Ch. 9 True/ False, Chapter 9, System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A design class diagram is also called a data model

False

A lifeline indicates when a method is executing for a destination object

False

A local business office with a small database which is only used by two or three users would most probably implement a desktop DBMS

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment

False

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.​

False

A three-layer architecture requires at least three computers to be implemented correctly

False

A timeline on a communication diagram indicates the sequence of the messages

False

An object-oriented program consists of a set of object classes that work together to process an input message

False

Another term for a network diagram is a deployment diagram

False

Application software that usually executes with a browser is often just called an "app".

False

Dependency relationships cannot exist between classes within packages

False

Design class diagrams and interaction diagrams should be developed independent of each other

False

Design using CRC cards does not require the use of a design class diagram.

False

Every table in a relational database must have a foreign key.​

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.​

False

In generalization/specialization the attributes (but not the associations) of the subclass are inherited from the superclass

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

False

Including a total amount field as the sum of other fields in a table is a violation of second normal form.​

False

It is usually a bad idea to try to include user-interface classes to a CRC design

False

On a sequence diagram the messages are numbered to indicate the order of firing

False

One type of design class stereotype is called a "concrete class" because it can be instantiated

False

Problem domain modeling and database normalization are incompatible techniques for relational database design.​

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table.​

False

Since the design activities all interact with each other, it really doesn't matter which activity occurs first

False

Symmetric key encryption uses a public key and a private key

False

The Internet and the WWW are synonyms

False

The Web is the highway over which messages and information travel from network to network

False

The controller object is usually part of view layer

False

The domain data in a database is sometimes referred to as metadata.​

False

The first-cut DCD includes method signatures

False

The initial version of a communication diagram contains view layer and business layer

False

The objective of object-oriented analysis is to identify the objects that must work together to carry out each use case

False

The perfect memory assumption means that there is always adequate memory to execute the program

False

There are two preferred methods to accessing the database. One is to have newly instantiated object call the data access object. The other is to let the controller access the data access object

False

To ensure that the database is designed correctly, an important member of the project team is the data administrator

False

7. A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

First

Which is a valid sequence of modeling steps for designing a use case?

First cut DCD, Communication diagram, Final DCD, Package Diagram

According to an Agile iterative development process in which iteration would design activities normally start

First iteration

False

For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.​

___________ is where the value in one field determines the value in another field in the same record.​

Functional dependency

Which of the following is NOT part of a multilayer object-oriented design (OOD)?

Functional module

Each class on an class diagram is represented by a(n) ____ in a relational database.

Table

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table

True

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.​

True

A network diagram is a useful model to show three/layer architecture

True

A relational database management system stores data in tables

True

A relational database management system stores data in tables.​

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.​

True

Adding a use case controller to a sequence diagram is an example of applying a design pattern

True

An objective of security controls is to maintain a stable operating environment for users

True

Another name for the data model is the domain model

True

Both a communication diagram and a sequence diagram have the same purpose and provide basically the same information

True

Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.​

True

Designing a single user interface is now the exception, not the norm.

True

Detailed Object-oriented design (OOD) is done on a use case-by-use case basis

True

Every database in a DBMS consists of two separate data stores

True

In an iterative approach to software development, it is usually best to develop the database in the first few iterations.​

True

It is better to have the data access object create a new object when multiple objects may be created.

True

Navigation visibility may be bidirectional

True

On a sequence diagram, view layer objects send messages to the controller

True

Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.​

True

Relationships between tables is usually indicated through the use of a foreign key.​

True

The Internet can be thought of as the network of networks

True

The majority of new systems today must be integrated into existing networks without disrupting existing applications

True

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction

True

The objective of object-oriented design is to identify and specify all the classes and messages that work together to carry out each use case

True

The output of the design activities is a set of diagrams and documents that describe the solution system

True

The starting point for identifying messages in detailed design of a use case is always the SSD

True

A function or service that is called from a Web application to another Web application is called a(n) ________.

Web service

A function or service that is called from a Web application to another Web application is called a(n) ________.​

Web service

Hypertext Transfer Protocol

What does HTTP stand for?​

Local Area Network

What does LAN stand for?​

Software as a Service

What does SaaS stand for?

Extensible Markup Language

What does XML stand for?​

A Server Computer

What is a computer that manages shared resources for access across a network called?​

HTTP is less secure, while HTTPS would be used for credit card transactions.

What is the difference between HTTP and HTTPS?​

HTML5

What is the latest version of HTML?​ (As of 2016)

The set of world wide resources that are available over the Internet.

