SAD chapters online A 1-6 excluding five and online B

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the term that is used to describe all the activities to build launch, and maintain an information system?

SDLC

In a workflow diagram, the arrows that cross the center line are used to identify what?

Screens and Reports

Online A

Starts here

SDLC stands for what?

Systems Development Life Cycle

The most important step in preparing for an interview is to ___

Establish an objective

The user goal technique normally begins by indentifying, listing, and classifying ___.

The system users.

The text identifies three primary areas of skills that are required of a systems analyst. Which of the following is NOT one of the three?

Writing skills

Every system boundary has a ___ between itself and the environment.

boundary

A one sentence description of a use case is called

brief use case description

To design the database schema, information from which diagram is the most important?

class diagram

Inheritance describes a condition between classes where ___.

classes share some attributes

Questions that have a simple definitive answer are called ___ questions.

close-ended

Questions that have a simple, definitive answer are called ___ questions

closed-ended

A type of information system that allows geographically distributed personnel to work together on projects and tasks is called a ___.

collaboration support system

A type of relationship between classes where the objects in one class are a part of the objects in another class AND they can only exist as part of the totality.

comoposition

A UML class that is allowed to ahve a set of actual objects within it is called a(n)

concrete class

​In small development projects, a(n) ____ may be a small loose-leaf notebook or word processing file.

data dictionary

A(n) ___ can be a physical system model, a logical system mode, or a blend of the two.

data flow diagram

Analysts sometimes can spot black holes and miracles simply by examining the

data flow diagram

A place where data area held pending future access by one or more processes in a DFD is called a(n)

data store

On a DFD a(n) ___ represents a file or part of database that stores information about a data entity

data store

A centrally managed collection of data that is accessible to many users and systems at the same time is called a(n)

database

One way to show multiple, independent alternative paths within an activity diagram is with a

decision diamond

A(n) ___ is a tabular representation of processing logic containing decision variables, decision variable value, and actions or formulas

decision table

___ can summarize decision logic more concisely than structured English

decision tables

A(n) ____ is a graphical description of process logic that uses lines organized like branches of a tree

decision tree

Systems ___ mean specifying in detail how the many components of the information should be physically implemented.

design

A diagram that shows the method signatures in each class is called the

design class diagram

The purpose of a class diagram is to ___

document the information requirements in the new system

Two benefits of researching vendor solutions include ___ and ____

helping analysts discover state of the art solutions Helping users generate new ideas for business functions

Since a systems developer often words on systems that contain confidential corporate information, it is important that he or she have a high commitment to ___ and ethics

integrity

The most important and first step in preparing for an interview with a user is to establish the ___ of the interview

objective

The ___ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions

perfect technology assumption

The ___ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions

perfect technology assumption

The P in the FURPS acronyms stands for

performance requirements

For real-world objects the state of an object is the same as its ___

status condition

In UML notation, the guillemets character is used to show what kind of notation?

stereotypes

A business intelligence system supports

strategic planning and executive decision making

A system that is part of a larger system is called a

subsystem

Those skills which have to do with computers, programming, networks, and databases are called ___ skills.

technical

The group that provides direction for the configuration of the new system in the existing computing environment are called ___

technical stakeholders

An event that occurs simply by reaching a point in time is called a(n)

temporal event

Which is NOT an objective of integrity controls?

​Ensure a stable functioning operating environment

What are two key elements of describing the environment?

​External systems and technology architecture

One important reason for prioritizing requirements is to

avoid scope creep

An approach to dividing a system into components based on subsystems is referred to as

functional decomposition

Clients play what role in the development of a new system?

fund the project

Determine the major subsystems and assigning them to an iteration is done in which Core process?

2

Determining team members and assigning responsibilities is done in which Core process?

2

Performing in-depth fact finding and understand details is done as part of which Core Process?

3

Designing the database schema is included in which Core Process

4

Programming is included in which Core Process?

