Chapter 11, Ch. 10, System analysis CH 10, Chapter 10, Chapter 10, Chapter 6+7+9, System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_2
System vision document
A ____ combines three components: the problem description, the business benefits, and the system capabilities.
False
A network diagram and a location diagram show basically the same information but in a different format.
Virtual Private Network (VPN)
A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?
schema
A(n) ________ describes the STRUCTURE, CONTENT, and ACCESS CONTROLS of a physical data store or database?
foreign key
A(n) _________ is a field or set of fields stored in one table that ALSO EXISTS as a primary key in another table?
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field
True
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.
True
A tool is a software support that helps create models or other components required in the project.
True
Adding a use case controller to a sequence diagram is an example of applying a design pattern
True
Agile Modeling emphasizes creating only models that are necessary.
True
All adaptive approaches include iterations.
True
An Agile Modeling practice used in incremental modeling is to create several models in parallel
True
A function or service that is called from a Web application to another Web application is called a(n) ________.
Web service
In First Normal Form
What can be said about the following relational database table? (key is underlined): CourseSectionID, StudentID, Grade, StudentName
Local Area Network
What does LAN stand for?
Extensible Markup Language
What does XML stand for?
Keep a prioritized list of required functions.
What technique is used to control the scope in an Agile project?
The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.
true/false condition
In a relational database, a row can be referred to as a(n)
tuple
Build or buy questions are usually addressed during which design activity?
design the application components
A deployment diagram is most useful for which design activity?
designing application components
A knowledge of all the computing devices accessed by clients is required for which design activity?
designing the user interface
1. List and briefly describe the four components of a database management system.
1. Application Program Interface -- allows programming language interface to write scripts and logic to produce results based on complex logic. 2. End-user query processor -- this provides the SQL statements to query and update the database. 3. Administrative interface -- provides the functionality to create the schema and change the database configuration parameters. 4. Database access and control logic -- this is the actual DB engine which updates the database and retrieves results.
1. List and briefly describe the three major activities that occur during the support phase.
1. Maintaining the system - Fixing errors and problems 2. Enhancing the system - Adding new capabilities to the existing system 3. Supporting the users - Providing technical help to the users, often with a help desk.
3. List the three constructs that are used for structured programming.
1. Sequence 2. Decision 3. Iteration
3. List and briefly describe the four types of database server architecture described in the textbook.
1. Single database server architecture —One or more databases are hosted by a single DBMS running on a single server. 2. Replicated database server architecture —Complete database copies are hosted by cooperating DBMSs running on multiple servers. The servers are usually distributed across geographic locations. 3. Partitioned database server architecture —Multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers. 4. Cloud-based database server architecture —This architecture isn't really a separate architecture. Rather, it is a specific implementation of one or more of the other architectures by using the services of a cloud computing provider.
DBMS Components
> application program > direct query user > database administrator
1. An approach to the SDLC that plans the project in advance and then progresses according to the plan is called what? a. A predictive approach c. An Agile approach b. An adaptive approach d. A project management approach
A
14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns. a. first c. third b. second d. fourth
A
14. One main principle of structured design is that program modules should be designed so that they are ____. a. highly cohesive c. tightly structured b. tightly coupled d. highly engineered
A
2. Which of the following is NOT a component or function of a typical database management system (DBMS)? a. Low-level process management c. Application program interface b. End-user query processor d. Administrative interface
A
20. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based
A
22. Reuse is one of the primary benefits of using what type of development methodology? a. Object-oriented c. Top-down b. Structured d. Iterative
A
29. In Agile modeling what are the two important reasons for building models? a. To understand what you are building and to communicate the solution b. To document a solution and to instruct other developers c. To communicate with the user and to obtain feedback d. To write good code and to design good databases
A
30. What is the name of a general control technique used to ensure that entered data is correct? a. Data validation control c. Data acceptance control b. Data access control d. Data completeness control
A
35. Which of the following can be classified as privileged users? a. System programmers, application programmers, and system administrators b. Technical users and security personnel c. System operators and clerks d. Administrators and accountants
A
38. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document
A
5. A(n) ____ is a field or set of fields used to uniquely identify each row. a. primary key c. object identifier b. foreign key d. attribute
A
5. The term ____ refers to an approach that completes parts of a system in one or more iterations and puts them into operation for users. a. incremental development c. bottom-up development b. adaptive development d. predictive development
A
6. ____ are a critical element of relational database design because they are the bases for representing relationships among tables. a. Keys c. Fields b. Attributes d. Tables
A
7. One column of a table in a relational database is called a(n) ____. a. attribute c. tuple b. relation d. element
A
7. Which of the following is NOT one of the major activities of the support phase? a. Training the users c. Enhancing the system b. Maintaining the system d. Supporting the users
A
30 day
A Scrum sprint is a firm ____ time box, with a specific goal or deliverable.
Protocol
A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.
Three layer architecture
A client/server architecture that divides an application into view, business logic and data layers is called what?
Server
A computer that manages shared resources and allows users to access those resources over a network is called a what?
Microsoft SQL Server is an example of what?
A database management system
Microsoft SQL Server is an example of what?
A database management system
Network diagram
A diagram that shows how hardware components are interconnected with devices and cabling is called a what?
complex data type
A field in a relational table called "ADDRESS" would be an example of what?
False
A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.
Client/Server Architecture
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?
An approach to the SDLC that plans the project in advance and then progresses according to the plan is called what?
