311 Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

A(n) ____ is a data flow diagram (DFD) that summarizes all processing activity within the system in a single process symbol. ​Diagram 0 ​level of abstraction ​context diagram ​Event partition diagram

context diagram

In the traditional approach to system development, the system stores information about ____.​ ​data stores ​attributes ​objects ​data entities

data entities

Attribute

describes one piece of information about each instance of the class

A metaphor of human-computer interaction (HCI) in which the user interacts directly with objects on the display screen, is referred to as ____.​ ​direct manipulation metaphor ​desktop metaphor ​document metaphor ​dialog metaphor

direct manipulation metaphor

A metaphor of human-computer interaction, in which interaction with the computer involves browsing and entering data on electronic documents, is referred to as a ____ metaphor.​ ​direct manipulation ​desktop ​document ​dialog

document

Human-Computer Interaction (HCI) -

field of study focusing on efficiency and effectiveness of user interfaces to computer systems

The study of human interaction with machines in general is called ____.​ ​user-centered design ​human factors engineering ​usability ​human-computer interaction

human-computer interaction

Cardinality

is term for number of relationships in entity relationship diagrams: 1 to 1 or 1 to many (synonym to multiplicity)

Multiplicity

is term for the number of associations between classes: 1 to 1 or 1 to many (synonym to cardinality)

Document metaphor

metaphor in which data is visually represented as paper pages or forms

Direct manipulation metaphor

metaphor in which objects on a display are manipulated to look like physical objects (pictures) or graphic symbols that represent them (icons)

Desktop metaphor

metaphor in which the visual display is organized into distinct regions, with a large empty workspace in the middle and a collection of tool icons around the perimeter

Dialog metaphor

metaphor in which user and computer accomplish a task by engaging in a conversation or dialog via text, voice, or tools such as labeled buttons

Domain Class

Classes that describe objects in the problem domain

Integrity Controls

Controls that maintain integrity of inputs, outputs and data and programs

Security Controls

Controls that protect the assets from threats, internal and external

A(n) ____ represents the system response to one event. ​DFD fragment ​event-partitioned system model ​diagram 0 ​context diagram

DFD fragment

The primary principles of UI design of a desktop system include principles which also generally apply to other types of devices. Which of the following principles is NOT an important guideline when considering the layout and format of a particular screen.​ ​Each screen should have a primary purpose. ​Grammar and spelling should be correct. ​Controls on a screen should be grouped by related function ​Dark colors should be avoided

Dark colors should be avoided

What is the name of a general control technique used to ensure that entered data is correct?​ ​Data validation control ​Data acceptance control ​Data completeness control ​Data access control

Data validation control

A primary model used in software design is which of the following?​ ​Component model ​Design class diagram ​Deployment model ​System sequence diagram

Design class diagram

The term diagram 0 is another name for a(n) ____. ​lowest level diagram ​event-partitioned system model ​context diagram ​DFD fragment

​event-partitioned system model

As association class is frequently required for what kind of relationship?​ ​many to many ​zero to one ​zero to many ​one to many

​many to many

Iterative development

- analyze, design, implement, evaluate, repeat

Domain Model Class Diagram

A class diagram that only includes classes from the problem domain, not software classes so no methods

Generalization/Specialization

A hierarchical relationship where subordinate classes are special types of the superior classes. Often called an Inheritance Hierarchy

Class

A type of classification used to describe a collection of objects

Human-Interface Objects (HIOs)

Affordance - the appearance of the object suggests its function

User Experience (UX)

All aspects of a person's interaction with a software application, including actions, responses, perceptions and feelings.

Designers should be sure to include cancel buttons on all dialog boxes which allow the user to back up. This is an example of what?​ ​Easy reversal of actions ​Reduce short term memory load ​Good error handling ​Dialog that yields closure

Easy reversal of actions

The object-oriented approach to systems development views a system as a collection of processes, some performed by people and some performed by the computer. True False

False

​System boundaries are not shown clearly on context diagrams. True False

False

​The term "diagram 0" is used synonymously with context diagram. True False

False

_____ is based on the idea that people classify things in terms of similarities and differences.​ ​Aggregation ​Generalization/Specialization ​Composition ​Multiplicity