5

Overall functional testing is included in which Core Process?

6

What is usually the end result of an iteration

A piece of working code

An example of an attribute of an object might be ___

A social security number

A diagram that is most effective in describing the internal steps of a use case is

A workflow diagram

Which of the following is NOT considered a design model?

Activity diagram

Which of the following is a table that describes the relationship between processes and the location in which they are performed?

Activity location matrix

"Customer decides to buy shirt" is an example of what?

Activity prior to an event

A relationship between a "sports team" and the players, coaches, and sponsor would be described as what kind of relationship

Aggregation

___ is the term used to describe an information system development methodology that emphasizes flexibility and rapid response to anticipate new requirements during developement.

Agile developement

A work sequence draft provides three benefits to a project. Which of the following are included in those benefits?

Anticipate resource needs Measure progress

___ is the equivalence of data content between data flows entering and leaving a process and data flows entering and leaving a process decomposition data flow Diagram(DFD)

Balancing

The action-expression occurs when

Before the object enters the destination state

____ is an important part of the follow-up after an interview.

Building models

What are the three parts of a System Vision Document?

Business benefits Problem description System capabilities

Understanding the way an organization performs tis procedures is what kind of skill area?

Business skills

What do we call a person or group who provides funding for the development of the new system?

Client

The term "I'll know it when I see it" refers to what method of requirements definition?

Collecting active user comments

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

Completeness control

A(n) ___ represents the system response to one event

DFD fragment

What is the name of the general control technique used to ensure that entered data is correct?

Data validation control

​Which of the following data flow diagram (DFD) symbols usually corresponds to a data entity on an entity-relationship diagram (ERD)?

Data-store

The domain model is always used as an input to which design activity?

Database Design

Which of the following is NOT a technique to document program logic for a process

Decision matrix

The design activity key question, "How will this system interact with other systems..." is part of which design activity?

Describe the environment

Method signatures are included in which diagram?

Design class diagram

The + in FURPS+ includes which of the following types of requirements

Design constraints Supportability requirements

A storyboard is useful for what?

Design of the user interface

Build or buy questions are usually addressed during which design activity?

Design the application components

Which two answers identify the two middle core processes i.e. core processes 3 and 4?

Design the components Understand the details of the problem

Which of the following is not one of the design activities included in the Design System Components core process?

Design the security controls

A knowledge of all the computing devices accessed by clients is required for which design activity?

Designing the user interface

Which two of the following are activities of Core process 3?

Develop user-interface dialogs Gather detailed information

User stories are different than use cases in what way?

Differ in the amount of detail captured

A process in which an organization commits to using an integrated set of software packages for key information systems is called ___.

Enterprise Resource Planning (ERP)

Two primary techniques to identify use cases are ___ and ___

Event decomposition techinique User goal technique

The technique used to identify used cases based on external, temporal, and state events is the

Event decomposition technique

In using the event decomposition techniqure, which of the following is NOT a type of event that is considered.

Event initiated by a user login

What type of stakeholders are those that do not use the system on day to day tasks but use information, such as reports, from the system.

Executive stakeholders

Which of the following is NOT a step in the development of a state machine diagram?

Expand the name of each state to identify concurrent activites

A(n) ___ is a person or organization outside the system boudnary that supplied data inputs or accepts data outputs

External agent

___ requirements are based on the procedures and rules that the organization uses to run its business

Functional

___ refers to the division of a system into processes or subsystems.

Functional Decomposition

Which of the following describes what the system is required to do?

Functional requirements

An arrow leading from three object sets to another indicates what type of association?

Generalization specialization

___ is based on the idea that people classify things in terms of similarities and differences.

Generalization specialization

The purpose of a use case is to ___

Identify a business event that requires system action

Two important goals or steps within Core Process one are ___ and ___

Identify the solution objective; obtain project approval

A ___ includes hardware, software, inputs, outputs, data, people, and procedures.