A predictive approach
Hypertext Markup Language
A protocol that defines the structure and content of a web page is called what?
First
A relational database table is in _______ normal form if it has NO repeating fields or groups of fields, and hence all rows have the same columns?
Third
A relational database table is in _______ normal form if no NON-KEY FIELD is functionally dependent on any other non-key field?
What is a computer that manages shared resources for access across a network called?
A server computer
Three-layer architecture
A software architecture that divides an application into view, business logic, and data is called what?
Web service
A software function or set of functions or services that can be executed via Web protocols is called a what?
False
A three-layer architecture requires at least three computers to be implemented correctly.
primary key
A(n) ____ is a field or set of fields used to UNIQUELY IDENTIFY EACH ROW?
adaptive
A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood.
stem development methodology
A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques.
model
A(n) ______ is a representation of an important aspect of the real world.
One-To-Many
Add primary key attribute of the "ONE" class to the "MANY" class as a foreign key?
____ is a philosophy and set of guidelines for developing software in an unknown, rapidly changing environment.
Agile development
What is the difference between HTTP and HTTPS?
Amazon uses HTTPS for credit card information
Web-based Application
An application that uses a browser for the user interface.
2. Explain the difference between "An approach to the SDLC" and "An approach to software construction."
An approach to the SDLC has to do with whether the project methodology is predictive or adaptive and what specific project methodology is used. An approach to software construction has to do with structured development or object-oriented development and the analysis and design models that are used.
4. Explain how a digital certificate works.
An entity who wants a certificate with its name and public key goes to a certifying authority and buys a certificate. The certifying authority encrypts the data with its own private key and gives the data back to the original entity. When someone asks the entity for its public key, it sends the certificate. The customer receives the certificate and opens it with the certifying authority's public key.
False
Application software that usually executes with a browser is often just called an "App".
Object classes that are created during design to facilitate the final solution, but are not part of the problem domain are sometimes referred to as ______ ______.
Artifacts
19. _______ is the process of allowing or restricting a specific user's access to specific resources.
Authorization
11. A(n) "_______" is a guideline to help an analyst complete a specific task and often includes step-by-step instructions to do something such as how to create a model. a. tool c. methodology b. technique d. SDLC
B
13. A hierarchical program structure consisting of a boss or control module which calls submodules is called what? a. traditional program structure c. ordered program structure b. top-down programming d. bottom-up programming
B
13. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user
B
16. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth
B
23. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based
B
24. Which of the following is a basic value of agile software development? a. Following a plan over responding to change b. Working software over comprehensive documentation c. Processes and tools over individuals and interactions d. Contract negotiation over customer collaboration
B
25. A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups. a. single c. replicated b. partitioned d. cloud-based
B
27. An integrity control that verifies the data in one field against the data in other fields is called a ____ control. a. completeness c. value b. field combination d. data validation
B
3. In a relational database, a row can be referred to as a(n) ____. a. field c. attribute b. tuple d. relation
B
33. Which user is known to the system and is authorized to access all or certain parts of it? a. Authorized user c. Valid user b. Registered user d. Authenticated user
B
36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with a(n) ____ key. a. asymmetric c. public b. private d. symmetric
B
37. A ____ is an institution's name and public key, which is encrypted and certified by a third party. a. private key c. certifying authority b. digital certificate d. digital key
B
6. The term "____" means that work activities are done once, then again, and yet again. a. agile modeling c. waterfall approach b. iteration d. incremental development
B
8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table. a. primary key c. object identifier b. foreign key d. column
B
1. A(n) ____ describes the structure, content, and access controls of a physical data store or database. a. relation c. schema b. DBMS d. attribute
C
10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique. a. columns c. rows b. foreign keys d. values
C
11. An separate relation must be created to store the attributes of a ____ relationship among two other classes. a. one-to-one c. many-to-many b. one-to-many d. not any (not necessary)
C
17. A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.
C
19. A graphical diagram whish shows the hierarchical organization of modules is called a(n) _______. a. Entity relationship diagram (ERD) c. structure chart b. top-down chart d. data flow diagram
C
19. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form
C
2. The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase. a. iterative c. waterfall model b. spiral model d. prototyping
C
21. A(n) _______ is used to show the interacting messages between objects that collaborate. a. activity diagram c. sequence diagram b. class diagram d. data flow diagram
C
22. A ____ database server architecture stores different parts of a database on different servers. a. single c. partitioned b. replicated d. cloud-based
C
24. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive
C
27. An example of a project phase in a predictive project is ____. a. gathering information about the user's needs b. performing a project cost/benefit analysis c. planning the project d. drawing the system interface
C
28. What is a control that checks the value of a field to ensure that it is within the correct range? a. Answer control c. Value limit control b. Completeness control d. High-low control
C
32. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user
C
34. A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. supervisor user c. privileged user b. database administrator d. technical user
C
4. Data elements in a relational database are organized into ____. a. attributes c. tables b. objects d. tuples
C
9. A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques. a. predictive approach b. object-oriented analysis c. system development methodology d. systems development life cycle
C
9. Each class on an class diagram is represented by a(n) ____ in a relational database. a. attribute c. table b. row d. column
C
CRC stands for what?
Class responsibility collaboration
The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.
Class-Level Attribute
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
Completeness control
True
Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.
. _______ is a qualitative measure of how closely the classes in a design class diagram are linked together.
