technology knowledge d. A college degree Analysis: a. Incorrect. See [Page 31 ] b. Correct. c. Inc orrect. See [Page 31 ] d. Incorrect. See [Page 31 ] 6. If a site has a large number of remote clients, the _____ group often includes a deployment team that installs a nd configures the workstations. a. network administration b. application development c. user support d. systems support and security Analysis: a. Incorrect. See [Page 28] b. Incorrect. See [Page 28 ] c. Inc orrect. See [Page 28 ] d. Correct.

Page 4

7. _____ is a popular tool that systems analysts can use to create business process diagrams, flow chart s , and organization charts. a. Microsoft Visio b. CASE c. EDI d. ERP Analysis: a. Correct. b. Incorrect. See [Page 19 ] c. Inc orrect. See [Page 19 ] d. Incorrect. See [Page 19 ] 8. The main objective of _____ is to integrate a company’s primary functions to improve efficiency, reduce costs, and help ma nagers make key decisions. a. transaction processing b. enterprise computing c. business support d. knowledge management Analysis: a. Incorrect. See [Page 15] b. Correct. c. Inc orrect. See [Page 15 ] d. Incorrect. See [Page 15 ] 9. _____ tools provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysi s and object - oriented analysis. a. Computer - aided systems engineering b. Rapid application development c. Joint application development d. Enterprise resource planning Analysis: a. Correct. b. Incorrect. See [Page 2 0 ] c. Inc orrect. See [Page 2 0 ] d. Incorrect. See [Page 20 ]

Page 5

10. _____ are often the company’s best line of defense against an IT disaster involving a system that is technically sound, but fails because it doesn’t meet the needs of users and managers. a. Top managers b. Knowledge workers c. Systems analysts d. Stakeholders Analysis: a. Incorrect. See [Page 29 ] b. Incorrect. See [Page 2 9] c. Correct. d. Incorrect. See [Page 29 ]

Page 6

1. A _____ looks beyond day - to - day activities and focuses on a horizon that is three, five, ten, or more years in the future . a. s trategic plan b. SWOT analysis c. business case d. critical success factor Analysis: a. Correct. b. Incorrect. See [Page 5 0 ] c. Incorrect . See [Page 50] d. Incorrect. See [Page 5 0 ] 2. The term _____ refers to the reasons, or justification, for a proposal . a. strategic planning b. SWOT analysis c. business case d. critical success factor Analysis: a. Incorrect. See [Page 5 4] b. Incorrect. See [Page 5 4] c. Correct . d. Incorrect. See [Page 5 4] 3. A (n) _____ is a hardware - based security control that can identify a person by a retina scan or by mapping a facial pattern . a. encryption b. biometric device c. RFID d. EPC Analysis: a. Incorrect. See [Page 56 ] b. Correct. c. Incorrect. See [Page 56 ] d. Incorrect. See [Page 56 ] 4. _ ____ inventory systems rely on computer - to - computer data exchange to minimize unnecessary inventory .

Page 7

a. CRM b. RFID c. EPC d. J IT Analysis: a. Incorrect . See [Page 58] b. Incorrect. See [Page 58 ] c. Incorrect. See [Page 58 ] d. Correct. 5. The IT director usually serves as a technical consultant to ensure that members of the _____ are aware of crucial issues, problems, and opportunities . a. business case b. systems review committee c. preliminary investigation d. discretionary project Analysis: a. Incorrect. See [Page 60 ] b. Correct. c. Incorrect. See [Page 60 ] d. Incorrect. See [Page 60 ] 6. ____ feasibility means that a proposed system will be used effectively after it has been developed . a. Schedule b. Economic c. Technical d. Operational Analysis: a. Incorrect. See [Page 62 ] b. Incorrect. See [Page 62 ] c. Incorrect. See [Page 62 ] d. Correct. 7. A system’s _____ includes ongoing system support and maintenance costs , as well as acquisition costs . a. total cost of ownership