Information system

Which of the following is normally the most time-consuming and resource expensive operation?

Interview stakeholders

Which of the following is an example of a state event?

Inventory reorder point is reached

When analyzing the list of nouns to determine whether to exclude a particular noun as an important "thing," which of the following should be asked about the noun?

Is it a synonym of an existing thing? Is it an output from the system?

The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question

Is the system at rest

Which of the following is NOT true about a UML class

It has mutliplicity

Which of the following refers to a modeling technique that breaks the system into a hierarchial set of increasingly more detailed models?

Level of abstraction

​The rule of 7 ± 2 is also known as

Miller's number

​A(n) Answer is a process or data store with a data element that is created out of nothing.

Miracle

Which of the following is an example of a temporal event?

Month end billing is started

___ is used to describe the actual range of linkups allowed in an association (the minimum and maximum values)

Multiplicity constraints

___ requirements are characteristics of the system other than the business procedures it must support.

Nonfunctional

What are the two primary benefits of reviewing the documentation of existing inputs, outputs, and procedures.

Obtain a preliminary understanding Serve as visual aids in interview discussions

The P in FURPS acronyms stands for ___

Performance

___ requirements describe operational characteristics related to measures of workload such a throughput and response time

Performance

Which of the following is NOT a defined area of knowledge that is required of systems analysts?

Problem Solving Knowledge

Which of the following statements is correct about questionnaires?

Questionnaires have a limited and specific use in information gathering

​Which of the following data flow diagram (DFD) symbols represents the communication between an external agent and a process while the process is executing?

Real-time link

Which user is known to the system and is authorized to access all or certain parts of it?

Registered user

The R in the FURPS acronyms stands for

Reliability

___ requirements describe the dependability of a system such as a service outages and incorrect processing

Reliability

___ requirements describe how access to the software application will be controlled and data will be protected

Security

The S in the FURPS acronyms stands for

Security Requirements

Limiting user access to the system is considered what type of design activity?

Security and controls design

When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions?

Should it be researched further?

A diagram that shows the overall structure of a system as it exists after it is deployed is called what?

Software components diagram

____ is a method of writing process specification that combines structure programming techniques with narrative English.

Structured English

The term "___" refers to a business professional who uses analysis and design techniques to solve business problems using information technology.

Systems analyst

Application architecture is used to refer to

The organization and configuration of all software solutions into information systems

The primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows ___

The sequence of tasks

What is the purpose of an iteration recap?

To review the project processes

___ is used to describe the relationship between two things of the same type, such as one person being married to another person

Unary association

What does the acronym UML stand for?

Unified Modeling Language

Use case diagrams, class diagrams, sequence diagrams are all examples of what standard modeling method?

Unified Modeling Language (UML)

The U in the FURPS acronym stands for

Usability

__ requirements describe operational characteristics related to users such as work procedures and online help

Usability

What are the first two models, e.g. diagrams that include the entire system, that are built during the Core Process to discover and understand the details

Use case diagram Class Diagram

What do we call the type of testing that the users preform to ensure that the system meets the business requirements?

User acceptance testing

Which of the following is NOT considered an analysis model?

User interface screen layouts

Which of the following is the analyst's approach to problem solving?

Verify that the benefits of solving the problem outweigh the costs, then define the requirements for solving the problem

Which of the following is NOT a part of the application architecture?

Virtual private networks

Which are the major business themes that guide analysts in fact finding activities?

What are the business processes? Ho are the business processes performed? What information is needed?

The guard-condition on a transition indicates what?

Whether the transition fires.

