311 Exam 2
A(n) ____ is a data flow diagram (DFD) that summarizes all processing activity within the system in a single process symbol. Diagram 0 level of abstraction context diagram Event partition diagram
context diagram
In the traditional approach to system development, the system stores information about ____. data stores attributes objects data entities
data entities
Attribute
describes one piece of information about each instance of the class
A metaphor of human-computer interaction (HCI) in which the user interacts directly with objects on the display screen, is referred to as ____. direct manipulation metaphor desktop metaphor document metaphor dialog metaphor
direct manipulation metaphor
A metaphor of human-computer interaction, in which interaction with the computer involves browsing and entering data on electronic documents, is referred to as a ____ metaphor. direct manipulation desktop document dialog
document
Human-Computer Interaction (HCI) -
field of study focusing on efficiency and effectiveness of user interfaces to computer systems
The study of human interaction with machines in general is called ____. user-centered design human factors engineering usability human-computer interaction
human-computer interaction
Cardinality
is term for number of relationships in entity relationship diagrams: 1 to 1 or 1 to many (synonym to multiplicity)
Multiplicity
is term for the number of associations between classes: 1 to 1 or 1 to many (synonym to cardinality)
Document metaphor
metaphor in which data is visually represented as paper pages or forms
Direct manipulation metaphor
metaphor in which objects on a display are manipulated to look like physical objects (pictures) or graphic symbols that represent them (icons)
Desktop metaphor
metaphor in which the visual display is organized into distinct regions, with a large empty workspace in the middle and a collection of tool icons around the perimeter
Dialog metaphor
metaphor in which user and computer accomplish a task by engaging in a conversation or dialog via text, voice, or tools such as labeled buttons
Domain Class
Classes that describe objects in the problem domain
Integrity Controls
Controls that maintain integrity of inputs, outputs and data and programs
Security Controls
Controls that protect the assets from threats, internal and external
A(n) ____ represents the system response to one event. DFD fragment event-partitioned system model diagram 0 context diagram
DFD fragment
The primary principles of UI design of a desktop system include principles which also generally apply to other types of devices. Which of the following principles is NOT an important guideline when considering the layout and format of a particular screen. Each screen should have a primary purpose. Grammar and spelling should be correct. Controls on a screen should be grouped by related function Dark colors should be avoided
Dark colors should be avoided
What is the name of a general control technique used to ensure that entered data is correct? Data validation control Data acceptance control Data completeness control Data access control
Data validation control
A primary model used in software design is which of the following? Component model Design class diagram Deployment model System sequence diagram
Design class diagram
The term diagram 0 is another name for a(n) ____. lowest level diagram event-partitioned system model context diagram DFD fragment
event-partitioned system model
As association class is frequently required for what kind of relationship? many to many zero to one zero to many one to many
many to many
Iterative development
- analyze, design, implement, evaluate, repeat
Domain Model Class Diagram
A class diagram that only includes classes from the problem domain, not software classes so no methods
Generalization/Specialization
A hierarchical relationship where subordinate classes are special types of the superior classes. Often called an Inheritance Hierarchy
Class
A type of classification used to describe a collection of objects
Human-Interface Objects (HIOs)
Affordance - the appearance of the object suggests its function
User Experience (UX)
All aspects of a person's interaction with a software application, including actions, responses, perceptions and feelings.
Designers should be sure to include cancel buttons on all dialog boxes which allow the user to back up. This is an example of what? Easy reversal of actions Reduce short term memory load Good error handling Dialog that yields closure
Easy reversal of actions
The object-oriented approach to systems development views a system as a collection of processes, some performed by people and some performed by the computer. True False
False
System boundaries are not shown clearly on context diagrams. True False
False
The term "diagram 0" is used synonymously with context diagram. True False
False
_____ is based on the idea that people classify things in terms of similarities and differences. Aggregation Generalization/Specialization Composition Multiplicity
Generalization/Specialization
Which of the follow is the best technique to determine how many menu items are needed and how to structure the menus and sub menus. Group use cases by data requirements Group business functions by department Group use cases by dependency Group use cases by actor
Group use cases by actor
Noun Technique
Identify all of the nouns that come up when the system is described and determine if each is a domain class, an attribute, or not something we need to remember
Identifier or key
One attribute uniquely identifies an instance of the class. Required for data entities, optional for domain classes. Customer ID identifies a customer
Which user is known to the system and is authorized to access all or certain parts of it? Valid user Authenticated user Authorized user Registered user
Registered user
User Interface (UI)
The set of inputs and outputs that the user interacts with to invoke the functions of an application.
Traditional computer processes are much like procedural computer programs in that they contain instructions that execute in sequence. True False
True
Context diagrams do not usually show data stores. True False
True
Compound attribute
Two or more attributes combined into one structure to simplify the model. (E.g., address rather than including number, street, city, state, zip separately). Sometimes an identifier or key is a compound attribute
Brainstorming Technique
Use a checklist of all of the usual types of things typically found and brainstorm to identify domain classes of each type
Abstract class—
a class that allow subclasses to inherit characteristics but never gets instantiated. In Italics (Sale)
Concrete class—
a class that can have instances
Association
a naturally occurring relationship between classes (UML term)
An example of an attribute of an object might be _______. items on a purchase order a calendar an inventory item a social security number
a social security number
Association class—
an association that is treated as a class in a many to many association because it has attributes that need to be remembered (such as grade
A class that represents a many-to-many association between two other classes is called a(n) ____ class. superclass problem domain aggregated association
association
Descriptive properties of things in the problem domain are often documented as what? relationships data entities objects attributes
attributes
--/< The above cardinality constraint on the Order data entity indicates that there can be _____ . zero or many orders cannot be determined without the other side of the relationship one or many orders many orders
one or many orders
Inheritance
the concept that subclasses classes inherit characteristics of the more general superclass
Problem domain—
the specific area (or domain) of the users' business need that is within the scope of the new system.
