Chapter 10, Chapter 6+7+9, System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

1. List and briefly describe the four components of a database management system.

1. Application Program Interface -- allows programming language interface to write scripts and logic to produce results based on complex logic. 2. End-user query processor -- this provides the SQL statements to query and update the database. 3. Administrative interface -- provides the functionality to create the schema and change the database configuration parameters. 4. Database access and control logic -- this is the actual DB engine which updates the database and retrieves results.

1. List and briefly describe the three major activities that occur during the support phase.

1. Maintaining the system - Fixing errors and problems 2. Enhancing the system - Adding new capabilities to the existing system 3. Supporting the users - Providing technical help to the users, often with a help desk.

3. List the three constructs that are used for structured programming.

1. Sequence 2. Decision 3. Iteration

3. List and briefly describe the four types of database server architecture described in the textbook.

1. Single database server architecture —One or more databases are hosted by a single DBMS running on a single server. 2. Replicated database server architecture —Complete database copies are hosted by cooperating DBMSs running on multiple servers. The servers are usually distributed across geographic locations. 3. Partitioned database server architecture —Multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers. 4. Cloud-based database server architecture —This architecture isn't really a separate architecture. Rather, it is a specific implementation of one or more of the other architectures by using the services of a cloud computing provider.

29. In Agile modeling what are the two important reasons for building models? a. To understand what you are building and to communicate the solution b. To document a solution and to instruct other developers c. To communicate with the user and to obtain feedback d. To write good code and to design good databases

A

30. What is the name of a general control technique used to ensure that entered data is correct? a. Data validation control c. Data acceptance control b. Data access control d. Data completeness control

A

35. Which of the following can be classified as privileged users? a. System programmers, application programmers, and system administrators b. Technical users and security personnel c. System operators and clerks d. Administrators and accountants

A

38. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document

A

4. An approach to the SDLC where the phases overlap is often referred to as the _______ approach. a. modified waterfall c. modified predictive b. waterfall d. spiral

A

5. A(n) ____ is a field or set of fields used to uniquely identify each row. a. primary key c. object identifier b. foreign key d. attribute

A

5. The term ____ refers to an approach that completes parts of a system in one or more iterations and puts them into operation for users. a. incremental development c. bottom-up development b. adaptive development d. predictive development

A

6. ____ are a critical element of relational database design because they are the bases for representing relationships among tables. a. Keys c. Fields b. Attributes d. Tables

A

7. One column of a table in a relational database is called a(n) ____. a. attribute c. tuple b. relation d. element

A

7. Which of the following is NOT one of the major activities of the support phase? a. Training the users c. Enhancing the system b. Maintaining the system d. Supporting the users

A

Protocol

A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.​

Three layer architecture

A client/server architecture that divides an application into view, business logic and data layers is called what?

Server

A computer that manages shared resources and allows users to access those resources over a network is called a what?

Microsoft SQL Server is an example of what?

A database management system

Microsoft SQL Server is an example of what?​

A database management system

complex data type

A field in a relational table called "ADDRESS" would be an example of what?​

Client/Server Architecture

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?

Hypertext Markup Language

A protocol that defines the structure and content of a web page is called what?

First

A relational database table is in _______ normal form if it has NO repeating fields or groups of fields, and hence all rows have the same columns?

Three-layer architecture

A software architecture that divides an application into view, business logic, and data is called what?

False

A three-layer architecture requires at least three computers to be implemented correctly.

primary key

A(n) ____ is a field or set of fields used to UNIQUELY IDENTIFY EACH ROW?

schema

A(n) ________ describes the STRUCTURE, CONTENT, and ACCESS CONTROLS of a physical data store or database?

foreign key

A(n) _________ is a field or set of fields stored in one table that ALSO EXISTS as a primary key in another table?

4. Explain how a digital certificate works.

An entity who wants a certificate with its name and public key goes to a certifying authority and buys a certificate. The certifying authority encrypts the data with its own private key and gives the data back to the original entity. When someone asks the entity for its public key, it sends the certificate. The customer receives the certificate and opens it with the certifying authority's public key.

False

Application software that usually executes with a browser is often just called an "App".​

Object classes that are created during design to facilitate the final solution, but are not part of the problem domain are sometimes referred to as ______ ______.

