System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_1
False
A network diagram and a location diagram show basically the same information but in a different format.
Domain Layer
In a three-layer architecture, another name for the business logic layer is what?
Adding a use case controller to a sequence diagram is an example of applying a design pattern
True
Web-based application is software with the following characteristics:
Uses a browser and web-server
Which of the following is NOT a valid Web protocol?
VPN
The set of world wide resources that are available over the Internet.
When you use the term "Web", what is the correct definition?
A design class diagram is also called a data model.
false
A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.
protocol
A software architecture that divides an application into view, business logic, and data is called a(n) ________.
three-layer architecture
Amazon.com is a good example of what kind of architecture?
three-layer architecture
A big part of describing the environment is identifying and defining all the types of computing devices that will be required.
true
An objective of security controls is to maintain a stable operating environment for users.
true
During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
true
Which of the following is NOT considered a design model?
activity diagram
Protocol
A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.
Three layer architecture
A client/server architecture that divides an application into view, business logic and data layers is called what?
Server
A computer that manages shared resources and allows users to access those resources over a network is called a what?
Network diagram
A diagram that shows how hardware components are interconnected with devices and cabling is called a what?
False
A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.
Client/Server Architecture
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?
A toolbar might be considered an example of what?
Embedded Software
What does XML stand for?
Extensible markup language
The activity of Describing the Environment consists of what two key elements?
External systems and technology architecture
A timeline on a communication diagram indicates the sequence of the messages
False
In generalization/specialization the attributes (but not the associations) of the subclass are inherited from the superclass
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
False
One type of design class stereotype is called a "concrete class" because it can be instantiated
False
Relationships in a relational database are usually represented by embedding a foreign key in each participating table
False
False
For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.
What is the latest version of HTML?
HTML5
What does HTTP stand for?
Hypertext Transfer Protocol
False
In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.
True
In a client/server configuration, it is possible for a single software component to be both client and server.
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
Given the following URL, what is the correct description of the portion shown in bold? http://www.barnesandnoble.com/u/books-best selling-books/379003057
The server name
Technology Architecture
The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?
System Software
Software, such as Web server software, and works behind the scenes is called what?
True
The Internet can be thought of as the network of networks.
False
The Web is the highway over which messages and information travel from network to network.
Interoperability
The ability of a component or system to interact with other components or systems is referred to as what?
External systems and technology architecture.
The activity of Describing the Environment consists of what two key elements?
Technology Architecture
The set of computing hardware, network hardware and system software used by an organization is called the what?
Application Architecture
The set of information systems the organization needs to support its operations is often called the what?
Application Architecture
The set of information systems the organization needs to support its operations.
World Wide Web
The set of resources that can be accessed over the Internet is referred to what?
When we use the term the Web what is the correct definition?
The set of world wide resources that are available over the Internet
Internet Backbone Network
The high-speed, high capacity network that interconnects regions, countries, and continents.
A relational database management system stores data in tables
True
An objective of security controls is to maintain a stable operating environment for users
True
Another name for the data model is the domain model
True
Designing a single user interface is now the exception, not the norm.
True
Every database in a DBMS consists of two separate data stores
True
On a sequence diagram, view layer objects send messages to the controller
True
The majority of new systems today must be integrated into existing networks without disrupting existing applications
True
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction
True
A function or service that is called from a Web application to another Web application is called a(n) ________.
Web service
Hypertext Transfer Protocol
What does HTTP stand for?
Local Area Network
What does LAN stand for?
Software as a Service
What does SaaS stand for?
Extensible Markup Language
What does XML stand for?
A Server Computer
What is a computer that manages shared resources for access across a network called?
HTTP is less secure, while HTTPS would be used for credit card transactions.
What is the difference between HTTP and HTTPS?
HTML5
What is the latest version of HTML? (As of 2016)
A personal computing device includes all of the following except ______.
a router
A major comparison between analsys and design can be stated as:
analysis is understanding, design is solution
In a three-layer architecture, the application server would be part of which layer?
business logic layer
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called ________.
client/server architecture
The model that best shows how software components are distributed across hardware components is the ________.
deployment diagram
A primary model used in software design is which of the following?
design class diagram
Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.
false
Symmetric key encryption uses a public key and a private key.
false
When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.
hyperlink
An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.
software as a service
The set of computing hardware, network hardware and system software used by an organization is called the _________.
technology architecture
In user interface design the detailed screen layouts should be done after the devices have been decided.
true
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.
true
In a three-layer architecture, what are the three layers?
view layer, business logic layer, and data layer
The design activity key question, "How will this system interact with other systems..." is part of which design activity?
describe the environment
Which is not a model normally produced as part of application component design?
design class diagram
Build or buy questions are usually addressed during which design activity?
design the application components
A deployment diagram is most useful for which design activity?
designing application components
A knowledge of all the computing devices accessed by clients is required for which design activity?
designing the user interface
Which is NOT an objective of integrity controls?
ensure a stable functioning operating environment
Which user is known to the system and is authorized to access all or certain parts of it?
registered user
Which of the following is a type of model used in user interface design?
system sequence diagram
Three types of users that are considered in the design of a security system are ____.
unauthorized user, registered user, and privileged user
False
The primary benefit of a network diagram, is to show the network cabling and the network routers.
Hypertext Markup Language
A protocol that defines the structure and content of a web page is called what?
Virtual Private Network (VPN)
A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?
What is a computer that manages shared resources for access across a network called?
A server computer
Three-layer architecture
A software architecture that divides an application into view, business logic, and data is called what?
Web service
A software function or set of functions or services that can be executed via Web protocols is called a what?
False
A three-layer architecture requires at least three computers to be implemented correctly.
What is the difference between HTTP and HTTPS?
Amazon uses HTTPS for credit card information
Web-based Application
An application that uses a browser for the user interface.
False
Application software that usually executes with a browser is often just called an "App".
True
Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.
True
Describing the environment is one of the detailed activities of core process 4: Design system components.
Which of the following is NOT one of the activities of Core Process 4: Design system components?
Design security and integrity controls
System software usually refers to what kind of software?
Operating systems and web servers