CH7 (test bank) Flashcards

on the test bank document it says that this is the test bank for ch6 but i think it's for ch7

1
Q

T/F: The objective of the design phase is to define, organize, and structure the components of the final solution system that will serve as a blue print for construction.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F: Designing the application architecture involves specifying in detail how some system activities will actually be carried out.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: The key question to answer with the design of the user interface activity is, “Have we specified in detail how all users will interact with the system?”

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: Architectural design includes the design of specific program details.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: It is usually important to distinguish when developers are doing architectural design and when they are doing detailed design.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: In user interface design the detailed screen layouts should be done after the communication protocols and devices have been decided.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F: During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F: It is just as important to have heavy user involvement during analysis as it is during design.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F: Cowboy coding is one of the newer techniques programming, often used with Agile techniques

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F: The majority of new systems today must be integrated into existing networks without disrupting existing applications.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: Basically, design involves decomposition – breaking a complex problem into smaller, more understandable components.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: The output of the design activities is a set of diagrams and documents that describe the solution system.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F: A big part of designing the environment is identifying and defining all the types of computing devices that will be required.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F: One of the disadvantages of three-layer architecture is that is usually requires multiple computers.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F: One of the benefits of three-layer architecture is its flexibility.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F: The most serious problem with Web based deployment of applications is security.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: Since most newer Web applications use dynamic pages, content delivery networks are going out of use.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: When building systems for Web deployment it is often necessary to build two separate user interface systems.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which one of the six core process can be considered as a “bridge” process.
a. Identify the problem and obtain approval.
b. Discover and understand the details.
c. Design system components.
d. Build, test and integrate system components.

A

c. Design system components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which is not one of the elements that is normally considered in systems design?
a. Application software c. Security and controls
b. System interface d. Object class methods

A

d. Object class methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Environment design consists of the following:
a. specify the network and hardware linking the system together.
b. describe the computer programs.
c. Design the buildings and facilities such as air conditioning and environmental components.
d. Describe the interfaces that the user and other systems use.

A

a. specify the network and hardware linking the system together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which statement is NOT a correct term for the broad design of the overall system?
a. Architectural design c. General design
b. Conceptual design d. Object-oriented design

A

d. Object-oriented design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The first step in doing software application design is to _______.
a. define the operating environment.
b. identify the approach – structured or object-oriented.
c. define the programming language to be used.
d. identify the various subsystems and their relationship to each other.

A

d. identify the various subsystems and their relationship to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Low-level design that includes the design of the program modules and algorithm logic is referred to as ____ design.
a. detail c. functional
b. module d. component

A

a. detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is NOT considered a design model?
a. Package diagram c. User interface screen layouts
b. Sequence diagram d. Activity diagram

A

d. Activity diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is NOT considered an analysis model?
a. Class diagram c. User interface screen layouts
b. State machine diagram d. Activity diagram

A

c. User interface screen layouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The key design question, “Have we specified in detail how the users will interact with the system to carry out all the use cases?” is associated with which design activity?
a. Design user interfaces c. Design application software
b. Design system interfaces d. Design use cases

A

a. Design user interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following terms describes computer software that implements communication protocols on the network and helps different systems communicate?
a. Nodes and locations diagram c. Distributed architecture
b. Virtual environment d. Middleware

A

d. Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The first step in defining a solution in the development of a new software system is to define what?
a. The application architecture c. The programming language
b. The computing environment d. The details of the business problem

A

b. The computing environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which if the following is NOT considered part of designing the application architecture and software?
a. Multilayer design c. Detailed design
b. Subsystem definition d. Program security design

A

d. Program security design

30
Q

Which of the following really is both an analysis (discovery) and a design process (solution).
a. Environment design c. Database design
b. System interface design d. User interface design

A

d. User interface design

31
Q

Identifying Extensible Markup Language (XML) tags is often used in what design activity?
a. Web page design c. System interface design
b. User interface design d. Application software design

