Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) 1) is a form of user resistance where data are erroneously entered into a system. A) Aggravation B) Aggression C) Avoidance D) Acceptance 2)

image text in transcribed

1) 1) is a form of user resistance where data are erroneously entered into a system. A) Aggravation B) Aggression C) Avoidance D) Acceptance 2) 2) The method of gathering information helps to determine how a system actually works. A) questionnaire B) system documentation C) interview D) observation 3) 3) Identify the statement below that best describes a Gantt chart. A) A scatterplot diagram with activities on the Y access and dots representing the potential expenditures of each activity. B) A pie chart with the size of estimated expenditures represented as slices. C) A network of arrows and nodes representing project activities. D) A bar chart with project activities on the left-hand side and units of time across the top. 4) 4) Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the internal rate of return criterion? Payback NPV IRR A 4 $2.199 20.24% B 5 $201 11.81% 4.5 $1.851 19.64% D 3 $510 12.59% A) Project A B) Project B C) Project C D) Project D 5) 5) requires that all activities and the precedent and subsequent relationships among them be identified. A) A CASE diagram B) A PERT diagram C) A SDLC cycle D) A Gantt chart 6) 6) The least time-consuming method of collecting data for use in a systems survey is A) questionnaires. B) reviewing system documentation. C) observation. D) interviews. 7) 7) What are the best strategies for determining system requirements? A) Ask users what they need, analyze existing systems, examine existing system utilization, and develop concept of new system. B) Ask users what they need, analyze existing systems, develop concept of new system, and prototyping. C) Analyze existing systems, ask users what they need, prototyping, and monitoring. D) Ask users what they need, analyze existing systems, examine existing system utilization, and prototyping

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

How To Audit Anything The Pink Book Of Auditing Any Process

Authors: R. Alakbarov

1st Edition

1520195575, 978-1520195575

More Books

Students also viewed these Accounting questions

Question

Why is there a cost associated with retained earnings?

Answered: 1 week ago

Question

=+a) What shape should the sampling distribution of the mean have?

Answered: 1 week ago

Question

Create a workflow analysis.

Answered: 1 week ago