Page 8

b. tangible cost c. intangible cost d. constraint Analysis: a. Correct. b. Inc orrect. See [Page 63] c. Incorrect. See [Page 63 ] d. Incorrect. See [Page 63 ] 8. A popular technique for investigating causes and effects is called a _ ____. e. Pareto chart f. fishbone diagram g. SWOT analysis h. scatter diagram Analysis: a. Incorrect. See [Page 67 ] b. Correct. c. Incorrect. See [Page 67 ] d. Incorrect. See [Page 67 ] 9. The _____ is the primary method of obtaining information during the preliminary investigation . a. documentation review b. interview c. survey d. data analysis Analysis: a. Incorrect. See [Page 69 ] b. Correct. c. Incorrect. See [Page 69 ] d. Incorrect. See [Page 69 ] 10. The final task in the preliminary investigation is to prepare a report to management that includes an evaluation of the systems request, an estimate of costs and benefits, and a _____ , which is a summary of the project request and a specific recommendation . a. total cost of ownership b. business case c. case for action

Page 9

d. project scope Analysis: a. Incorrect. See [Page 74 ] b. Incorrect. See [Page 74 ] c. Correct. d. Incorrect. See [Page 74 ]

Page 10

1. Project _____ involves selecting and staffing a project team and assigning specific tasks to team members . a. reporting b. scheduling c. monitoring d. planning Analysis: a. Inc orrect. See [Page 92] b. Correct. c. Incorrect . See [Page 92 ] d. Incorrect. See [Page 92 ] 2. A project manager can use a _____ to convert task start and finish times to actual dates by laying out an entire project on a calenda r . a. Gantt chart b. quantitative risk analysis c. PERT chart d. structured walk - through Analysis: a. Incorrect. See [Page 93 ] b. Incorrect. See [Page 93 ] c. Correct . d. Incorrect. See [Page 93 ] 3. The pattern of tasks for a large project can be broken down into _____ tasks, multiple successor tasks, and multiple predecessor tasks . a. dependent b. activity c. critical d. milestone Analysis: a. Correct. b. Inc orrect. See [Page 99] c. Incorrect. See [Page 99 ] d. Incorrect. See [Page 99 ]

Page 11

4. The completion of a project will be delayed if any task on the _ ____ falls behind schedule . a. risk management plan b. work breakdown structure c. testing review d. critical path Analysis: a. Incorrect . See [Page 102 ] b. Incorrect. See [Page 102 ] c. Incorrect. See [Page 102 ] d. Correct. 5. Many project managers institute _____ , which are review s of a project team member’s work by other members of the team . a. predecessor tasks b. structured walk - through s c. probable - case estimates d. project triangles Analysis: a. Incorrect. See [Page 103 ] b. Correct. c. Incorrect. See [Page 103 ] d. Incorrect. See [Page 103 ] 6. When the project manager provides status reports to management and users, _____ are often included as a means for showing the project’s status graphically . a. critical paths b. task patterns c. design reviews d. Gantt charts Analysis: a. Incorrect. See [Page 105 ] b. Incorrect. See [Page 105 ] c. Incorrect. See [Page 105 ] d. Correct.

Page 12

7. If a predecessor task has more than one successor task, the predecessor task’s finish time is used to determine the start time for all _____ tasks . a. successor b. predecessor c. dependent d. con current Analysis: a. Correct. b. Inc orrect. See [Page 106 ] c. Incorrect. See [Page 106 ] d. Incorrect. See [Page 106 ] 8. _ ____ offers several levels of business applications, including proj ect management, and has a plan that is available free of charge with unlimited duration . a. Microsoft Project b. Apptivo c. GanttProject d. RiskyProject Professional Analysis: a. Incorrect. See [Page 111 ] b. Correct. c. Incorrect. See [Page 111 ] d. Incorrect. See [Page 111 ] 9. The _____ is effective if the overall impact of a risk can be reduced by triggering timely and appropriate action . a. quantitative analysis b. risk management plan c. risk response plan d. qualitative analysis Analysis: a. Incorrect. See [Page 112 ] b. Incorrect. See [Page 112] c. Correct. d. Incorrect. See [Page 112 ]