A

c. System interface design

32
Q

Which of the following is NOT a form of system interface?
a. Turn-around document c. Function call
b. File transfer d. Transaction interchange

A

a. Turn-around document

33
Q

The domain model is always used as an input to which design activity?
a. Report layout design c. Database design
b. Security and controls design d. User interface design

A

c. Database design

34
Q

Which of the following is NOT an important consideration in database design?
a. Performance issues c. Partitioning issues
b. Encryption issues d. Data presentation issues

A

d. Data presentation issues

35
Q

Which design activity that pervades all other design activities?
a. Environment design c. Security and controls design
b. Database design d. Interface design

A

c. Security and controls design

36
Q

Limiting user access to the system is considered what type of design?
a. User interface design c. System interface design
b. Security and controls design d. Application software design

A

b. Security and controls design

37
Q

What is the difference between a “client” computer and a “server” computer?
a. Location on the network c. The services that each performs
b. Computing power that each has d. The connectivity to the Internet

A

c. The services that each performs

38
Q

What is the difference between a browser based system and a desktop application system?
a. Desktop system never uses a network and browser base always does.
b. Browser system always uses the Internet and desktop does not.
c. User interface is different between a desktop and browser based.
d. Browser based is always three-layer and desktop is not.

A

c. User interface is different between a desktop and browser based.

39
Q

Which is NOT one of the primary advantages of deploying a system via a Web implementation.
a. Easy to program with HTML
b. Wide availability of the Web
c. Low-cost connectivity
d. Standard development and deployment practices

A

a. Easy to program with HTML

40
Q

Which is NOT one of the problematic areas of Web based applications?
a. Security of applications
b. Complexity of Internet servers and Web development
c. Configuration to handle high peak loads
d. Rapid change of Web standards and functionality

A

b. Complexity of Internet servers and Web development

41
Q

Load balancing refers to what?
a. Spreading the service requests across multiple hours in the day.
b. Balancing the amount of work fairly between project team members.
c. Configuring the network to provide multiple access paths to the servers.
d. Distributing service requests across multiple application servers.

A

d. Distributing service requests across multiple application servers.

42
Q

The hosting alternative that is most like a utility is what?
a. Virtual server c. Cloud computing
b. Managed services d. Colocation

A

c. Cloud computing

43
Q

Managed services refers to what?
a. Hosting company provides all the server equipment.
b. Hosting service that provides backup and recovery services.
c. Hosting company manages the cloud.
d. Hosting service with maintenance of the server and system software.

A

d. Hosting service with maintenance of the server and system software.

44
Q

Which is NOT a characteristic of a VPN?
a. It uses the Internet.
b. Only certain computers can access it.
c. It uses HTTPS for security
d. It always uses encryption

A

c. It uses HTTPS for security

45
Q

Which is a characteristic of a peer-to-peer connection.
a. Connected computers must have the same operating system.
b. Connected computers do not use a server.
c. Connected computers require special software.
d. Connected computers must have over 99% availability.

A

b. Connected computers do not use a server.

46
Q

Many Service level agreements now provide _____ availability
a. 100% c. 98%
b. 99% d. varies by provider

A

a. 100%

47
Q

Which of the following are NOT critical issues in considering a hosting alternative. (choose two)
a. Reliability d. Staff
b. Cost e. Growth
c. Security f. Computing equipment

A

b. Cost

48
Q

What kind of model is used to show how the application is deployed across networks and computers.

A

Network diagram

49
Q

The process of design which is the broad design of the overall system structure is called _______.

A

architectural design
general design
conceptual design

50
Q

Low-level design that includes the design of the specific program details is called ______.

A

detail design

51
Q

When designing the ____________________, the first steps are to identify the general form and structure of the user dialog based on the major inputs and outputs.

A

user interface

52
Q

A computer network in which the cabling and hardware are confined to a single location is called what _____?