Coupling
10. The term "_______" is used to separate out some aspect of the real world that is important to understand when we build a model. a. brainstorm c. analysis b. synthesis d. abstraction
D
12. The acronym SADT stands for what? a. Software and Decoding Tools b. Systems Analysis and Development Tools c. Systems Analysis and Design Tools d. Structure Analysis and Design Technique
D
12. ____ is a consistent relational database state in which every foreign key value also exists as a primary key value. a. First normal form (1NF) c. Function dependency b. Database synchronization d. Referential integrity
D
15. An important way to measure the quality of a module in structured programming is by assessing its _____. a. structured design c. internal constructs b. top-down approach d. cohesion and coupling
D
15. ____ is a one-to-one correspondence between two field values. a. First normal form c. Referential integrity b. Second normal form d. Functional dependency
D
17. A(n) ____ program is one that has one beginning and one ending. a. iterative c. object-oriented b. incremental d. structured
D
18. A(n) ____ is a representation of an important aspect of the real world. a. methodology c. technique b. tool d. model
D
23. ____ is a philosophy and set of guidelines for developing software in an unknown, rapidly changing environment. a. Object-oriented development c. Pair programming b. Refactoring d. Agile development
D
25. What is the primary goal in Agile Modeling? a. building model templates for future projects b. building multiple models c. focusing on representation with good models d. developing software
D
26. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment
D
26. Which of the following is NOT an Agile Modeling principle? a. Minimize your modeling activity b. Know your models and how to use them c. Focus on content rather than representation d. Maintain core models to verify past decisions
D
28. A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood. a. predictive c. incremental b. persistent d. adaptive
D
29. What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? a. Secure control c. Comprehensive control b. Total control d. Completeness control
D
3. An adaptive approach to a development project is best used when _______. a. the system has low technical risk b. the requirements are simple and the system is small c. the requirements are well understood d. the requirements are uncertain
D
31. Which of the following is NOT a factor that affects the risk of fraud? a. Separation of duties c. Asset reconciliation b. Monitoring d. Authorization of users
D
tables
DATA ELEMENTS in a relational database are organized into ________?
Waterfall Development
DESIGN and IMPLEMENT database FIRST?
What is the name of a general control technique used to ensure that entered data is correct? -Data validation control -Data completeness control -Data access control -Data acceptance control
Data Validation control
What is the least cohesive approach in creating use case controllers in a system?
Define a single controller for all use cases.
True
Describing the environment is one of the detailed activities of core process 4: Design system components.
A primary model used in software design is which of the following
Design class diagram
Software methods are usually identified in which design model
Design class diagram
Which of the following is NOT one of the activities of Core Process 4: Design system components?
Design security and integrity controls
Which of the following is not one of the design activities included in the Design System Components core process?
Design the security controls
The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity? -Design the user interface -Design the application components -Design the software classes -Describe the environment
Design the software classes
A deployment diagram is most useful for which design activity? -Designing the user interface -Designing software classes -Describing the environment -Designing application components
Designing application component
A deployment diagram is most useful for which design activity
Designing application components
A knowledge of all the computing devices accessed by clients is required for which design activity?
Designing the user interface
List at least 5 principles of Agile Modeling.
Develop software as your primary goal Enable the next effort as your secondary goal. Minimize your modeling activity—few and simple. Embrace change, and change incrementally. Model with a purpose. Build multiple models. Build high-quality models and get feedback rapidly. Focus on content rather than representation. Learn from each other with open communication.
Which analysis model serves as an input model to a design class diagram?
Domain model class diagram
table
Each class on an class diagram is represented by a(n) __________ in a relational database?
A toolbar might be considered an example of what?
Embedded Software
Which is NOT an objective of integrity controls?
Ensure a stable functioning operating environment
Which is NOT an objective of integrity controls? -Ensure that transactions are recorded completely - Ensure a stable functioning operating environment - Protect the assets of the organization -Allow only valid business transactions
Ensure a stable functioning operating environment
The detailed work schedule
Estimating the effort required and identifying task dependencies is usually part of the work to create what?
What does XML stand for?
Extensible Markup Language
What does XML stand for?
Extensible markup language
The activity of Describing the Environment consists of what two key elements
External systems and technology architecture
The activity of Describing the Environment consists of what two key elements?
External systems and technology architecture
A design class diagram is also called a data model
False
A lifeline indicates when a method is executing for a destination object
False
A local business office with a small database which is only used by two or three users would most probably implement a desktop DBMS
False
A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment
False
A project that has high technical risk should use the predictive approach.
False
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.
False
A three-layer architecture requires at least three computers to be implemented correctly
False
Another term for a network diagram is a deployment diagram
False
Application software that usually executes with a browser is often just called an "app".
False
Dependency relationships cannot exist between classes within packages
False
Design class diagrams and interaction diagrams should be developed independent of each other
False
Design using CRC cards does not require the use of a design class diagram.
False
Every table in a relational database must have a foreign key.
False
In Agile Modeling, change is seen as the exception, not the norm.
False
In XP, each programmer is responsible for her or her own code.
False
In XP, each programmer is responsible for her or her own code.
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
False
Including a total amount field as the sum of other fields in a table is a violation of second normal form.
False
It is usually a bad idea to try to include user-interface classes to a CRC design
False
Maintaining simplicity in Agile Modeling eliminates the need for validating the models with code.
False
On a sequence diagram the messages are numbered to indicate the order of firing
False
One type of design class stereotype is called a "concrete class" because it can be instantiated
False
Problem domain modeling and database normalization are incompatible techniques for relational database design.