Page 13

10. When an information system does not meet _____ , causes might include inadequately defined scope, imprecise targets, and lack of change control procedures . a. budget requirements b. schedule requirements c. business requirements d. probable - case estimates Analysis: a. Incorrect. See [Page 113 ] b. Incorrect. See [Page 113 ] c. Correct. d. Incorrect. See [Page 113 ]

Page 14

1. _____ provide(s) a fast - track approach to a full spectrum of systems development tasks, including planning, design, construction, and implementation . a. Joint application development b. Rapid application development c. Agile methods d. Rapid Economic Justification Analysis: a. Inc orrect. See [Page 133 ] b. Correct. c. Incorrect . See [Page 133 ] d. Incorrect. See [Page 133 ] 2. In a typical JAD session, the _____ explains the reason for the project and expresses top management authorization and support . a. project owner b. project leader c. recorder d. systems analyst Analysis: a. Correct. b. Incorrect. See [Page 135 ] c. Inco rrect . See [Page 135] d. Incorrect. See [Page 135 ] 3. Modeling involves graphical methods and _____ language that represent the system at various stages of development. a. open - ended b. closed - ended c. technical d. nontechnical Analysis: a. Incorrect . See [Page 139] b. Inc orrect. See [Page 13 9] c. Incorrect. See [Page 13 9 ] d. Correct.

Page 15

4. A user assumes the role of a(n) _ ____ in a use case diagram . a. recorder b. project sponsor c. project leader d. actor Analysis: a. Incorrect . See [Page 1 41 ] b. Incorrect. See [Page 1 41 ] c. Incorrect. See [Page 1 41 ] d. Correct. 5. Information about projected future volume for all outputs, inputs, and processes is required in order to evaluate _____ . a. sampling b. scalability c. agile methods d. range - of - response questions Analysis: a. Incorrect. See [Page 1 45 ] b. Correct. c. Incorrect. See [Page 1 45 ] d. Incorrect. See [Page 1 45 ] 6. In a(n) _____ structure , some people have more influence or knowledge than appears on an organization chart . a. security b. observational c. informal d. formal Analysis: a. Incorrect. See [Page 1 49 ] b. Incorrect. See [Page 1 49 ] c. Correct. d . Incorrect. See [Page 1 49 ]

