CH6 Flashcards

1
Q

Analysis provides the starting point for _______

A

design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Design provides the starting point for __________

A

implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: Analysis and design results are documented to
coordinate the work.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Objective of (design/analysis/implentation) is to define, organize, and structure the components of the final solution to serve as a blue print for construction.

A

design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: Design is a graph building activity.

A

F, model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The _________ of the project will dictate the type, complexity, and depth of models.

A

formality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F: Agile/iteration projects typically build a lot of models.

A

F, they build fewer models, but models are still created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jumping to programming without ________ often causes less than optimum solutions and may require rework.

A

design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F: Design activities correspond to components of the new system.

A

T, such as describing the enviorment, designing the application components, the user interface, the database, and the software classes and method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the ‘Describe the enviorment’ design activity, there are two key elements in the enviroment: Communications with _________ systems, and conforming to an existing ______________.

A

External, Technology Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: Communications with the external system during the ‘Describe the enviroment’ design activity, include: message formats, web and networks, communication protocols, security methods, error detection and recovery.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the system design activities?

A

describing the enviroment
defining the application components
designing the user interface
designing the database
designing the software classes and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is a well-defined unit of software that performs some function(s).

A

Application component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the issues that involve how to package components?

A
  1. Scope and size,
  2. Programming language,
  3. Build or buy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Package diagram, Component Diagram, and Deployment diagram are all typical models for which design activity?

A

defining application components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F: To the system designer, the User Interface is the system.

A

F, the User Interface is the system for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: The user interface has large impact of user productivity.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T/F: Designing the User Interface includes both Analysis and Design tasks.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F: Designing the User Interface doesn’t require a lot of user involvement.

A

F, it requires heavy involvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

T/F: Current needs require multiple user interfaces.

A

T, as there are many different devices and enviroments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Storyboards, System Sequence diagrams, and small screen menu prototype are all typical models for?

A

User Interface design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

By definition, an Information System requires data – usually in a ______________.

A

database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F: Current technology frequently use Relational Database Management Systems (RDBMS)

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Designing the database, Requires converting the data model to a _______________.

A

relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Designing the database, Requires addressing of many other technical issues such as _______________, and ___________.

A

Throughput and response time, Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which design activity is also known as Detailed Design?

A

Designing the software classes and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

T/F: Designing the software classes and methods is a model building activity.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Design class diagram, sequence diagrams, and state-machine diagrams are all models for which design activity?

A

Designing software classes and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

System controls and security include __________ controls and ________ controls.

A

Integrity, Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

____________ Controls are Controls that maintain integrity of inputs, outputs and data and programs.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

_________ Controls are Controls that protect the assets from threats, internal and external.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which design activity is integrated into application programs and DBMS?

A

Designing the system controls and security (integrity controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Ensuring that only appropriate and correct business transactions are accepted, is an objective of (security/integrity) controls.

A

integrity

34
Q

Ensuring that transactions are recorded and processed correctly is an objective of (security/integrity) controls.

A

integrity

35
Q

T/F: To protect and safeguard assets such as the
database is an objective of integrity controls.

A

T

36
Q

_________ Controls prevent invalid or erroneous data from entering the system.

A

Input

37
Q

Value limit controls, Completeness Controls, Data validation controls, and Field Combination controls are all (Input/Output) Controls.

A

Input

38
Q

Name the Input Control:
Checks the range of inputs for reasonableness.

A

Value Limit Controls

39
Q

Name the Input Control:
Ensures all the data has been entered.

A

Completenesss Controls

40
Q

Name the input control:
Ensures that specific data values are correct.

A

Data Validation Controls

41
Q

Name the input control:
Ensurse data is correct based on relationships between fields.

A

Field Combination Control

42
Q

_________ Controls ensure that output arrives at proper
destination (for authorized eyes) and is accurate, current, and complete.

A

Output

43
Q

Physical access to printers and display devices is an example of _________ controls.