False
Relationships in a relational database are usually represented by embedding a foreign key in each participating table
False
Relationships in a relational database are usually represented by embedding a foreign key in each participating table.
False
Since the design activities all interact with each other, it really doesn't matter which activity occurs first
False
The domain data in a database is sometimes referred to as metadata.
False
The first-cut DCD includes method signatures
False
The initial version of a communication diagram contains view layer and business layer
False
The objective of object-oriented analysis is to identify the objects that must work together to carry out each use case
False
The perfect memory assumption means that there is always adequate memory to execute the program
False
The purpose of a Scrum daily meeting is to find solutions for any issues that have arisen since the last meeting.
False
The purpose of a Scrum daily meeting is to find solutions for any issues that have arisen since the last meeting.
False
There are two preferred methods to accessing the database. One is to have newly instantiated object call the data access object. The other is to let the controller access the data access object
False
To ensure that the database is designed correctly, an important member of the project team is the data administrator
False
XP recommends that system code be written before test code
False
XP recommends that system code be written before test code.
False
7. A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.
First
Which is a valid sequence of modeling steps for designing a use case?
First cut DCD, Communication diagram, Final DCD, Package Diagram
According to an Agile iterative development process in which iteration would design activities normally start
First iteration
False
For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.
___________ is where the value in one field determines the value in another field in the same record.
Functional dependency
Which of the following is NOT part of a multilayer object-oriented design (OOD)?
Functional module
the longest path through the network
Given a project schedule with all tasks connected with one-way arrows and task durations. The critical path is _____.
Technology Architecture
HARDWARE and NETWORKS?
A protocol that defines the structure and content of a web page is called _____ _____ _____.
HTML (Hypertext Markup Language)
What is the latest version of HTML?
HTML5
A _______ contains both global and local schemas with distinct DBMSs?
Heterogeneous distributed database
What does HTML stand for?
Hypertext Markup Language
A protocol that defines the format and content of Web requests and data communication is called _____ _____ _____.
Hypertext Transfer Protocol
What does HTTP stand for?
Hypertext Transfer Protocol
What can be said about the following relational database table (key is bold): *CourseSectionID, StudentID*, Grade, StudentName
In First Normal Form
product owner
In Scrum, the ____ maintains the product backlog list.
the associated tables
In a MANY-TO-MANY association, the PRIMARY KEY of the created table consists of?
False
In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.
True
In a client/server configuration, it is possible for a single software component to be both client and server.
Domain Layer
In a three-layer architecture, another name for the business logic layer is what?
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
What term is used to describe a design principle in which an intermediate class is placed between two classes to decouple them but still link them?
Indirection
Which of the following is NOT an Agile Modeling principle?
Maintain core models to verify past decisions
What do we call the notation that shows all the information required to call or invoke a method?
Method signature
Which of the following is usually NOT included in a first-cut design class diagram? a.Initial value information for attributes b.Attribute types c. Method signatures d.Navigation visibility arrows
Method signatures
database management system
Microsoft SQL Server is an example of what?
Which of the following is NOT an XP practice?
No required coding standards
Which of the following is NOT an XP practice?
No required coding standards
20. _____ consists of writing statements in a programming language to define what each type of object does. a. OOP c. OOD b. OOA d. OOS
OOP
Attribute
One COLUMN of a table in a relational database is called a(n) ______________?
System software usually refers to what kind of software?
Operating systems and web servers
If you are doing detailed design for the use case Create New Order, which class should receive the first input? (Order Transaction, Order, Order Handler, Customer)
Order Handler
Which of the following is completed in the inception phase of the UP?
Produce rough estimates of cost and schedule
When describing the interfaces to external systems, which is not one of the important issues
Programming languages
When describing the interfaces to external systems, which is not one of the important issues? -Network addresses -Programming languages - Error handling -Message formats
Programming languages
A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?
Protection from variations
What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?
Protection from variations
5. _________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.
Referential integrity
2. What danger(s) is/are inherent in using keys invented by external agents as primary keys in a relational database?
Referential integrity depends on primary key uniqueness. By using key values assigned by external entities, an organization risks the possibility that referential integrity may be broken at some time in the future (e.g., duplicate shipment tracking numbers from competing shipping companies
Database Management System
Referential integrity is normally ENFORCED by the __________________?
Which user is known to the system and is authorized to access all or certain parts of it? -Registered user -Authorized user - Valid user -Authenticated user
Registered user
1. A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.
Schema
team
Scrum focuses primarily on the ____ level.
Limiting user access to the system is considered what type of design activity?
Security and controls design
Which design activity that pervades all other design activities
Security and controls design
Which design activity that pervades all other design activities? -Environment design -Database design -Interface design -Security and controls design
Security and controls design
10. _______ database server architecture is poorly suited to applications that must be available on a seven-day, 24-hour basis.
Single
What does SaaS stand for?
Software as a Service
System Software
Software, such as Web server software, and works behind the scenes is called what?
Which of the following is included in the top compartment of a design class?
Stereotype name
Which of the following can be classified as privileged users A) System programmers, application programmers, and system administrators B) Technical users and security personnel C)System operators and clerks D) Administrators and accountants
System programmers, application programmers, and system administrators
Which of the following is NOT one of the design models used for object-oriented design a. Communication diagram b. System sequence diagram c. CRC cards d. Design class diagram
System sequence diagram
Which of the following is a type of model used in user interface design? -System sequence diagram -Activity Diagram -Communication diagram -Class diagram
System sequence diagram
8. SADT stands for what?
Systems analysis and Design technique
Each class on an class diagram is represented by a(n) ____ in a relational database.