Page 16

7. I t is important for the interviewer to record facts and evaluate information following an interview because studies have shown that _ ____ percent of a conversation is forgotten within 30 minutes . a. 50 b. 75 c. 25 d. 33 Analysis: a. Correct. b. Inc orrect. See [Page 1 52 ] c. Incorrect. See [Page 1 52 ] d. Incorrect. See [Page 1 52 ] 8. A(n) _ ____ form, which is an alternative to a traditional paper - based survey, can be used to collect data on the Internet or a company intranet . a. open - ended b. fill - in c. closed - ended d. data flow Analysis: a. Incorrect. See [Page 1 57 ] b. Correct. c. Incorrect. See [Page 1 57 ] d. Incorrect. See [Page 1 57 ] 9. When performing research regarding a vendor’s software, it could be beneficial to make a(n) _____ to observe the system in use at another location . a. scrum b. histogram c. site visit d. data flow diagram Analysis: a. Incorrect. See [Page 1 59 ] b. Incorrect. See [Page 1 59 ] c. Correct. d. Incorrect. See [Page 1 59 ]
1. A(n) _____ combines technology, people, and data to provide support for business functions. a. server farm b. information system c. object - oriented analysis d. preliminary investigation Analysis: a. Incorrect. See [Page 5 ] b. Correct. c. Incorrect. See [Page 5 ] d. Incorrect. See [Page 5 ] 2. ____ systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision making. a. Business support b. User support c. Network administration d. Application development Analysis: a. Correct . b. Incorrect. See [Page 16 ] c. Incorrect. See [Page 16 ] d. Incorrect. See [Page 16 ] 3. When using a( n) _____ method, system development is organized into phases, with deliverables and milestones to measure progress. a. object - oriented analysis b. adaptive c. structured analysis d. agile Analysis: a. Inc orrect . See [Page 21 ] b. Incorrect. See [Page 2 1 ] c. Correct. d. Incorrect. See [Page 21 ] 4. The purpose of the _____ phase is to build a logical model of the new system. a. systems analysis b. systems design c. systems implementation d. systems support and security Analysis: a. Correct. b. Incorrect. See [Page 2 3 ] c. Inc orrect. See [Page 2 3 ] d. Incorrect. See [Page 2 3 ] 5. _____ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test. a. Quality c ontrol b. Certification c. Technology knowledge d. A college degree Analysis: a. Incorrect. See [Page 31 ] b. Correct. c. Inc orrect. See [Page 31 ] d. Incorrect. See [Page 31 ] 6. If a site has a large number of remote clients, the _____ group often includes a deployment team that installs a nd configures the workstations. a. network administration b. application development c. user support d. systems support and security Analysis: a. Incorrect. See [Page 28] b. Incorrect. See [Page 28 ] c. Inc orrect. See [Page 28 ] d. Correct. 7. _____ is a popular tool that systems analysts can use to create business process diagrams, flow chart s , and organization charts. a. Microsoft Visio b. CASE c. EDI d. ERP Analysis: a. Correct. b. Incorrect. See [Page 19 ] c. Inc orrect. See [Page 19 ] d. Incorrect. See [Page 19 ] 8. The main objective of _____ is to integrate a company’s primary functions to improve efficiency, reduce costs, and help ma nagers make key decisions. a. transaction processing b. enterprise computing c. business support d. knowledge management Analysis: a. Incorrect. See [Page 15] b. Correct. c. Inc orrect. See [Page 15 ] d. Incorrect. See [Page 15 ] 9. _____ tools provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysi s and object - oriented analysis. a. Computer - aided systems engineering b. Rapid application development c. Joint application development d. Enterprise resource planning Analysis: a. Correct. b. Incorrect. See [Page 2 0 ] c. Inc orrect. See [Page 2 0 ] d. Incorrect. See [Page 20 ] 10. _____ are often the company’s best line of defense against an IT disaster involving a system that is technically sound, but fails because it doesn’t meet the needs of users and managers. a. Top managers b. Knowledge workers c. Systems analysts d. Stakeholders Analysis: a. Incorrect. See [Page 29 ] b. Incorrect. See [Page 2 9] c. Correct. d. Incorrect. See [Page 29 ] 1. A _____ looks beyond day - to - day activities and focuses on a horizon that is three, five, ten, or more years in the future . a. s trategic plan b. SWOT analysis c. business case d. critical success factor Analysis: a. Correct. b. Incorrect. See [Page 5 0 ] c. Incorrect . See [Page 50] d. Incorrect. See [Page 5 0 ] 2. The term _____ refers to the reasons, or justification, for a proposal . a. strategic planning b. SWOT analysis c. business case d. critical success factor Analysis: a. Incorrect. See [Page 5 4] b. Incorrect. See [Page 5 4] c. Correct . d. Incorrect. See [Page 5 4] 3. A (n) _____ is a hardware - based security control that can identify a person by a retina scan or by mapping a facial pattern . a. encryption b. biometric device c. RFID d. EPC Analysis: a. Incorrect. See [Page 56 ] b. Correct. c. Incorrect. See [Page 56 ] d. Incorrect. See [Page 56 ] 4. _ ____ inventory systems rely on computer - to - computer data exchange to minimize unnecessary inventory . a. CRM b. RFID c. EPC d. J IT Analysis: a. Incorrect . See [Page 58] b. Incorrect. See [Page 58 ] c. Incorrect. See [Page 58 ] d. Correct. 5. The IT director usually serves as a technical consultant to ensure that members of the _____ are aware of crucial issues, problems, and opportunities . a. business case b. systems review committee c. preliminary investigation d. discretionary project Analysis: a. Incorrect. See [Page 60 ] b. Correct. c. Incorrect. See [Page 60 ] d. Incorrect. See [Page 60 ] 6. ____ feasibility means that a proposed system will be used effectively after it has been developed . a. Schedule b. Economic c. Technical d. Operational Analysis: a. Incorrect. See [Page 62 ] b. Incorrect. See [Page 62 ] c. Incorrect. See [Page 62 ] d. Correct. 7. A system’s _____ includes ongoing system support and maintenance costs , as well as acquisition costs . a. total cost of ownership b. tangible cost c. intangible cost d. constraint Analysis: a. Correct. b. Inc orrect. See [Page 63] c. Incorrect. See [Page 63 ] d. Incorrect. See [Page 63 ] 8. A popular technique for investigating causes and effects is called a _ ____. e. Pareto chart f. fishbone diagram g. SWOT analysis h. scatter diagram Analysis: a. Incorrect. See [Page 67 ] b. Correct. c. Incorrect. See [Page 67 ] d. Incorrect. See [Page 67 ] 9. The _____ is the primary method of obtaining information during the preliminary investigation . a. documentation review b. interview c. survey d. data analysis Analysis: a. Incorrect. See [Page 69 ] b. Correct. c. Incorrect. See [Page 69 ] d. Incorrect. See [Page 69 ] 10. The final task in the preliminary investigation is to prepare a report to management that includes an evaluation of the systems request, an estimate of costs and benefits, and a _____ , which is a summary of the project request and a specific recommendation . a. total cost of ownership b. business case c. case for action d. project scope Analysis: a. Incorrect. See [Page 74 ] b. Incorrect. See [Page 74 ] c. Correct. d. Incorrect. See [Page 74 ] 1. Project _____ involves selecting and staffing a project team and assigning specific tasks to team members . a. reporting b. scheduling c. monitoring d. planning Analysis: a. Inc orrect. See [Page 92] b. Correct. c. Incorrect . See [Page 92 ] d. Incorrect. See [Page 92 ] 2. A project manager can use a _____ to convert task start and finish times to actual dates by laying out an entire project on a calenda r . a. Gantt chart b. quantitative risk analysis c. PERT chart d. structured walk - through Analysis: a. Incorrect. See [Page 93 ] b. Incorrect. See [Page 93 ] c. Correct . d. Incorrect. See [Page 93 ] 3. The pattern of tasks for a large project can be broken down into _____ tasks, multiple successor tasks, and multiple predecessor tasks . a. dependent b. activity c. critical d. milestone Analysis: a. Correct. b. Inc orrect. See [Page 99] c. Incorrect. See [Page 99 ] d. Incorrect. See [Page 99 ] 4. The completion of a project will be delayed if any task on the _ ____ falls behind schedule . a. risk management plan b. work breakdown structure c. testing review d. critical path Analysis: a. Incorrect . See [Page 102 ] b. Incorrect. See [Page 102 ] c. Incorrect. See [Page 102 ] d. Correct. 5. Many project managers institute _____ , which are review s of a project team member’s work by other members of the team . a. predecessor tasks b. structured walk - through s c. probable - case estimates d. project triangles Analysis: a. Incorrect. See [Page 103 ] b. Correct. c. Incorrect. See [Page 103 ] d. Incorrect. See [Page 103 ] 6. When the project manager provides status reports to management and users, _____ are often included as a means for showing the project’s status graphically . a. critical paths b. task patterns c. design reviews d. Gantt charts Analysis: a. Incorrect. See [Page 105 ] b. Incorrect. See [Page 105 ] c. Incorrect. See [Page 105 ] d. Correct. 