The UML notation for the "includes" relationship is a(n)

a dashed arrow

A UML class that never has any objects within the class is called an

abstract

In a generaliztion/specialization relationship, it would not make sense for a class at the bottom of the hierarchy to be a(n) ___ class

abstract

Features of a particular user story that must be present in the final document are called

acceptance criteria

The final part of a user story is the ___, which indicates the features that must be present

acceptance criteria

A(n) Answer control restricts which persons or programs can add, modify or view information.

access

A(n) Answer is the list of users who have rights to access the system and data.

access control list

In a transition label in a state machine A(B)[C]/D. The D stand for what?

action expression

Another name for a workflow diagram is a ___ diagram

activity

An ___ describes the sequential flow of user activities

activity diagram

Workflows can be documented using _______.

activity diagrams

A(n) ___ is a table that describes stored data entities, the locations from which they are accessed, and the nature of the accesses.

activity-data matrix

An external agent or person that interacts with the system by supplying data is called a(n)

actor

A type of relationship where between classes where the objects in one class are part of the objects in another class BUT they can also exist as separate objects alone.

aggregation

An information system development process that emphasizes flexibility to embrace change is called

agile development

In UML the constraint denoted by "0..*" indicates what?

an optional relationship

Core process 3 is called "Discover and understand details." another term that is used to describe these activities is ___ activities

analysis

The process of understanding and specifying in detail what the information system should accomplish is called systems

analysis

A major comparison between analsys and design can be stated as:

analysis is understanding, design is solution

Another term that is used to define a computer application is

app

A well-defined unit of software built to perform some specific tasks is called a(n) Answer.

application component

Questionnaires can be useful in information gathering when users ___

are widely distributed geographically

A class that represents a many-to-many association between two other classes is called a(n) ___ class.

association

A term in UML that describes a naturally occurring relationship between specific things is called a(n)

association

An association that is also treated as a class is called an

association class

A descriptive piece of information about a thing or object is called an ____

attribute

A piece of information about a particular object is called a

attribute

Descriptive properties of things in the problem domain are often documents as what?

attributes

is the process of identifying a user to verify that he or she can have access to the system.

authentication

is the process of allowing or restricting a specific user's access to specific resources.

authorization

An automation boundary is best described as the separation between the ____.

automated part of a system and the manual part of the system

The ___ describes the seperation between the automated part of a system and the manual part of a system

automation

The ___ is the dividing line between the computerized portion of the system and the users who operate the system.

automation

The boundary between the automated portion of th esystem and the users of the system is called the

automation boundary

​The term "Answer" is used to describe the equivalence of data content between data flows entering and leaving a process and data flows entering and leaving a process decomposition data flow diagram (DFD).

balancing

Chapter 1

begins here

A process or data store with data input that is never used to produce a data output is referred to as a(n)

black hole

A technique to identify problem domain objects in which developers and users work together in an open group setting is called the

brainstorming technique

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called that ___.

brainstorming technique

The event decomposition techniques begins by identifying all of the ___

business events

When words are concatenated together to form a single word and the first letter of each is capitalized it is called a ___ notation

camelback

A measure of the number of links between one objects and another object in a relationship is called the

cardinality

The crows feet notation on an ERD is a type of ___ constraint

cardinality

The number of associations that occur among specific things in an entity relationship diagram is called ___

cardinality

Support systems that allow employees to communicate with each other and with customers and suppliers are called

collaboration support systems (CSS)

If we modeled a "sale" and the "sale items" with a whole-part relationship, it would be best described as a ___ relationship

composite

An attribute that contains a collection of related attributes is called a(n)

compound attribute

In a state machine diagram when an object is in multiple states at the same time it is called

concurrency

A(n) ___ is a data flow diagram that summarizes all processing activity within the system in a single process symbol.

context diagram

​A(n) ____ is a data flow diagram (DFD) that summarizes all processing activity within the system in a single process symbol.

context diagram

The two systems that are externally orient, i.e. they focus on entities outside the organization.

customer relationship and supply chain management systems

In the traditional approach to system development, the system stores information about

data entities

A ___ is a textual description of a data flow's content and internal strucutre.