When you use the term "Web", what is the correct definition?​

The objective of Implementation is to​ ​-complete the specifications - ​integrate the application components - ​build a new system - ​install a new system

build a new system

In a three-layer architecture, the application server would be part of which layer?

business logic layer

According to an Agile iterative development process in which iteration would implementation activities normally start?​ -​Second iteration ​-Pre-project activities ​-First iteration ​-Sometime after the first iteration

first

6. Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.

normalization

A formal technique for transforming a relational schema to an equivalent one that eliminates data anomalies is called _______.

normalization

An object-oriented program consists of a set of computing ______.

objects

8. A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.

primitive

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key

private

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.​ ​-asymmetric - ​private - ​public -​symmetric

private

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ -​database administrator -​technical user -​supervisor user - ​privileged user

privileged user

15. A technique where all updates to a database are recorded with who, when, and how information is called ________.

transaction logging

A big part of describing the environment is identifying and defining all the types of computing devices that will be required.​

true

An objective of security controls is to maintain a stable operating environment for users.

true

During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

true

In user interface design the detailed screen layouts should be done after the devices have been decided.​

true

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.​

true

The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.

true/false condition

In a relational database, a row can be referred to as a(n)

tuple

After completing a use-case design using CRC cards, the next step is to _______.

update the design class diagram

When there is a piece of work or an action that includes several steps and updates to the data and which all must complete to be valid, that piece or work is called a(n) _______.

transaction

When describing the interfaces to external systems, which is not one of the important issues

Programming languages

When describing the interfaces to external systems, which is not one of the important issues?​ ​-Network addresses ​-Programming languages - ​Error handling ​-Message formats

Programming languages

5. A(n) ____ is a field or set of fields used to uniquely identify each row. a. primary key c. object identifier b. foreign key d. attribute

A

Which analysis model serves as an input model to a design class diagram?

Domain model class diagram

38. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document

A

Three layer architecture

A client/server architecture that divides an application into view, business logic and data layers is called what?

Server

A computer that manages shared resources and allows users to access those resources over a network is called a what?

Which of the following is included in the top compartment of a design class?

Stereotype name

3. In a relational database, a row can be referred to as a(n) ____. a. field c. attribute b. tuple d. relation

B

36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with a(n) ____ key. a. asymmetric c. public b. private d. symmetric

B

37. A ____ is an institution's name and public key, which is encrypted and certified by a third party. a. private key c. certifying authority b. digital certificate d. digital key

B

4. Data elements in a relational database are organized into ____. a. attributes c. tables b. objects d. tuples

C

14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns. a. first c. third b. second d. fourth

A

2. Which of the following is NOT a component or function of a typical database management system (DBMS)? a. Low-level process management c. Application program interface b. End-user query processor d. Administrative interface

A

20. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based

A

21. A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure. a. single c. partitioned b. replicated d. cloud-based

A

30. What is the name of a general control technique used to ensure that entered data is correct? a. Data validation control c. Data acceptance control b. Data access control d. Data completeness control

A

35. Which of the following can be classified as privileged users? a. System programmers, application programmers, and system administrators b. Technical users and security personnel c. System operators and clerks d. Administrators and accountants

A

1. List and briefly describe the four components of a database management system.

1. Application Program Interface -- allows programming language interface to write scripts and logic to produce results based on complex logic. 2. End-user query processor -- this provides the SQL statements to query and update the database. 3. Administrative interface -- provides the functionality to create the schema and change the database configuration parameters. 4. Database access and control logic -- this is the actual DB engine which updates the database and retrieves results.

3. List and briefly describe the four types of database server architecture described in the textbook.

1. Single database server architecture —One or more databases are hosted by a single DBMS running on a single server. 2. Replicated database server architecture —Complete database copies are hosted by cooperating DBMSs running on multiple servers. The servers are usually distributed across geographic locations. 3. Partitioned database server architecture —Multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers. 4. Cloud-based database server architecture —This architecture isn't really a separate architecture. Rather, it is a specific implementation of one or more of the other architectures by using the services of a cloud computing provider.

6. ____ are a critical element of relational database design because they are the bases for representing relationships among tables. a. Keys c. Fields b. Attributes d. Tables

A

7. One column of a table in a relational database is called a(n) ____. a. attribute c. tuple b. relation d. element

A

Protocol

A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.​

Microsoft SQL Server is an example of what?