Generalization/Specialization

Which of the follow is the best technique to determine how many menu items are needed and how to structure the menus and sub menus.​ ​Group use cases by data requirements ​Group business functions by department ​Group use cases by dependency ​Group use cases by actor

Group use cases by actor

Noun Technique

Identify all of the nouns that come up when the system is described and determine if each is a domain class, an attribute, or not something we need to remember

Identifier or key

One attribute uniquely identifies an instance of the class. Required for data entities, optional for domain classes. Customer ID identifies a customer

Which user is known to the system and is authorized to access all or certain parts of it?​ ​Valid user ​Authenticated user ​Authorized user ​Registered user

Registered user

User Interface (UI)

The set of inputs and outputs that the user interacts with to invoke the functions of an application.

Traditional computer processes are much like procedural computer programs in that they contain instructions that execute in sequence. True False

True

​Context diagrams do not usually show data stores. True False

True

Compound attribute

Two or more attributes combined into one structure to simplify the model. (E.g., address rather than including number, street, city, state, zip separately). Sometimes an identifier or key is a compound attribute

Brainstorming Technique

Use a checklist of all of the usual types of things typically found and brainstorm to identify domain classes of each type

Abstract class—

a class that allow subclasses to inherit characteristics but never gets instantiated. In Italics (Sale)

Concrete class—

a class that can have instances

Association

a naturally occurring relationship between classes (UML term)

An example of an attribute of an object might be _______.​ ​items on a purchase order ​a calendar ​an inventory item ​a social security number

a social security number

Association class—

an association that is treated as a class in a many to many association because it has attributes that need to be remembered (such as grade

A class that represents a many-to-many association between two other classes is called a(n) ____ class.​ ​superclass ​problem domain ​aggregated ​association

association

Descriptive properties of things in the problem domain are often documented as what?​ ​relationships ​data entities ​objects ​attributes

attributes

​ --/< The above cardinality constraint on the Order data entity indicates that there can be _____ . ​zero or many orders ​cannot be determined without the other side of the relationship ​one or many orders ​many orders

one or many orders

Inheritance

the concept that subclasses classes inherit characteristics of the more general superclass

Problem domain—

the specific area (or domain) of the users' business need that is within the scope of the new system.

Subclass

the subordinate or more specialized class in a generalization/specialization hierarchy

Superclass

the superior or more general class in a generalization/specialization hierarchy

An application component can be thought of as a(n) __________.​ ​purchased package ​middleware software ​subsystem ​unit of software

unit of software

A synonym for cardinality (used with UML class diagrams) is _______.​ ​inheritance ​relationship ​multiplicity n-ary relationship

​multiplicity

Which of the following is NOT one of the considerations of designing input forms for desktop systems?​ ​Validate all input data at the source ​Use list boxes and check boxes when possible ​Align the textboxes vertically ​Automatically put the cursor in the first textbox

​Align the textboxes vertically

Which of the following is not a recommended technique for good error processing?​ ​Place the cursor on the error field. ​Clear the field that is in error. ​Provide a solution to the error. ​Indicate which input has the error

​Clear the field that is in error.

Which of the following data flow diagram (DFD) symbols usually corresponds to a data entity on an entity-relationship diagram (ERD)? ​Data flow ​Data store ​Process ​Data link

​Data store

The domain model is always used as an input to which design activity?​ ​Database design ​User Interface Design ​Security and controls design ​Application Component Design

​Database design

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​ ​Describe the environment ​Design the application components ​Design security controls ​Design the interfaces

​Describe the environment

Which is NOT an objective of integrity controls?​ ​Ensure that transactions are recorded completely ​Allow only valid business transactions ​Ensure a stable functioning operating environment ​Protect the assets of the organization

​Ensure a stable functioning operating environment

According to an Agile iterative development process in which iteration would design activities normally start?​ ​Sometime after the first iteration ​First iteration ​Pre-project activities ​Second iteration

​First iteration

According to an Agile iterative development process in which iteration would implementation activities normally start?​ ​Second iteration ​Sometime after the first iteration ​First iteration ​Pre-project activities

​First iteration

Which of the following is not a principle of Closure?​ ​Have clear navigation path. ​Definite end point of the steps of a procedure ​Protecting and saving user's input fields. ​Allow the user to undo their actions.

​Have clear navigation path.