7. If a predecessor task has more than one successor task, the predecessor task’s finish time is used to determine the start time for all _____ tasks . a. successor b. predecessor c. dependent d. con current Analysis: a. Correct. b. Inc orrect. See [Page 106 ] c. Incorrect. See [Page 106 ] d. Incorrect. See [Page 106 ] 8. _ ____ offers several levels of business applications, including proj ect management, and has a plan that is available free of charge with unlimited duration . a. Microsoft Project b. Apptivo c. GanttProject d. RiskyProject Professional Analysis: a. Incorrect. See [Page 111 ] b. Correct. c. Incorrect. See [Page 111 ] d. Incorrect. See [Page 111 ] 9. The _____ is effective if the overall impact of a risk can be reduced by triggering timely and appropriate action . a. quantitative analysis b. risk management plan c. risk response plan d. qualitative analysis Analysis: a. Incorrect. See [Page 112 ] b. Incorrect. See [Page 112] c. Correct. d. Incorrect. See [Page 112 ] 10. When an information system does not meet _____ , causes might include inadequately defined scope, imprecise targets, and lack of change control procedures . a. budget requirements b. schedule requirements c. business requirements d. probable - case estimates Analysis: a. Incorrect. See [Page 113 ] b. Incorrect. See [Page 113 ] c. Correct. d. Incorrect. See [Page 113 ] 1. _____ provide(s) a fast - track approach to a full spectrum of systems development tasks, including planning, design, construction, and implementation . a. Joint application development b. Rapid application development c. Agile methods d. Rapid Economic Justification Analysis: a. Inc orrect. See [Page 133 ] b. Correct. c. Incorrect . See [Page 133 ] d. Incorrect. See [Page 133 ] 2. In a typical JAD session, the _____ explains the reason for the project and expresses top management authorization and support . a. project owner b. project leader c. recorder d. systems analyst Analysis: a. Correct. b. Incorrect. See [Page 135 ] c. Inco rrect . See [Page 135] d. Incorrect. See [Page 135 ] 3. Modeling involves graphical methods and _____ language that represent the system at various stages of development. a. open - ended b. closed - ended c. technical d. nontechnical Analysis: a. Incorrect . See [Page 139] b. Inc orrect. See [Page 13 9] c. Incorrect. See [Page 13 9 ] d. Correct. 4. A user assumes the role of a(n) _ ____ in a use case diagram . a. recorder b. project sponsor c. project leader d. actor Analysis: a. Incorrect . See [Page 1 41 ] b. Incorrect. See [Page 1 41 ] c. Incorrect. See [Page 1 41 ] d. Correct. 5. Information about projected future volume for all outputs, inputs, and processes is required in order to evaluate _____ . a. sampling b. scalability c. agile methods d. range - of - response questions Analysis: a. Incorrect. See [Page 1 45 ] b. Correct. c. Incorrect. See [Page 1 45 ] d. Incorrect. See [Page 1 45 ] 6. In a(n) _____ structure , some people have more influence or knowledge than appears on an organization chart . a. security b. observational c. informal d. formal Analysis: a. Incorrect. See [Page 1 49 ] b. Incorrect. See [Page 1 49 ] c. Correct. d . Incorrect. See [Page 1 49 ] 7. I t is important for the interviewer to record facts and evaluate information following an interview because studies have shown that _ ____ percent of a conversation is forgotten within 30 minutes . a. 50 b. 75 c. 25 d. 33 Analysis: a. Correct. b. Inc orrect. See [Page 1 52 ] c. Incorrect. See [Page 1 52 ] d. Incorrect. See [Page 1 52 ] 8. A(n) _ ____ form, which is an alternative to a traditional paper - based survey, can be used to collect data on the Internet or a company intranet . a. open - ended b. fill - in c. closed - ended d. data flow Analysis: a. Incorrect. See [Page 1 57 ] b. Correct. c. Incorrect. See [Page 1 57 ] d. Incorrect. See [Page 1 57 ] 9. When performing research regarding a vendor’s software, it could be beneficial to make a(n) _____ to observe the system in use at another location . a. scrum b. histogram c. site visit d. data flow diagram Analysis: a. Incorrect. See [Page 1 59 ] b. Incorrect. See [Page 1 59 ] c. Correct. d. Incorrect. See [Page 1 59 ]

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all