A database management system

Microsoft SQL Server is an example of what?​

A database management system

Network diagram

A diagram that shows how hardware components are interconnected with devices and cabling is called a what?

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.

Client/Server Architecture

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?

False

A network diagram and a location diagram show basically the same information but in a different format.

Hypertext Markup Language

A protocol that defines the structure and content of a web page is called what?

Virtual Private Network (VPN)

A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?

What is a computer that manages shared resources for access across a network called?

A server computer

Three-layer architecture

A software architecture that divides an application into view, business logic, and data is called what?

Web service

A software function or set of functions or services that can be executed via Web protocols is called a what?

False

A three-layer architecture requires at least three computers to be implemented correctly.

What is the difference between HTTP and HTTPS?​

Amazon uses HTTPS for credit card information

Web-based Application

An application that uses a browser for the user interface.

4. Explain how a digital certificate works.

An entity who wants a certificate with its name and public key goes to a certifying authority and buys a certificate. The certifying authority encrypts the data with its own private key and gives the data back to the original entity. When someone asks the entity for its public key, it sends the certificate. The customer receives the certificate and opens it with the certifying authority's public key.

33. Which user is known to the system and is authorized to access all or certain parts of it? a. Authorized user c. Valid user b. Registered user d. Authenticated user

B

False

Application software that usually executes with a browser is often just called an "App".​

Object classes that are created during design to facilitate the final solution, but are not part of the problem domain are sometimes referred to as ______ ______.

Artifacts

19. _______ is the process of allowing or restricting a specific user's access to specific resources.

Authorization

13. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user

B

16. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth

B

23. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based

B

25. A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups. a. single c. replicated b. partitioned d. cloud-based

B

27. An integrity control that verifies the data in one field against the data in other fields is called a ____ control. a. completeness c. value b. field combination d. data validation

B

8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table. a. primary key c. object identifier b. foreign key d. column

B

1. A(n) ____ describes the structure, content, and access controls of a physical data store or database. a. relation c. schema b. DBMS d. attribute

C

10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique. a. columns c. rows b. foreign keys d. values

C

11. An separate relation must be created to store the attributes of a ____ relationship among two other classes. a. one-to-one c. many-to-many b. one-to-many d. not any (not necessary)

C

17. A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

C

19. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form

C

22. A ____ database server architecture stores different parts of a database on different servers. a. single c. partitioned b. replicated d. cloud-based

C

24. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive

C

28. What is a control that checks the value of a field to ensure that it is within the correct range? a. Answer control c. Value limit control b. Completeness control d. High-low control

C

32. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user

C

34. A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. supervisor user c. privileged user b. database administrator d. technical user

C

9. Each class on an class diagram is represented by a(n) ____ in a relational database. a. attribute c. table b. row d. column

C

______ ______ ______ is a query language used to access and update the data in a relational database.

structured query language

CRC stands for what?

Class responsibility collaboration

The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.

Class-Level Attribute

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

Completeness control

True

Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.​

. _______ is a qualitative measure of how closely the classes in a design class diagram are linked together.

Coupling

12. ____ is a consistent relational database state in which every foreign key value also exists as a primary key value. a. First normal form (1NF) c. Function dependency b. Database synchronization d. Referential integrity

D

15. ____ is a one-to-one correspondence between two field values. a. First normal form c. Referential integrity b. Second normal form d. Functional dependency

D

26. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment

D

29. What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? a. Secure control c. Comprehensive control b. Total control d. Completeness control

D

31. Which of the following is NOT a factor that affects the risk of fraud? a. Separation of duties c. Asset reconciliation b. Monitoring d. Authorization of users

D

What is the name of a general control technique used to ensure that entered data is correct?​ ​-Data validation control ​-Data completeness control ​-Data access control -​Data acceptance control

Data Validation control

What is the least cohesive approach in creating use case controllers in a system?

Define a single controller for all use cases.

True

Describing the environment is one of the detailed activities of core process 4: Design system components.​

A primary model used in software design is which of the following

Design class diagram

Software methods are usually identified in which design model

Design class diagram

Which of the following is NOT one of the activities of Core Process 4: Design system components?

Design security and integrity controls

Which of the following is not one of the design activities included in the Design System Components core process?

Design the security controls

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?​ ​-Design the user interface ​-Design the application components ​-Design the software classes -​Describe the environment

Design the software classes

A deployment diagram is most useful for which design activity?​ -​Designing the user interface ​-Designing software classes -​Describing the environment -​Designing application components

Designing application component

A deployment diagram is most useful for which design activity

Designing application components

A knowledge of all the computing devices accessed by clients is required for which design activity?