Table
True
The Internet can be thought of as the network of networks.
phases, disciplines, and iterations
The UP life cycle model includes all of the following:
False
The Web is the highway over which messages and information travel from network to network.
waterfall model
The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase.
External systems and technology architecture.
The activity of Describing the Environment consists of what two key elements?
user stories
The basis of an XP plan is a set of ____ that users develop.
Detailed work schedule.
The creation of a work breakdown structure is helpful in the development of what?
planning a series of iterations
The first release-level activity in an XP development approach is ____.
Internet Backbone Network
The high-speed, high capacity network that interconnects regions, countries, and continents.
What is the best coupling choice for an input window, domain, and database object in a system?
The input window is coupled to the domain and the domain is coupled to the database.
False
The primary benefit of a network diagram, is to show the network cabling and the network routers.
Given the following URL, what is the correct description of the portion shown in bold? https://*www.reddit.com*/r/The_Donald/
The server name
Given the following URL, what is the correct description of the portion shown in bold? http://www.barnesandnoble.com/u/books-best selling-books/379003057
The server name
Technology Architecture
The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?
Technology Architecture
The set of computing hardware, network hardware and system software used by an organization is called the what?
Application Architecture
The set of information systems the organization needs to support its operations is often called the what?
Application Architecture
The set of information systems the organization needs to support its operations.
World Wide Web
The set of resources that can be accessed over the Internet is referred to what?
When we use the term the Web what is the correct definition?
The set of world wide resources that are available over the Internet
iteration
The term "____" means that work activities are done once, then again, and yet again.
abstraction
The term "_______" is used to separate out some aspect of the real world that is important to understand when we build a model.
incremental development
The term ____ refers to an approach that completes parts of a system in one or more iterations and puts them into operation for users.
payback period
The time from the deployment of a new system until the break-even point is reached is sometimes called the ______.
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table
True
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.
True
A model is a representation of an important aspect of the real world.
True
A network diagram is a useful model to show three/layer architecture
True
All adaptive approaches include iterations
True
An objective of security controls is to maintain a stable operating environment for users
True
Another name for the data model is the domain model
True
Both a communication diagram and a sequence diagram have the same purpose and provide basically the same information
True
Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.
True
Designing a single user interface is now the exception, not the norm.
True
Detailed Object-oriented design (OOD) is done on a use case-by-use case basis
True
Every database in a DBMS consists of two separate data stores
True
In Agile Development, contracts include options for the customer to cancel if the project is not progressing, as measured by the incremental deliverables.
True
In an iterative approach to software development, it is usually best to develop the database in the first few iterations.
True
In the UP life cycle, some working software is tested and reviewed with system users at the end of each iteration.
True
It is better to have the data access object create a new object when multiple objects may be created.
True
Most iterations in the UP involve work in all disciplines.
True
Navigation visibility may be bidirectional
True
On a sequence diagram, view layer objects send messages to the controller
True
Once a Scrum team has agreed on a goal and has selected items from the backlog list, the scope of the sprint is frozen.
True
Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.
True
Relationships between tables is usually indicated through the use of a foreign key.
True
The Internet can be thought of as the network of networks
True
The Unified Process (UP) life cycle has four phases: inception, elaboration, construction, and conversion.
True
The majority of new systems today must be integrated into existing networks without disrupting existing applications
True
The modified waterfall approach requires overlapping phases.
True
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction
True
The objective of object-oriented design is to identify and specify all the classes and messages that work together to carry out each use case
True
The output of the design activities is a set of diagrams and documents that describe the solution system
True
The starting point for identifying messages in detailed design of a use case is always the SSD
True
four weeks
UP disciplines are involved in each iteration, which is typically planned to span ____.
The identifier of a Web resource and which defines a protocol, a server or domain name, and a resource identifier is called a(n)
Uniform Resource Locator
___ methods must be included in a design class diagram
Use case specific
Which of the following really is both an analysis (discovery) and a design process (solution).
User interface design
Web-based application is software with the following characteristics:
Uses a browser and web-server
Which of the following is NOT a valid Web protocol?
VPN
Which of the following is not a valid Web protocol? a. VPN b. HTTPS c. HTML d. XML
VPN (This question is stupid)
A function or service that is called from a Web application to another Web application is called a(n) ________.
Web service
in first and second normal form
What can be said about the following relational database table? (key is underlined): StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding
Heterogeneous Distributed Database
What contains both GLOBAL and LOCAL schemas with distinct DBMS's?
Hypertext Transfer Protocol
What does HTTP stand for?
Software as a Service
What does SaaS stand for?
low-level process management
What is NOT a component or function of a typical database management system (DBMS)?
establish user authentication for data access
What is NOT one of the responsibilities of the DA?
determine data confidentiality
What is NOT one of the responsibilities of the database administrator?
A Server Computer
What is a computer that manages shared resources for access across a network called?
HTTP is less secure, while HTTPS would be used for credit card transactions.
What is the difference between HTTP and HTTPS?
HTML5
What is the latest version of HTML? (As of 2016)
An end of iteration review
When the project team asks "Are our working relationships with the user effective?" it is doing what?
The set of world wide resources that are available over the Internet.
When you use the term "Web", what is the correct definition?
Identify staffing requirements.
Which is NOT an activity associated with establishing the project environment?
Working software over comprehensive documentation
Which of the following is a basic value of agile software development?