data flow definition

A diagram that represents system requirements as processes, external agents, data flows, and data stores is called a(n)

data flow diagram

When an object moves from one state to another the ending state is called a(n)

destination state

Questionnaires can be used to ask questions that

determine user opinions

The encoding of a message with a private key is called

digital signing

A(n) ____ is a task that is performed by one person in response to a business event, adds value, and leaves the system in a stable condition.

elementary

The level of analysis to use when identifying user goals is ___

elementary business process level

Highly integrated systems that support company-wide operations and data, often combining aspects of many other systems is a

enterprise resource planning application

The diagram consisting of data entities and their relationships is called a(n)

entity relationship

A(n) ___ is somethin that occurs at a specific time and place and can be precisely measured.

event

An occurrence at a specific time and place, which can be descirbed and is worth remembering, is called a(n)

event

Somethin that occurs at a specific time and place and should be remembered by the system is called a(n)

event

The ___ technique is a technique to identify use cases by determining the external business events to which the system must respond.

event decomposition

​The term diagram 0 is another name for a(n) ____.

event-partition system model

A data flow diagram (DFD) that models system requirements using a single process for each event in a system or subsystem is called a(n)

event-partitioned system model

A data flow diagram (DFD) that models system requirements using a single process for each event in a system or subsystem is called a(n) ___.

event-partitioned system model

Persons outside an organizations control who interact with the system or who have an interest in its operation are called ___ stakeholders

external

An event that occurs outside the system is called a(n)

external event

The type of event that occurs outside of the system is called a(n) ___.

external event

___ is an important part of each interview

follow up

A DFD ___ represents the system response to one event within a single process symbol

fragment

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the Answer.

fraud triangle

___ requirements are most often documents in graphical and textual models

functional

In a relationship where there are superclasses and subclasses, the relationship is called a relationship

generalization/specialization

Diagrams and schematic representations of some aspect of a system are examples of a ___ model

graphical model

Two of the primary benefits of iterative development include

high risk elements done first early deployment of part of the system

A system that is subject to many external laws and regulations is a

human resource management system

___ requirements describe the constraints such as programming languages, tools, and communications protocols for distributed portions of the system.

implementation

A relationship between use cases in which one use case is used by another used case is called the

includes relationship

An analyst can avoid information overload by adhering to the rule of ___

information minimization

If too much information is presented at once, people experience a phenomenon called

information overload

A collection of interrelated components that collect, process, store, and provide as output the information needed to complete a business task is called a _______.

information system

A concept that allows subclasses to share characteristics of their superclasses is called

inheritance

The idea that the attributes of a superclass are also attributes of a subclass is called

inheritance

A(n) Answer control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

integrity

___ requirements describe interactions between systems, e.g. the method of communication between one system and another system

interface

Persons within an organization who have a significant interest in its operation are ___ stakeholders

internal

Another name for a state event is a(n)

internal event

State events are also sometimes called ___ events.

internal events

In UML notation the includes relationship connects two use cses. The use case that is "included" use case is the one which ___

is connected to the head of an arrow

Asking many detailed, probing questions during an initial interview usually

is necessary to understand the business process

A development process where the system is grown piece by piece is called

iterative development

An attribute for an object which can be used to uniquely identify that object is called a(n)

key

An attribute whose value uniquely identifies an object is called a(n)

key attribute

The strength of closed-ended questions is that they

limit answers to a set of choices

Two of the primary elements that are included in a work breakdown structure include:

list of tasks and estimated effort

Which of the following is a diagram or map that identifies all of the processing location of a system

location diagram

A relationship that has a cardinality constraint of one or more is a(n) ___ relationship

mandatory

As association class is frequently required for what kind of relationship?

many to many

A series of formulas that describe technical aspects of a system is a(n) model.

mathematical model

One of the dangers in researching vendor solutions is that users and analysts

may want to buy one of these solutions prematurely

is a principle of model design that seeks simplicity by limiting the number of connections among model components.

minimization of interfaces

A representation of some aspect of the system being built is a ___

model

A synonym for cardinality (used with UML class diagrams) is ___.