Designing the user interface

Which is NOT one of the responsibilities of the database administrator?

Determine data confidentiality

Which is NOT an objective of integrity controls?​ -​Ensure that transactions are recorded completely - ​Ensure a stable functioning operating environment - ​Protect the assets of the organization -​Allow only valid business transactions

Ensure a stable functioning operating environment

A toolbar might be considered an example of what?​

Embedded Software

Which is NOT an objective of integrity controls?

Ensure a stable functioning operating environment

What does XML stand for?

Extensible Markup Language

What does XML stand for?​

Extensible markup language

The activity of Describing the Environment consists of what two key elements

External systems and technology architecture

The activity of Describing the Environment consists of what two key elements?​

External systems and technology architecture

A protocol that defines the structure and content of a web page is called _____ _____ _____.

HTML (Hypertext Markup Language)

What is the latest version of HTML?​

HTML5

A _______ contains both global and local schemas with distinct DBMSs?

Heterogeneous distributed database

What does HTML stand for?

Hypertext Markup Language

A protocol that defines the format and content of Web requests and data communication is called _____ _____ _____.

Hypertext Transfer Protocol

What does HTTP stand for?​

Hypertext Transfer Protocol

What can be said about the following relational database table (key is bold): *CourseSectionID, StudentID*, Grade, StudentName

In First Normal Form

False

In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.​

True

In a client/server configuration, it is possible for a single software component to be both client and server.​

Domain Layer

In a three-layer architecture, another name for the business logic layer is what?

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

What term is used to describe a design principle in which an intermediate class is placed between two classes to decouple them but still link them?

Indirection

What do we call the notation that shows all the information required to call or invoke a method?

Method signature

Which of the following is usually NOT included in a first-cut design class diagram? a.Initial value information for attributes b.Attribute types c. Method signatures d.Navigation visibility arrows

Method signatures

System software usually refers to what kind of software?​

Operating systems and web servers

If you are doing detailed design for the use case Create New Order, which class should receive the first input? (Order Transaction, Order, Order Handler, Customer)

Order Handler

A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?

Protection from variations

What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?

Protection from variations

5. _________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.

Referential integrity

2. What danger(s) is/are inherent in using keys invented by external agents as primary keys in a relational database?

Referential integrity depends on primary key uniqueness. By using key values assigned by external entities, an organization risks the possibility that referential integrity may be broken at some time in the future (e.g., duplicate shipment tracking numbers from competing shipping companies

Which user is known to the system and is authorized to access all or certain parts of it?​ ​-Registered user ​-Authorized user - ​Valid user ​-Authenticated user

Registered user

1. A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.

Schema

Limiting user access to the system is considered what type of design activity?

Security and controls design

Which design activity that pervades all other design activities

Security and controls design

Which design activity that pervades all other design activities?​ ​-Environment design ​-Database design -​Interface design -​Security and controls design

Security and controls design

10. _______ database server architecture is poorly suited to applications that must be available on a seven-day, 24-hour basis.

Single

What does SaaS stand for?

Software as a Service

System Software

Software, such as Web server software, and works behind the scenes is called what?

Which of the following can be classified as privileged users A) System programmers, application programmers, and system administrators B) Technical users and security personnel C)System operators and clerks D) Administrators and accountants

System programmers, application programmers, and system administrators

Which of the following is NOT one of the design models used for object-oriented design a. Communication diagram b. System sequence diagram c. CRC cards d. Design class diagram

System sequence diagram

Which of the following is a type of model used in user interface design?​ -​System sequence diagram -​Activity Diagram -​Communication diagram ​-Class diagram

System sequence diagram

True

The Internet can be thought of as the network of networks.​

False

The Web is the highway over which messages and information travel from network to network.​

Interoperability

The ability of a component or system to interact with other components or systems is referred to as what?

External systems and technology architecture.

The activity of Describing the Environment consists of what two key elements?​

Internet Backbone Network

The high-speed, high capacity network that interconnects regions, countries, and continents.

What is the best coupling choice for an input window, domain, and database object in a system?

The input window is coupled to the domain and the domain is coupled to the database.

False

The primary benefit of a network diagram, is to show the network cabling and the network routers.​

Given the following URL, what is the correct description of the portion shown in bold? https://*www.reddit.com*/r/The_Donald/

The server name

Given the following URL, what is the correct description of the portion shown in bold? http://www.barnesandnoble.com/u/books-best selling-books/379003057

The server name

Technology Architecture

The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?