Oversight committee
Which of the following is also called a steering committee?
Produce rough estimates of cost and schedule
Which of the following is completed in the inception phase of the UP?
Complete beta test
Which of the following is completed in the transition phase of the UP?
All of them
Which of the following methodologies use an adaptive approach to systems development?
A planned undertaking with a start and stop and that produces a result.
Which of the following statements best defines what a project is?
Which of the following is a basic value of agile software development?
Working software over comprehensive documentation
What is the correct syntax notation for a message on a communication diagram
[t/f condition] seq-numb: ret-value := msg-name (para-list)
Referential Integrity
_________ is a consistent relational database state in which EVERY FOREIGN KEY VALUE also exists as a PRIMARY KEY VALUE?
Keys
_______________ are a critical element of relational database design because they are the BASES FOR REPRESENTING RELATIONSHIPS among tables?
Functional Dependency
_________________ is where the value in ONE field determines the value in ANOTHER field in the SAME record?
Referential Integrity Constraint
a CONSTRAINT, stored in the schema, that the DBMS uses to AUTOMATICALLY ENFORCE referential integrity?
Relational Database Management System (RDBMS)
a DBMS that ORGANIZES data in tables?
Normalization
a formal technique for EVALUATING and IMPROVING the quality of a relational database schema?
Shared or Read Lock
a lock where MULTIPLE TRANSACTIONS (users) may read the data?
Exclusive or Write Lock
a lock where only ONE TRANSACTION (user) may access the locked portion of the database?
A personal computing device includes all of the following except ______.
a router
Database Management Software (DBMS)
a system software component that MANAGES and CONTROLS one or more databases?
Transaction Logging
a technique to RECORD ALL UPDATES including change, date, time, user?
14. A(n) ______ control restricts which persons or programs can add, modify or view information.
access
A(n) ______ control restricts which persons or programs can add, modify or view information.
access
20. A(n) ____________________ is the list of users who have rights to access the system and data.
access control list
A(n) ____________________ is the list of users who have rights to access the system and data.
access control list
Which of the following is NOT considered a design model? -Sequence diagram -User interface screen layouts -Activity diagram -Package diagram
activity diagram
6. Using a(n) ____________________ approach to the SDLC assumes requirements and needs for the planned system are uncertain
adaptive
A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood.
adaptive
High coupling ____ in a system
adds complexity
14. What is the term used to describe a guiding philosophy in which only the models that are necessary, with a valid need and the right level of detail, are created.
agile modeling
Candidate Key
an attribute or set of attributes that could serve as the PRIMARY KEY?
Key
an attribute or set of attributes, the values of which occur only ONCE in all the rows of the table?
Database (DB)
an integrated COLLECTION OF STORED DATA that is centrally managed and controlled?
A major comparison between analsys and design can be stated as:
analysis is understanding, design is solution
A major comparison between analsys and design can be stated as: -analysis is understanding, design is solution -analysis is complex, design is simpler -analysis includes users, design does not -analysis builds models, design does not
analysis is understanding, design is solution
The set of information systems the organization needs to support its operations is often called the ______ ______.
application architecture
A well-defined unit of software built to perform some specific tasks is called a(n) _____________.
application component
In a database table a column is the same thing as a(n) ______.
attribute field
18. ____________________ is the process of identifying a user to verify that he or she can have access to the system.
authentication
Which of the following is NOT a factor that affects the risk of fraud? -Asset reconciliation -Monitoring -Separation of duties -Authorization of users
authorization of users
The objective of Implementation is to
build a new system
The objective of Implementation is to -complete the specifications - integrate the application components - build a new system - install a new system
build a new system
In a three-layer architecture, the application server would be part of which layer?
business logic layer
13. What is the term used to describe an adaptive type of project that is both chaotic and controlled or ordered?
chaordic
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called ________.
client/server architecture
Complex Data Types
combinations of or extensions to primitive data types supported by PROGRAMMING LANGUAGES, OS and DBMS?
A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a(n) _______ diagram
communication
9. A data type that is defined by extending or combining other data types is called a(n) ______ data type.
complex
A data type that is defined by extending or combining other data types is called a(n) ______ data type.
complex
A(n) ____ class acts as a switchboard between the view layer and the domain layer
controller
10. The primary structured analysis model that shows inputs, processes, storage, and outputs is called the ______.
data flow diagram
Primitive Data Types
data types supported directly by the HARDWARE and PROGRAMMING LANGUAGES?
11. When it is necessary to update one database copy with changes made to the other database, it is called _________.
database Synchronization
The person who is in charge of the safety and operation of the DBMS is called the _____ _____.
database administrator
The domain model is always used as an input to which design activity? -Security and controls design -Application Component Design -User Interface Design - Database design
database design
Referential integrity is normally enforced by the ____.
database management system
The design activity key question, "How will this system interact with other systems..." is part of which design activity? -Design the interfaces -Design the application components -Describe the environment -Design security controls
describe the environment
The main purpose of a(n) ______ ______ diagram is to document and describe the programming classes that will be built for the new system.
design class
A primary model used in software design is which of the following?
design class diagram
Software methods are usually identified in which design model? -System sequence diagram -Deployment diagram -State-machine diagram -Design class diagram
design class diagram
Which is not a model normally produced as part of application component design
design class diagram
Which is not a model normally produced as part of application component design? -deployment diagram -component diagram - package diagram -design class diagram
design class diagram
What is the primary goal in Agile Modeling?