Artifacts

19. _______ is the process of allowing or restricting a specific user's access to specific resources.

Authorization

11. A(n) "_______" is a guideline to help an analyst complete a specific task and often includes step-by-step instructions to do something such as how to create a model. a. tool c. methodology b. technique d. SDLC

B

13. A hierarchical program structure consisting of a boss or control module which calls submodules is called what? a. traditional program structure c. ordered program structure b. top-down programming d. bottom-up programming

B

25. A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups. a. single c. replicated b. partitioned d. cloud-based

B

27. An integrity control that verifies the data in one field against the data in other fields is called a ____ control. a. completeness c. value b. field combination d. data validation

B

3. In a relational database, a row can be referred to as a(n) ____. a. field c. attribute b. tuple d. relation

B

33. Which user is known to the system and is authorized to access all or certain parts of it? a. Authorized user c. Valid user b. Registered user d. Authenticated user

B

36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with a(n) ____ key. a. asymmetric c. public b. private d. symmetric

B

37. A ____ is an institution's name and public key, which is encrypted and certified by a third party. a. private key c. certifying authority b. digital certificate d. digital key

B

6. The term "____" means that work activities are done once, then again, and yet again. a. agile modeling c. waterfall approach b. iteration d. incremental development

B

8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table. a. primary key c. object identifier b. foreign key d. column

B

1. A(n) ____ describes the structure, content, and access controls of a physical data store or database. a. relation c. schema b. DBMS d. attribute

C

21. A(n) _______ is used to show the interacting messages between objects that collaborate. a. activity diagram c. sequence diagram b. class diagram d. data flow diagram

C

22. A ____ database server architecture stores different parts of a database on different servers. a. single c. partitioned b. replicated d. cloud-based

C

24. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive

C

27. An example of a project phase in a predictive project is ____. a. gathering information about the user's needs b. performing a project cost/benefit analysis c. planning the project d. drawing the system interface

C

28. What is a control that checks the value of a field to ensure that it is within the correct range? a. Answer control c. Value limit control b. Completeness control d. High-low control

C

32. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user

C

34. A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. supervisor user c. privileged user b. database administrator d. technical user

C

4. Data elements in a relational database are organized into ____. a. attributes c. tables b. objects d. tuples

C

9. A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques. a. predictive approach b. object-oriented analysis c. system development methodology d. systems development life cycle

C

9. Each class on an class diagram is represented by a(n) ____ in a relational database. a. attribute c. table b. row d. column

C

CRC stands for what?

Class responsibility collaboration

The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.

Class-Level Attribute

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

Completeness control

True

Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.​

. _______ is a qualitative measure of how closely the classes in a design class diagram are linked together.

Coupling

10. The term "_______" is used to separate out some aspect of the real world that is important to understand when we build a model. a. brainstorm c. analysis b. synthesis d. abstraction

D

12. ____ is a consistent relational database state in which every foreign key value also exists as a primary key value. a. First normal form (1NF) c. Function dependency b. Database synchronization d. Referential integrity

D

15. An important way to measure the quality of a module in structured programming is by assessing its _____. a. structured design c. internal constructs b. top-down approach d. cohesion and coupling

D

17. A(n) ____ program is one that has one beginning and one ending. a. iterative c. object-oriented b. incremental d. structured

D

23. ____ is a philosophy and set of guidelines for developing software in an unknown, rapidly changing environment. a. Object-oriented development c. Pair programming b. Refactoring d. Agile development

D

26. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment

D

29. What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? a. Secure control c. Comprehensive control b. Total control d. Completeness control

D

3. An adaptive approach to a development project is best used when _______. a. the system has low technical risk b. the requirements are simple and the system is small c. the requirements are well understood d. the requirements are uncertain

D

31. Which of the following is NOT a factor that affects the risk of fraud? a. Separation of duties c. Asset reconciliation b. Monitoring d. Authorization of users

D

tables

DATA ELEMENTS in a relational database are organized into ________?

Waterfall Development

DESIGN and IMPLEMENT database FIRST?

What is the name of a general control technique used to ensure that entered data is correct?​ ​-Data validation control ​-Data completeness control ​-Data access control -​Data acceptance control

Data Validation control

What is the least cohesive approach in creating use case controllers in a system?