Technology Architecture

The set of computing hardware, network hardware and system software used by an organization is called the what?

Application Architecture

The set of information systems the organization needs to support its operations is often called the what?

Application Architecture

The set of information systems the organization needs to support its operations.

World Wide Web

The set of resources that can be accessed over the Internet is referred to what?

When we use the term the Web what is the correct definition?​

The set of world wide resources that are available over the Internet

The identifier of a Web resource and which defines a protocol, a server or domain name, and a resource identifier is called a(n)

Uniform Resource Locator

___ methods must be included in a design class diagram

Use case specific

Which of the following really is both an analysis (discovery) and a design process (solution).

User interface design

Web-based application is software with the following characteristics:​

Uses a browser and web-server

Which of the following is NOT a valid Web protocol?

VPN

Which of the following is not a valid Web protocol? a. VPN b. HTTPS c. HTML d. XML

VPN (This question is stupid)

What is the correct syntax notation for a message on a communication diagram

[t/f condition] seq-numb: ret-value := msg-name (para-list)

A personal computing device includes all of the following except ______.​

a router

14. A(n) ______ control restricts which persons or programs can add, modify or view information.

access

A(n) ______ control restricts which persons or programs can add, modify or view information.

access

20. A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

Which of the following is NOT considered a design model? ​-Sequence diagram ​-User interface screen layouts ​-Activity diagram ​-Package diagram

activity diagram

High coupling ____ in a system

adds complexity

A major comparison between analsys and design can be stated as:​

analysis is understanding, design is solution

A major comparison between analsys and design can be stated as:​ -analysis is understanding, design is solution ​-analysis is complex, design is simpler ​-analysis includes users, design does not -​analysis builds models, design does not

analysis is understanding, design is solution

The set of information systems the organization needs to support its operations is often called the ______ ______.

application architecture

A well-defined unit of software built to perform some specific tasks is called a(n) _____________.

application component

In a database table a column is the same thing as a(n) ______.

attribute field

18. ____________________ is the process of identifying a user to verify that he or she can have access to the system.

authentication

Which of the following is NOT a factor that affects the risk of fraud?​ ​-Asset reconciliation -​Monitoring ​-Separation of duties ​-Authorization of users

authorization of users

The objective of Implementation is to

build a new system

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called ________.​

client/server architecture

A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a(n) _______ diagram

communication

9. A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

A(n) ____ class acts as a switchboard between the view layer and the domain layer

controller

The _________________ pattern is a based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.

controller

11. When it is necessary to update one database copy with changes made to the other database, it is called _________.

database Synchronization

The person who is in charge of the safety and operation of the DBMS is called the _____ _____.

database administrator

The domain model is always used as an input to which design activity?​ ​-Security and controls design ​-Application Component Design ​-User Interface Design - ​Database design

database design

Referential integrity is normally enforced by the ____.​

database management system

A database that is stored at multiple locations but which does not need to be interconnected or synchronized is called a(n) ______ ______.

decentralized database

The model that best shows how software components are distributed across hardware components is the ________.​

deployment diagram

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​ ​-Design the interfaces ​-Design the application components ​-Describe the environment ​-Design security controls

describe the environment

The main purpose of a(n) ______ ______ diagram is to document and describe the programming classes that will be built for the new system.

design class

A primary model used in software design is which of the following?​

design class diagram

Software methods are usually identified in which design model?​ ​-System sequence diagram ​-Deployment diagram ​-State-machine diagram -​Design class diagram

design class diagram

Which is not a model normally produced as part of application component design

design class diagram

Which is not a model normally produced as part of application component design?​ -​deployment diagram ​-component diagram - ​package diagram ​-design class diagram

design class diagram

A ____ is an institution's name and public key, which is encrypted and certified by a third party

digital certificate

22. The encoding of a message with a private key is called ____________________.

digital signing

The encoding of a message with a private key is called ____________________.

digital signing

In a three-layer architecture, another name for the business logic layer is the ______ ______.

domain layer

A design class diagram is also called a data model.​

false

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.​

false

Symmetric key encryption uses a public key and a private key.​

false

Which of the following is not a synonym of the others? a. row b. Tuple c. record d. field

field

An integrity control that verifies the data in one field against the data in other fields is called a ____ control

field combination

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.​ ​-completeness ​-value ​-data validation ​-field combination

field combination

A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

first

The perfect technology assumption implies that _______.

issues related to technology are ignored

4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.