developing software
A ____ is an institution's name and public key, which is encrypted and certified by a third party
digital certificate
22. The encoding of a message with a private key is called ____________________.
digital signing
The encoding of a message with a private key is called ____________________.
digital signing
In a three-layer architecture, another name for the business logic layer is the ______ ______.
domain layer
A design class diagram is also called a data model.
false
Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.
false
Symmetric key encryption uses a public key and a private key.
false
Which of the following is not a synonym of the others? a. row b. Tuple c. record d. field
field
An integrity control that verifies the data in one field against the data in other fields is called a ____ control
field combination
An integrity control that verifies the data in one field against the data in other fields is called a ____ control. -completeness -value -data validation -field combination
field combination
A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.
first
According to an Agile iterative development process in which iteration would implementation activities normally start? -Second iteration -Pre-project activities -First iteration -Sometime after the first iteration
first
4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.
foreign key
In a distributed database when the data is divided so that separate columns of the same table are at distinct locations that is referred to as _________.
horizontal partitioning
When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.
hyperlink
When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.
hyperlink
15. An SDLC approach that completes portions of the system in small increments across iterations and integrates it into the whole is called _____.
incremental approach
The perfect technology assumption implies that _______.
issues related to technology are ignored
An attribute or set of attributes that uniquely define the rows in a table is called a(n) ______.
key
A separate relation must be created to store the attributes of a ____ relationship among two other classes.
many-to-many
An approach to the SDLC where the phases overlap is often referred to as the _______ approach
modified waterfall
The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.
navigation visibility
A diagram that shows how hardware components are interconnected with devices and cabling is called a(n) ______ _____
network diagram
6. Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.
normalization
A formal technique for transforming a relational schema to an equivalent one that eliminates data anomalies is called _______.
normalization
11. A thing in an information system that responds to messages by executing functions or methods is called a(n) _______.
object
12. What is the term used to describe system development based on the view that a system is a set of interacting objects that work together?
object oriented approach
In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.
perfect memory assumption
Database Administrator (DBA)
person in charge of SAFETY and the OPERATION of the database?
Data Administrator (DA)
person in charge of STRUCTURE and INTEGRITY of the data?
1. The term "____________________" refers to related system development activities, which are grouped into categories of project planning, analysis, design, implementation, and support.
phase
2. A(n) _______ is the database component that actually stores the raw bytes of data.
physical data store
A(n) ____ is a field or set of fields used to uniquely identify each row
primary key
A(n) ____ is a field or set of fields used to uniquely identify each row.
primary key
8. A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.
primitive
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key
private
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key. -asymmetric - private - public -symmetric
private
A user who has special security and access to a system, such as the right to assign passwords, is called a ____. -database administrator -technical user -supervisor user - privileged user
privileged user
In Scrum, the ____ maintains the product backlog list
product owner
In design class notation, the ____ of an attribute is enclosed in curly braces {}.
property
A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.
protocol
A(n) ____ describes the structure, content, and access controls of a physical data store or database.
schema
17. A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.
security
Limiting user access to the system is considered what type of design activity? -Describing the environment -Security and controls design -Application components design -User interface design
security and control
Communication diagrams indicates the order of the messages with ____.
sequence numbers
A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.
singleton
An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.
software as a service
3. One of the earliest adaptive SDLC approaches that cycles over and over again through development activities is called the _______.
spiral model
7. The "_______" refers to software development using structured analysis and structured design models.
structured approach
9. Name the programming approach where each module has one start point and one end point and uses only sequence, decision, and iteration.
structured programming
What does SQL stand for?
structured query language
______ ______ ______ is a query language used to access and update the data in a relational database.
structured query language
21. In ____________________ encryption, the same key encrypts and decrypts the data.
symmetric
A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques.
system development methodology
In XP development, a(n) ____ can guide members toward a vision and help them understand the system
system metaphor
Software, such as Web server software, and works behind the scenes is called ______ ______.
system software
3. In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.
table
Each class on an class diagram is represented by a(n) ____ in a relational database.
table
Data elements in a relational database are organized into ____.
tables
A(n) "_______" is a guideline to help an analyst complete a specific task and often includes step-by-step instructions to do something such as how to create a model.
technique
An adaptive approach to a development project is best used when _______.
the requirements are uncertain
A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.
third
A client/server architecture that divides an application into view, business logic and data layers is called _____ _____ ______.
three-layer architecture
A software architecture that divides an application into view, business logic, and data is called a(n) ________.
three-layer architecture
Amazon.com is a good example of what kind of architecture?
three-layer architecture
17. In the structured approach the concept of dividing a complex program into a hierarchy of program modules is called _____.
top down programming
When there is a piece of work or an action that includes several steps and updates to the data and which all must complete to be valid, that piece or work is called a(n) _______.
transaction
15. A technique where all updates to a database are recorded with who, when, and how information is called ________.
transaction logging
A big part of describing the environment is identifying and defining all the types of computing devices that will be required.
true
An objective of security controls is to maintain a stable operating environment for users.
true
During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
true
In user interface design the detailed screen layouts should be done after the devices have been decided.
true
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.
true
After completing a use-case design using CRC cards, the next step is to _______.