Define a single controller for all use cases.

True

Describing the environment is one of the detailed activities of core process 4: Design system components.​

A primary model used in software design is which of the following

Design class diagram

Software methods are usually identified in which design model

Design class diagram

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?​ ​-Design the user interface ​-Design the application components ​-Design the software classes -​Describe the environment

Design the software classes

List at least 5 principles of Agile Modeling.

Develop software as your primary goal Enable the next effort as your secondary goal. Minimize your modeling activity—few and simple. Embrace change, and change incrementally. Model with a purpose. Build multiple models. Build high-quality models and get feedback rapidly. Focus on content rather than representation. Learn from each other with open communication.

Which analysis model serves as an input model to a design class diagram?

Domain model class diagram

table

Each class on an class diagram is represented by a(n) __________ in a relational database?

A toolbar might be considered an example of what?​

Embedded Software

Which is NOT an objective of integrity controls?

Ensure a stable functioning operating environment

Which is NOT an objective of integrity controls?​ -​Ensure that transactions are recorded completely - ​Ensure a stable functioning operating environment - ​Protect the assets of the organization -​Allow only valid business transactions

Ensure a stable functioning operating environment

What does XML stand for?

Extensible Markup Language

What does XML stand for?​

Extensible markup language

The activity of Describing the Environment consists of what two key elements

External systems and technology architecture

The activity of Describing the Environment consists of what two key elements?​

External systems and technology architecture

A design class diagram is also called a data model

False

A lifeline indicates when a method is executing for a destination object

False

A local business office with a small database which is only used by two or three users would most probably implement a desktop DBMS

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment

False

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.​

False

Including a total amount field as the sum of other fields in a table is a violation of second normal form.​

False

It is usually a bad idea to try to include user-interface classes to a CRC design

False

On a sequence diagram the messages are numbered to indicate the order of firing

False

One type of design class stereotype is called a "concrete class" because it can be instantiated

False

Problem domain modeling and database normalization are incompatible techniques for relational database design.​

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table.​

False

The first-cut DCD includes method signatures

False

The initial version of a communication diagram contains view layer and business layer

False

The objective of object-oriented analysis is to identify the objects that must work together to carry out each use case

False

The perfect memory assumption means that there is always adequate memory to execute the program

False

There are two preferred methods to accessing the database. One is to have newly instantiated object call the data access object. The other is to let the controller access the data access object

False

To ensure that the database is designed correctly, an important member of the project team is the data administrator

False

Which is a valid sequence of modeling steps for designing a use case?

First cut DCD, Communication diagram, Final DCD, Package Diagram

False

For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.​

___________ is where the value in one field determines the value in another field in the same record.​

Functional dependency

Which of the following is NOT part of a multilayer object-oriented design (OOD)?

Functional module

Technology Architecture

HARDWARE and NETWORKS?

A protocol that defines the structure and content of a web page is called _____ _____ _____.

HTML (Hypertext Markup Language)

What is the latest version of HTML?​

HTML5

A _______ contains both global and local schemas with distinct DBMSs?

Heterogeneous distributed database

What does HTML stand for?

Hypertext Markup Language

A protocol that defines the format and content of Web requests and data communication is called _____ _____ _____.

Hypertext Transfer Protocol

What does HTTP stand for?​

Hypertext Transfer Protocol

What can be said about the following relational database table (key is bold): *CourseSectionID, StudentID*, Grade, StudentName

In First Normal Form

the associated tables

In a MANY-TO-MANY association, the PRIMARY KEY of the created table consists of?

False

In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.​

True

In a client/server configuration, it is possible for a single software component to be both client and server.​

Domain Layer

In a three-layer architecture, another name for the business logic layer is what?

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

What term is used to describe a design principle in which an intermediate class is placed between two classes to decouple them but still link them?

Indirection

What do we call the notation that shows all the information required to call or invoke a method?

Method signature

Which of the following is usually NOT included in a first-cut design class diagram? a.Initial value information for attributes b.Attribute types c. Method signatures d.Navigation visibility arrows

Method signatures

20. _____ consists of writing statements in a programming language to define what each type of object does. a. OOP c. OOD b. OOA d. OOS

OOP

Attribute

One COLUMN of a table in a relational database is called a(n) ______________?