"When subsequent processing is delayed by more than a second or two, users may repeatedly press controls or re-enter information, resulting in processing errors and user frustration" is an example of what?​ ​Lack of error handling ​Lack of closure ​Lack of consistency ​Lack of feedback

​Lack of feedback

Which are the two additional important issues of Web based UI design over local desktop UI design?​ ​Browser compatibility and advertising space ​Load time and browser compatibility ​Screen size and load time ​Advertising space and screen size

​Load time and browser compatibility

Limiting user access to the system is considered what type of design activity?​ ​Application components design ​Describing the environment ​User interface design ​Security and controls design

​Security and controls design

Which design activity that pervades all other design activities?​ ​Security and controls design ​Environment design ​Interface design ​Database design

​Security and controls design

When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions?​ ​Who needs information about this item? ​Should it be researched further? ​Is it a tangible item? ​Is it an abstract item?

​Should it be researched further?

____ is used to describe the relationship between two things of the same type, such as one person being married to another person.​ ​Binary association ​Unary association ​N-ary association ​Cardinality

​Unary association

A key principle of human-computer interaction (HCI), that states that the appearance of any control should suggest its functionality, is called ____.​ ​informative feedback ​consistency ​visibility ​affordance

​affordance

In UML the constraint denoted by "0..*" indicates what?​ ​only a many maximum relationship ​never only one allowed ​an optional relationship ​a mandatory relationship

​an optional relationship

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.​ ​check list technique ​domain analysis technique ​brainstorming technique ​noun technique

​brainstorming technique

A measure of the number of links between one object and another object in a relationship is called the _______.​ ​associations ​cardinality ​aggregations ​linkups

​cardinality

The crows feet notation on an ERD is a type of _______ constraint.​ ​cardinality ​relationship ​multiplicity ​many-to-many

​cardinality

The number of associations that occur among specific things in an entity relationship diagram is called ____. ​an attribution a relationship​ ​cardinality ​a binary relationship

​cardinality

Inheritance describes a condition between classes where _______ .​ ​classes share some attributes ​some classes are always abstract ​subclasses inherit the names from superclasses ​classes are part of other classes

​classes share some attributes

Which is not a model normally produced as part of application component design?​ ​design class diagram ​deployment diagram ​package diagram ​component diagram

​design class diagram

A data flow diagram (DFD) that models system requirements using a single process for each event in a system or subsystem is called a(n) ____. ​DFD fragment ​event-partitioned system model ​diagram 1.0 ​context diagram

​event-partitioned system model

One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called the _______.​ ​check list technique ​brainstorming technique ​domain analysis technique ​noun technique

​noun technique

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.​ ​private ​public ​symmetric ​asymmetric

​private

The specific area of the user's business need that is within the scope of the new system is called the _______.​ ​problem domain ​functional requirements ​use cases ​user specifications

​problem domain

When a user fills out an online form, but makes an error and the data is not immediately accepted (until the input error is corrected), if the system clears all the fields and requires the user to start over, this is an example of violating the principle of ______.​ ​always allowing a way out ​making actions reversible ​clear error messages and processing ​protecting the user's work

​protecting the user's work

One good way to prevent errors on input forms is to _______.​ ​include active discovery ​provide shortcut keys ​write clear error messages ​provide "undo" capability

​provide "undo" capability

A(n) _______ is a naturally occurring association among specific things.​ ​composition ​cardinality ​relationship ​attribute

​relationship

The domain model class diagram is used to _______ .​ ​show the relationships among the data entities ​show the things involved in the user's work that are important ​show the data entities for the new system ​show the software classes in the problem domain layer of the system

​show the things involved in the user's work that are important

Three types of users that are considered in the design of a security system are ____.​ ​unauthorized user, registered user, and privileged user ​technical user, authorized user, and privileged user ​manager user, technical user, and clerical user ​supervisor user, administration user, and operational user

​unauthorized user, registered user, and privileged user


Conjuntos de estudio relacionados

Philosophy - Chapter 4: reasons for belief and doubt

View Set

PEDS CHAPTER 29 (PREP'U LEVEL 8)

View Set

Chpt 28 Inflamm&struct disease PrepUU

View Set

U1: The Universe (Lesson 1 & Lesson 2)

View Set