foreign key

16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

In a distributed database when the data is divided so that separate columns of the same table are at distinct locations that is referred to as _________.

horizontal partitioning

When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.

hyperlink

When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.​

hyperlink

12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

integrity

An attribute or set of attributes that uniquely define the rows in a table is called a(n) ______.

key

A separate relation must be created to store the attributes of a ____ relationship among two other classes.

many-to-many

The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.

navigation visibility

A diagram that shows how hardware components are interconnected with devices and cabling is called a(n) ______ _____

network diagram

A(n) ____ is a field or set of fields used to uniquely identify each row.​

primary key

In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.

perfect memory assumption

2. A(n) _______ is the database component that actually stores the raw bytes of data.

physical data store

A(n) ____ is a field or set of fields used to uniquely identify each row

primary key

In design class notation, the ____ of an attribute is enclosed in curly braces {}.

property

A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.​

protocol

What does SQL stand for?

structured query language

A(n) ____ describes the structure, content, and access controls of a physical data store or database.

schema

17. A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.

security

Limiting user access to the system is considered what type of design activity?​ ​-Describing the environment ​-Security and controls design ​-Application components design -​User interface design

security and control

Communication diagrams indicates the order of the messages with ____.

sequence numbers

A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.

singleton

An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.​

software as a service

21. In ____________________ encryption, the same key encrypts and decrypts the data.

symmetric

Software, such as Web server software, and works behind the scenes is called ______ ______.

system software

3. In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.

table

Each class on an class diagram is represented by a(n) ____ in a relational database.​

table

Data elements in a relational database are organized into ____.

tables

. The set of computing hardware, network hardware and system software used by an organization is called the _________.

technology architecture

The set of computing hardware, network hardware and system software used by an organization is called the _________.​

technology architecture

A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

third

A client/server architecture that divides an application into view, business logic and data layers is called _____ _____ ______.

three-layer architecture

A software architecture that divides an application into view, business logic, and data is called a(n) ________.

three-layer architecture

Amazon.com is a good example of what kind of architecture?​

three-layer architecture

Which of the following really is both an analysis (discovery) and a design process (solution).​ ​-User interface design ​-System interface design -​Environment design -​Database design

user interface design

13. A control that checks the value of a field to ensure that it is within the correct range is a(n) _______ control.

value limit

What is a control that checks the value of a field to ensure that it is within the correct range?​ ​-Answer control ​-High-low control -​Completeness control ​-Value limit control

value limit control

Using digital signatures is primarily a technique to ____.​ ​-verifying who sent a document ​-allow for remote signatures on official documents ​-digitize (scan) a signed document -​electronically send a signature

verify who sent a doc

A class that is responsible for accessing both the Internet and a database has ____ cohesion

very low

In a three-layer architecture, what are the three layers?​

view layer, business logic layer, and data layer

User interface objects in a sequence diagram often are labeled with the stereotype __________?

view or boundary

What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?

visibility

A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______

with the adapter pattern

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​ -​Completeness control ​-Total control ​-Secure control ​-Comprehensive control

​Completeness control

Which of the following is not one of the design activities included in the Design System Components core process?​ ​-Describe the environment -​Design the software methods - ​Design the security controls ​-Design the user interface

​Design the security controls

What are two key elements of describing the environment?​ - Programming language and operating system environment ​-External systems and technology architecture ​-Communication protocols and security methods ​-Hardware configuration and DBMS's

​External systems and technology architecture

What is a control that checks the value of a field to ensure that it is within the correct range?​ ​-Answer control -​High-low control ​-Value limit control -​Completeness control

​Value limit control

Which of the following is NOT considered a design model?

​activity diagram

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​

​describe the environment

Which is not a model normally produced as part of application component design?​

​design class diagram

Build or buy questions are usually addressed during which design activity?​

​design the application components

A deployment diagram is most useful for which design activity?​

​designing application components

A knowledge of all the computing devices accessed by clients is required for which design activity?​

​designing the user interface

Which is NOT an objective of integrity controls?​

​ensure a stable functioning operating environment

Which user is known to the system and is authorized to access all or certain parts of it?​

​registered user

Which of the following is a type of model used in user interface design?​

​system sequence diagram

Three types of users that are considered in the design of a security system are ____.​

​unauthorized user, registered user, and privileged user


Kaugnay na mga set ng pag-aaral

Nervous system medical terminology

View Set

review of concepts summary slides for exam

View Set

Messina Final Exam Review Questions and Answers CP

View Set