A

Output

44
Q

T/F: Labels on printed and electronic output to correctly
identify source of data is an example of input controls.

A

F, Output Controls

45
Q

T/F: Discarded data – protect from “dumpster diving” is an example on input controls.

A

F, Output controls.

46
Q

_______________ Protect data and systems from catastrophes.

A

Redundancy, Backup and Recovery

47
Q

T/F: Redundancy, Backup and Recovery is to have On-site versus off-site copies.

A

T

48
Q

___________________ is critical to prevent internal fraud,
embezzlement, or loss

A

Fraud Prevention

**important will come in test

49
Q

The fraud triangle consists of: _________, __________, and _____________.

A

Opportunity, Motive, Rationalization

**important will come in test

50
Q

T/F: Separation of duties is a technique for risk reduction.

A

F, it is a factor affecting fraud risk

51
Q

Records and audit trails are factors affecting _________.

A

fraud risk

52
Q

T/F: Monitoring, Asset control reconciliation, and security are all factors affecting fraud risk.

A

T

53
Q

T/F: One of the objectives of security control design is to Protect information and transactions during
transmission across networks and Internet.

A

T

54
Q

T/F: One of the objectives of Security Control Design is to protect and maintain a stable, functioning
operating environment 24/7 (equipment, operating
systems, DBMSs)

A

T

55
Q

_________ Controls limit a person’s ability to
access servers, files, data, applications

A

Access

56
Q

_______________ is for identifying users.

A

Authentication

57
Q

______________ is a list of valid users.

A

Access Control List

58
Q

______________ is an authenticated user’s list of
permission level for each resource.

A

Authorization

59
Q

___________ Users are those users with authorization

A

Registered

60
Q

_____________ Users are anyone not registered.

A

Unauthorized

61
Q

_________ Users are those that maintain lists and systems.

A

Privileged

62
Q

Identify the type of user:
Hackers and former employees are _______ users.

A

Unauthorized

63
Q

Identify the type of user:
Internet customers and employees are _______ users.

A

Registered

64
Q

Identify the type of user:
Managers and System administrators are _______ users.

A

privileged

65
Q

Identify the type of user:
Suppliers and System Developers are _______ users.

A

Registered

66
Q

______________ is a method to secure data (stored or in transmission).

A

Data Encryption

67
Q

______________ alters data so it is unrecognizable.

A

Encryption

68
Q

______________ is the converted encrypted data back to readable format.

A

Decryption

69
Q

_______________ is the mathematical transformation of the data.

A

Encryption Algorithm

70
Q

______________ is a long data string that allows the
same algorithm to produce unique encryptions.

A

Encryption Key

71
Q

______________ Encryption is an encryption method that uses the same key to encrypt and decrypt.

A

Symmetric Key

72
Q

_______________ Encryption is an encryption method that uses different keys to encrypt and decrypt.

A

Asymmetric Key

73
Q

(Asymmertic/Symmertic) Key Encryption is also known as the Public Key Encryption.

A

Asymmetric

74
Q

_____________________ is a technique where a document is encrypted using a private key.

A

Digital Signature

75
Q

T/F: A Digital Signature Document is encrypted with private key, but then can only be decrypted with correct private key.

A

False, decrypted with the correct public not private key.

76
Q

__________________ is an organizations name and
public that is encrypted and certified by an authorized third party.

A

Digital Certificate

77
Q

In a Digital Certificate, the _____________ is the authorized third party.

A

Certifying Authority

77
Q

T/F: Digital Certificates are widely known and accepted and built into Web browsers.

A

T

78
Q

_____________ is the standard set of protocols for authentication and authorization.

A

Secure Sockets Layer (SSL)

79
Q

_________________ is an Internet standard equivalent to SSL.

A

Transport Layer Security (TLS)

80
Q

___________________ is the internet security protocol at a low-level transmission.

A

IP Security (IPSec)

81
Q

_____________ is the internet standard to transmit Web pages.

A

Hypertext Transfer Protocol Secure (HTTPS)