Apllication Desing Flashcards
1
Q
What is Application Profile?
A
- describes the application we intend to build
- includes all of our assumptions, requirements, and specifications, project participants, an executive summary, and a project timeline. (Application Sizing)
- to project stakeholders for review, to gain approval for the project before we begin development
- presents the vision and direction for our project.
- template is provided (can be adjusted)
2
Q
What is set to generate an Application Profile?
A
Project Name, Organization Name, Project Led By, Implementation Methodology, Document Process Images
3
Q
What is set to generate an Specification Document?
A
- Specifications to Include (select from a list)
- Include Change Log (checkbox)
- Include Accesptance Criteria (checkbox)
- Include Linked Requirements (checkbox)
4
Q
What is set to generate an Application Document?
A
- Detail Level (High Level Overview, Full Application Documentation, Property references)
- Section headings will display (Rule Name, Short Description)
- Suppress class and ruleset references
- Create links to rule forms within document
- Rulesets (list)
- Case types and supporting specification types
- Document sections
- Case type criteria
5
Q
Documentation wizard steps?
A
- Select content: select the contents of the document to be created
- Define data: define data to use in screenshots
- Captures screenshots: Take screenshots of the application, using the defined data
- Order content: Arrange the contents of the document, and add outside material
6
Q
Different detail levels?
A
- A high-level overview that contains information about case types, flows, user interfaces, requirements, and specifications.
- Full documentation that contains everything in the high-level overview, plus information about secondary rules such as service levels and correspondence.
- A property reference that lists all of the data elements in our solution, organized by case type.
7
Q
Security Requirements attributes?
A
- rarely represent a functional aspect of the business process
- represent application behaviour
- do not/rarely represent case behaviour
- often classified as non-functional requirements
- can also be described as enterprise-standard requirements. (“Must support two-factor authentication”, “Passwords must be at least 8 characters long”, “Users should be logged on automatically when they access the system”)
- specifications are not logged against a case type
- endered against Security supporting tpye
- Security supporting type is used to document, as security behaviors are applied against the entire application
- specify details such as logon schemes
- specifications categorized under a supporting type are considered part of any case type contained within the application, whereas specifications categorized under a specific case type are considered part of only that case type.
- describe a desired capability of the system
- Security specifications describe how our application satisfies its security requirements (e.g. single-signon authentication through LDAP).
- special requirements should be noted on the appropriate specifications
- specific flows, flow actions, decisions, or any other rules can have special security needs (only the requestor is allowed to update or withdraw a case)
8
Q
Developer Toolbar
A
- Tracer to trace the execution of an application at runtime with powerful debugging utilities including step-by-step execution, breakpoints, watch variables and customizable event types.
- Clipboard to view the contents of pages stored in memory for a given requestor. Now localizable, the Clipboard has improved navigation, thread selection and editing property values (when appropriate).
- UI Inspector to review the structure of user interface elements in an application. Hover over any element in the Designer Studio to view a live overlay detailing the element’s type and the containing UI rule structure. Use the provided links to open individual rules in the Work Area for closer inspection.
- Performance analyzer to collect system resource usage statistics and gain access to finer grain performance tools such as DB Tracer and Profiler.
- Alerts to view the Alert logs in a human readable format. Alerts are organized into two categories: Performance and Security. Filter alerts that were generated by the current requestor session or all sessions.
9
Q
App design steps
A
- Establish a high level project vision
- Gather and enter requirements
- Model the process
- Model the data
- Design the user interface
- Automate business logic
- Connect to external systems
- Create messages and notifications
- Add and customize reports
- Deploy and test the application