multiplicity

In UML notation for object oriented approach the term ___ is used instead of cardinality

multiplicity

One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called that ___

noun technique

The technique for finding problem domain objects by finding and listing all the nouns in a dialog or description is called a

noun technique

A state machine diagram is used to document the state and transitions of a

object

The above cardinality constraint on the order data entity indicates that there can be

one or many orders

Questions that encourage discussion are called ___ questions

open-ended

Persons who regularly interact with the system as part of their jobs are called ___

operational stakeholders

In a state machine diagram, a state is represented by a(n)

oval

What is the name of the diagram that is often used to show the different layers of the system?

package diagram

A sequential set of connected states and transitions is called a(n)

path

An assumption about DFDs that includes things such as instant processing, infinition storage, and zero errors is called

perfect technology

If the DFD is a ___, then it assumes that the system will be implemented with perfect technology.

physical model

Every successful inter requires ___

preparation

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.

private

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.

privileged user

The specific area of the user's business need that is within the scope of the new system is called the

problem domain

The specific area of the user's business need that is within the scope of the new system is called the ___

problem domain

The most important role of a systems analyst in business is __

problem solving

​A symbol on a data flow diagram (DFD) that represents an algorithm or procedure by which data inputs are transformed into data outputs is called a(n)

process

​A symbol on a data flow diagram (DFD) that represents an algorithm or procedure by which data inputs are transformed into data outputs is called a(n) ____.

process

The traditional approach to information systems development describes activities as

processes carried out by people or computers

What is the single activity that usually requires the most time during a project?

programming

A planned undertaking that has a beginning and an end and produces some result is called a

project

The beginning state of an object when its staes are diagrammed is called a(n)

pseudostate

As part of the interview process, any unresolved issues should be ____

put on an open-items list

The source of using the concept of events to define functional requirements was first emphasized with ___ systems.

real-time

A(n) ___ is a naturally occurring association among specific things.

relationship

The standard template for a user sotry is "As a ____ I want a goal so that reason." Fill in the blank

role

A control that protects the assets of an organization against all threats, primarily external threats is called Answer control.

security

A drawing which shows individual objects and their links with other objects, and which is used to help understand the problem domain class is called a(n)

semantic net

The boxes on a class diagram can be though of as a particular

set of objects

The domain model class diagram is used to ___

show the things involved in the user's work that are important

An information system consists of

software, database, and manual processes

Persons who have an interest in the successful implementtion of the new system are called ___

stakeholders

The term ___ refers to all the people who have an interest in the successful implementation of the system

stakeholders

A condition during an objects life when it satisfies some criterion is called a(n)

state

A(n) ___ event occurs when something happens inside the system that triggers the need for processing

state

An event that occurs when something inside the system triggers the need for processing, but usually as a consequence of external activity is called a ___ event.

state

A UML diagram that shows the life of an object in states and transitions is called a(n)

state machine diagram

When a system is partition into pieces, each piece is referred to as a

subsystem

After investing resources in thoroughly understanding the business problem, the analyst decides that the costs of solving the problem will likely outweigh the benefits. The analyst should ____.

suggest that the project should be discontinued.

A knowledge management system

supports the storage of an access to documents within an organization

In Answer encryption, the same key encrypts and decrypts the data.

symmetric

One way to show concurrent paths within an activity diagram is with a

synchronization bar

The symbol that is used to initiate concurrent paths in a state machine diagram is what?

synchronization bar

Looping in an activity diagram is best represented using what?

synchronization bars

A ___ is a collection of interrelated components that function together to achieve some outcome.