Subclass
the subordinate or more specialized class in a generalization/specialization hierarchy
Superclass
the superior or more general class in a generalization/specialization hierarchy
An application component can be thought of as a(n) __________. purchased package middleware software subsystem unit of software
unit of software
A synonym for cardinality (used with UML class diagrams) is _______. inheritance relationship multiplicity n-ary relationship
multiplicity
Which of the following is NOT one of the considerations of designing input forms for desktop systems? Validate all input data at the source Use list boxes and check boxes when possible Align the textboxes vertically Automatically put the cursor in the first textbox
Align the textboxes vertically
Which of the following is not a recommended technique for good error processing? Place the cursor on the error field. Clear the field that is in error. Provide a solution to the error. Indicate which input has the error
Clear the field that is in error.
Which of the following data flow diagram (DFD) symbols usually corresponds to a data entity on an entity-relationship diagram (ERD)? Data flow Data store Process Data link
Data store
The domain model is always used as an input to which design activity? Database design User Interface Design Security and controls design Application Component Design
Database design
The design activity key question, "How will this system interact with other systems..." is part of which design activity? Describe the environment Design the application components Design security controls Design the interfaces
Describe the environment
Which is NOT an objective of integrity controls? Ensure that transactions are recorded completely Allow only valid business transactions Ensure a stable functioning operating environment Protect the assets of the organization
Ensure a stable functioning operating environment
According to an Agile iterative development process in which iteration would design activities normally start? Sometime after the first iteration First iteration Pre-project activities Second iteration
First iteration
According to an Agile iterative development process in which iteration would implementation activities normally start? Second iteration Sometime after the first iteration First iteration Pre-project activities
First iteration
Which of the following is not a principle of Closure? Have clear navigation path. Definite end point of the steps of a procedure Protecting and saving user's input fields. Allow the user to undo their actions.
Have clear navigation path.
"When subsequent processing is delayed by more than a second or two, users may repeatedly press controls or re-enter information, resulting in processing errors and user frustration" is an example of what? Lack of error handling Lack of closure Lack of consistency Lack of feedback
Lack of feedback
Which are the two additional important issues of Web based UI design over local desktop UI design? Browser compatibility and advertising space Load time and browser compatibility Screen size and load time Advertising space and screen size
Load time and browser compatibility
Limiting user access to the system is considered what type of design activity? Application components design Describing the environment User interface design Security and controls design
Security and controls design
Which design activity that pervades all other design activities? Security and controls design Environment design Interface design Database design
Security and controls design
When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions? Who needs information about this item? Should it be researched further? Is it a tangible item? Is it an abstract item?
Should it be researched further?
____ is used to describe the relationship between two things of the same type, such as one person being married to another person. Binary association Unary association N-ary association Cardinality
Unary association
A key principle of human-computer interaction (HCI), that states that the appearance of any control should suggest its functionality, is called ____. informative feedback consistency visibility affordance
affordance
In UML the constraint denoted by "0..*" indicates what? only a many maximum relationship never only one allowed an optional relationship a mandatory relationship
an optional relationship
One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______. check list technique domain analysis technique brainstorming technique noun technique
brainstorming technique
A measure of the number of links between one object and another object in a relationship is called the _______. associations cardinality aggregations linkups
cardinality
The crows feet notation on an ERD is a type of _______ constraint. cardinality relationship multiplicity many-to-many
cardinality
The number of associations that occur among specific things in an entity relationship diagram is called ____. an attribution a relationship cardinality a binary relationship
cardinality
Inheritance describes a condition between classes where _______ . classes share some attributes some classes are always abstract subclasses inherit the names from superclasses classes are part of other classes
classes share some attributes
Which is not a model normally produced as part of application component design? design class diagram deployment diagram package diagram component diagram
design class diagram
A data flow diagram (DFD) that models system requirements using a single process for each event in a system or subsystem is called a(n) ____. DFD fragment event-partitioned system model diagram 1.0 context diagram
event-partitioned system model
One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called the _______. check list technique brainstorming technique domain analysis technique noun technique
noun technique
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key. private public symmetric asymmetric
private
The specific area of the user's business need that is within the scope of the new system is called the _______. problem domain functional requirements use cases user specifications
problem domain
When a user fills out an online form, but makes an error and the data is not immediately accepted (until the input error is corrected), if the system clears all the fields and requires the user to start over, this is an example of violating the principle of ______. always allowing a way out making actions reversible clear error messages and processing protecting the user's work
protecting the user's work
One good way to prevent errors on input forms is to _______. include active discovery provide shortcut keys write clear error messages provide "undo" capability
provide "undo" capability
A(n) _______ is a naturally occurring association among specific things. composition cardinality relationship attribute
relationship
The domain model class diagram is used to _______ . show the relationships among the data entities show the things involved in the user's work that are important show the data entities for the new system show the software classes in the problem domain layer of the system
show the things involved in the user's work that are important
Three types of users that are considered in the design of a security system are ____. unauthorized user, registered user, and privileged user technical user, authorized user, and privileged user manager user, technical user, and clerical user supervisor user, administration user, and operational user
unauthorized user, registered user, and privileged user