update the design class diagram
Which of the following really is both an analysis (discovery) and a design process (solution). -User interface design -System interface design -Environment design -Database design
user interface design
13. A control that checks the value of a field to ensure that it is within the correct range is a(n) _______ control.
value limit
What is a control that checks the value of a field to ensure that it is within the correct range? -Answer control -High-low control -Completeness control -Value limit control
value limit control
Using digital signatures is primarily a technique to ____. -verifying who sent a document -allow for remote signatures on official documents -digitize (scan) a signed document -electronically send a signature
verify who sent a doc
A class that is responsible for accessing both the Internet and a database has ____ cohesion
very low
In a three-layer architecture, what are the three layers?
view layer, business logic layer, and data layer
User interface objects in a sequence diagram often are labeled with the stereotype __________?
view or boundary
What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?
visibility
4. A development approach in which the complete system structure is built but with minimum functionality is called the _______.
walking skeleton
2. A method of executing the systems development life cycle (SDLC) which assumes rigid planning and final decision making at each step, is called the ____________________ approach.
waterfall
The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase.
waterfall model
A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______
with the adapter pattern
many-to-many
A separate relation must be created to store the attributes of a __________________ relationship among TWO other classes?
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? -Completeness control -Total control -Secure control -Comprehensive control
Completeness control
Which of the following is not one of the design activities included in the Design System Components core process? -Describe the environment -Design the software methods - Design the security controls -Design the user interface
Design the security controls
What are two key elements of describing the environment? - Programming language and operating system environment -External systems and technology architecture -Communication protocols and security methods -Hardware configuration and DBMS's
External systems and technology architecture
What is a control that checks the value of a field to ensure that it is within the correct range? -Answer control -High-low control -Value limit control -Completeness control
Value limit control
Which of the following is NOT considered a design model?
activity diagram
The design activity key question, "How will this system interact with other systems..." is part of which design activity?
describe the environment
Which is not a model normally produced as part of application component design?
design class diagram
Which is NOT an objective of integrity controls?
ensure a stable functioning operating environment
Which user is known to the system and is authorized to access all or certain parts of it?
registered user
Which of the following is a type of model used in user interface design?
system sequence diagram
Three types of users that are considered in the design of a security system are ____.
unauthorized user, registered user, and privileged user
21. A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure. a. single c. partitioned b. replicated d. cloud-based
A
4. An approach to the SDLC where the phases overlap is often referred to as the _______ approach. a. modified waterfall c. modified predictive b. waterfall d. spiral
A
A relational database management system stores data in tables.
True
65%
According to the Dr Dobbs report on project success what is the approximate percent of Agile or iterative projects that can be considered completely successful?
Rows
All ____ in a table are guaranteed to be UNIQUE if the table's primary key is guaranteed to be UNIQUE?
Which of the following methodologies use an adaptive approach to systems development?
All of them
8. The objective of the ____ is to keep the system running productively during the years following its initial installation. a. version release c. maintenance phase b. support phase d. deployment phase
B
Which is NOT one of the responsibilities of the database administrator?
Determine data confidentiality
A timeline on a communication diagram indicates the sequence of the messages
False
An object-oriented program consists of a set of object classes that work together to process an input message
False
In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class
False
In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.
False
In generalization/specialization the attributes (but not the associations) of the subclass are inherited from the superclass
False
Symmetric key encryption uses a public key and a private key
False
The Internet and the WWW are synonyms
False
The Scrum master sets the project schedule and assigns tasks.
False
The UP should not be tailored to the needs of a specific organization or system project.
False
The Unified Process (UP) life cycle has four phases: inception, elaboration, construction, and conversion.
False
The Web is the highway over which messages and information travel from network to network
False
The controller object is usually part of view layer
False
A relational database management system stores data in tables
True
Interoperability
The ability of a component or system to interact with other components or systems is referred to as what?
Tuple
Which of the following below is NOT a synonym of the others? > Column, Tuple, Attribute, Field
Field
Which of the following below is NOT a synonym of the others? > Tuple, Field, Row, Record
Undefined project management practices
Which of the following best describes the reason why projects fail?
Who is the project manager?
Which of the following is NOT a common question asked by the client before giving project approval?
To reduce staffing requirements
Which of the following is NOT a standard reason for initiating a system development project.
No required coding standards
Which of the following is NOT an XP practice?
Documentation Management
Which of the following is NOT one of the PMBOK knowledge areas?
Setting up programming rules and guidelines.
Which of the following is NOT one of the activities associated with staffing the project team?
Setting up programming rules and guidelines.
Which of the following is NOT one of the external responsibilities of a project manager?
Training the users
Which of the following is NOT one of the major activities of the support phase?
The _________________ pattern is a based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.
controller
A database that is stored at multiple locations but which does not need to be interconnected or synchronized is called a(n) ______ ______.
decentralized database
The model that best shows how software components are distributed across hardware components is the ________.
deployment diagram
UP disciplines are involved in each iteration, which is typically planned to span ____.
four weeks
16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.
fraud triangle
A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.
fraud triangle
16. A set of tools that work together to provide a comprehensive development and programming environment is called a(n) _____.
incremental development evironment
12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.
integrity
An object-oriented program consists of a set of computing ______.
objects
Row
one HORIZONTAL GROUP of data attribute values?
Database Lock
technique to apply EXCLUSIVE CONTROL to a portion of the database to one user at a time?
. The set of computing hardware, network hardware and system software used by an organization is called the _________.
technology architecture
The set of computing hardware, network hardware and system software used by an organization is called the _________.
technology architecture
Structured Query Language (SQL)
the LANGUAGE to ACCESS and UPDATE data in a relational DBMS?
Attribute Value
the VALUE held in a SINGLE TABLE CELL?