A

local area network (LAN)

53
Q

What term do we use to describe a computer network architecture with central computers and users’ computers.

A

client-server architecture

54
Q

What do we call the predominant language used for constructing web pages?

A

Hypertext Markup Language (HTML)

55
Q

What is the term that defines the foundation protocol of the Internet and is used to provide reliable deliver of messages between computers.

A

TCP/IP
Transmission Control Protocol/Internet Protocol
Transmission Control Protocol/Internet Protocol (TCP/IP)

56
Q

What is the term used to describe the user interface in a three-layer architecture?

A

View layer

57
Q

What is the term used to describe the programs that implement the rules and processing of the software solution?

A

business logic layer
domain layer

58
Q

What do we call the combination of Hypertext Transfer Protocol and Transport Layer Security?

A

Hypertext Transfer Protocol Secure
HTTPS

59
Q

An advanced version of Secure Sockets Layer protocol which is used to transmit information over the Internet securely is called ______.

A

Transport Layer Security (TLS)

60
Q

What is the term used to define a set of server computers that are used to deliver static content such as videos, but that are not part of the primary application servers?

A

Content delivery network (CDN)

61
Q

The process of providing physical servers at a secure location and selling those services is called _______.

A

hosting

62
Q

A service which provides a secure physical location for servers but where the computers are usually owned by the client businesses is called _______ .

A

colocation

63
Q

What do we call a method to partition the services of a physical Web server so it appears as multiple, independent Internet servers?

A

Virtual server

64
Q

What is the term used to describe a virtual environment for servers in which the resources include computing, storage, and Internet access and appear to have unlimited availability.

A

Cloud computing

65
Q

The part of a contract between a business and a hosting company that guarantees a specific level of availability is called the _______.

A

service level agreement (SLA)

66
Q

What is the term used to describe a closed network with security and closed access but which is built on top of a public network like the Internet?

A

Virtual Private Network (VPN)

67
Q

What kind of a connection is it when independent computers communicate but without the need for a centralized server?

A

peer-to-peer connection

67
Q

List the six primary areas that must be designed as part of systems design.

A
  1. Design the environment
  2. Design the application software
  3. Design the database
  4. Design the user interface
  5. Design the system interface
  6. Design security and controls
68
Q

List six of the eight primary design models that are used for systems design (used in this text).

A
  1. Package diagrams
  2. Nodes and locations diagrams
  3. Design class diagrams
  4. Sequence diagrams
  5. Database schema
  6. User-interface screens and reports
  7. System security and controls
  8. Communication diagrams
69
Q

List and describe the six primary analysis models (used in this text).

A
  1. Class diagrams – the classes in the problem domain
  2. Use case diagrams – an overview of the use cases and agents for the system
  3. System sequence diagrams – defines the messages between the agent and the system for a use case
  4. Use case descriptions – detailed information about a use case including pre-conditions, post-conditions, flow of logic, exception conditions, etc.
  5. State machine diagrams – description of the various status conditions of an object and how it transitions from state to state.
  6. Activity diagrams – Workflow diagram showing the steps in a business process and the interaction between actors and the system.
70
Q

List the six activities of Design system components.

A
  1. Design the environment
  2. Design the application architecture and software
  3. Design user interfaces
  4. Design system interfaces
  5. Design the database
  6. Design system security and controls
71
Q

List and describe the components in three-layer architecture.

A
  1. View layer – the user interface. It includes the screen and presentation programming.
  2. Domain layer (business logic layer) – the programs that process the business rules.
  3. Data layer – the programs and DBMS that accesses the database.
72
Q

Describe the three potential problems of implementing an application through the Web.

A
  1. Security —Web servers are a well-defined target for security breaches because Web standards are open and widely known. Wide-scale interconnection of networks and the use of Internet and Web standards make servers accessible to a global pool of hackers.
  2. Throughput —When high loads occur, throughput and response time can suffer significantly.
  3. Changing standards —Web standards change rapidly.