system

The process of understanding and specifying what the information system should accomplish is called

system analysis

Checks and safety procedures taht are put in place to protect the integrity of the system are called

system controls

Checks or safety procedures are put in place to protect the integrity of the system is referred to as

system controls

The primary output of Core process one and which is used to get project approval is called

system vision document

Those activities that enable a person to understand and specify what the new system should accomplish are usually referred to as

systems analysis

Those skills, steps, guides, and tools that support and lead up to the actual programming of the system are referred to as

systems analysis and design

A business professional who uses analysis and design techniques to solve business problems using technology is called a

systems analysts

A person that functions as an architect to plan, capture the vision, and understand the needs for new system is often called a ___

systems analysts

The process of specifying how components of the new system should be implemented is called

systems design

Those activities that enable a person to describe in detail how the information systems will actually be implemented are called

systems design

Those activities that enable a person to describe in the detail the system that solves the need is called ___

systems design

Such things as how to do project planning, or how to do cost/benefit analysis, or how to conduct an interview is called _______.

techniques

The term technology architecture refers to

the hardware, network, and system software

During a fact finding interview, and important guideline is ___.

to probe to get sufficient details

A specific software application that assists developers in creating models or other components required for a project is called a

tool

The movement of an object from one state to another is done through the process of a(n)

transition

Which of the following is NOT an element in a transition label?

trigger

The association shown on the above image is a(n) ___ association.

unary

An application component can be thought of as a(n) __________.

unit of software

___ requirements describe how a system is configured, monitored, maintained, and updated

usability

An activity that the system performs in response to a user request is called a

use case

Detailed design is the thought process of how to program each ___

use case

The system's reaction to an event is called a(n) ___

use case

The diagram that illustrates actors and their relationships to the functions provided by the system is called a

use case diagram

One common element of all types of business information systems is that they all

use database technology

A UML model that is used to show use cases and their relationships to actors is called a(n)

user case diagram

One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ___ technique.

user goal

The ___ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.

user goal

Acceptance criteria are usually associated with

user stories

"As a student, I want to register for a class in order to fulfill education requirements" is an example of a(n) ___

user story

A short sentence used by an end user that states what he/she does as a part of his/her work is called a

user story

A control that checks the value of a field to ensure that it is within the correct range is a(n) Answer control.

value limit

The general relationship between classes in which one class is a part or component of another class is called a(n) ___ relationship

whole-part

A document that identifies and lists all of the tasks to be completed within an iteration is called a

work breakdown structure (WBS)

A ___ is the sequence of processing steps that completely handles one business transaction.

workflow

Minimization of interfaces is directly related to the rule of ___.

​7 ± 2

Which of the following is NOT a factor that affects the risk of fraud?

​Authorization of users

A primary model used in software design is which of the following?

​Design class diagram

Software methods are usually identified in which design model?

​Design class diagram

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?

​Design the software classes

A deployment diagram is most useful for which design activity?

​Designing application components

When describing the interfaces to external systems, which is not one of the important issues?

​Programming languages

Which design activity that pervades all other design activities?

​Security and controls design

Which of the following can be classified as privileged users?

​System programmers, application programmers, and system administrators

Which of the following is a type of model used in user interface design?

​System sequence diagram

Which of the following really is both an analysis (discovery) and a design process (solution).

​User interface design

What is a control that checks the value of a field to ensure that it is within the correct range?

​Value limit control

The objective of Implementation is to

​build a new system

Which is not a model normally produced as part of application component design?

​design class diagram

A ____ is an institution's name and public key, which is encrypted and certified by a third party.

​digital certificate

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.

​field combination

Three types of users that are considered in the design of a security system are ____.

​unauthorized user, registered user, and privileged user

Using digital signatures is primarily a technique to ____.

​verifying who sent a document


Conjuntos de estudio relacionados

Unité 0 - Leçon 2 - Comprendre la méthode 2/2

View Set

Lewis Chapter 14: Infection and HIV

View Set

Glencoe American Vision, Unit 2, Section 4-1 and 4-2

View Set

Final Exam Multiple Choice Questions

View Set

Operations Management, Operations Performance and Strategy, Structure and Scope of Operations: S1,S2,S3

View Set