System software usually refers to what kind of software?​

Operating systems and web servers

If you are doing detailed design for the use case Create New Order, which class should receive the first input? (Order Transaction, Order, Order Handler, Customer)

Order Handler

When describing the interfaces to external systems, which is not one of the important issues

Programming languages

When describing the interfaces to external systems, which is not one of the important issues?​ ​-Network addresses ​-Programming languages - ​Error handling ​-Message formats

Programming languages

A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?

Protection from variations

What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?

Protection from variations

5. _________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.

Referential integrity

2. What danger(s) is/are inherent in using keys invented by external agents as primary keys in a relational database?

Referential integrity depends on primary key uniqueness. By using key values assigned by external entities, an organization risks the possibility that referential integrity may be broken at some time in the future (e.g., duplicate shipment tracking numbers from competing shipping companies

Database Management System

Referential integrity is normally ENFORCED by the __________________?

Which user is known to the system and is authorized to access all or certain parts of it?​ ​-Registered user ​-Authorized user - ​Valid user ​-Authenticated user

Registered user

1. A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.

Schema

Limiting user access to the system is considered what type of design activity?

Security and controls design

Which design activity that pervades all other design activities

Security and controls design

Which design activity that pervades all other design activities?​ ​-Environment design ​-Database design -​Interface design -​Security and controls design

Security and controls design

10. _______ database server architecture is poorly suited to applications that must be available on a seven-day, 24-hour basis.

Single

What does SaaS stand for?

Software as a Service

Which of the following is included in the top compartment of a design class?

Stereotype name

Which of the following can be classified as privileged users A) System programmers, application programmers, and system administrators B) Technical users and security personnel C)System operators and clerks D) Administrators and accountants

System programmers, application programmers, and system administrators

Which of the following is a type of model used in user interface design?​ -​System sequence diagram -​Activity Diagram -​Communication diagram ​-Class diagram

System sequence diagram

8. SADT stands for what?

Systems analysis and Design technique

Each class on an class diagram is represented by a(n) ____ in a relational database.

Table

True

The Internet can be thought of as the network of networks.​

False

The Web is the highway over which messages and information travel from network to network.​

Interoperability

The ability of a component or system to interact with other components or systems is referred to as what?

External systems and technology architecture.

The activity of Describing the Environment consists of what two key elements?​

Internet Backbone Network

The high-speed, high capacity network that interconnects regions, countries, and continents.

What is the best coupling choice for an input window, domain, and database object in a system?

The input window is coupled to the domain and the domain is coupled to the database.

False

The primary benefit of a network diagram, is to show the network cabling and the network routers.​

Application Architecture

The set of information systems the organization needs to support its operations is often called the what?

Application Architecture

The set of information systems the organization needs to support its operations.

World Wide Web

The set of resources that can be accessed over the Internet is referred to what?

When we use the term the Web what is the correct definition?​

The set of world wide resources that are available over the Internet

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table

True

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.​

True

A network diagram is a useful model to show three/layer architecture

True

A relational database management system stores data in tables

True

An objective of security controls is to maintain a stable operating environment for users

True

Another name for the data model is the domain model

True

Both a communication diagram and a sequence diagram have the same purpose and provide basically the same information

True

Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.​

True

Designing a single user interface is now the exception, not the norm.

True

It is better to have the data access object create a new object when multiple objects may be created.

True

Navigation visibility may be bidirectional

True

On a sequence diagram, view layer objects send messages to the controller

True

Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.​

True

Relationships between tables is usually indicated through the use of a foreign key.​

True

The Internet can be thought of as the network of networks

True

Which of the following really is both an analysis (discovery) and a design process (solution).

User interface design

Web-based application is software with the following characteristics:​

Uses a browser and web-server

Which of the following is NOT a valid Web protocol?

VPN

Which of the following is not a valid Web protocol? a. VPN b. HTTPS c. HTML d. XML

VPN (This question is stupid)

A function or service that is called from a Web application to another Web application is called a(n) ________.

Web service

Hypertext Transfer Protocol

What does HTTP stand for?​

The set of world wide resources that are available over the Internet.

When you use the term "Web", what is the correct definition?​

What is the correct syntax notation for a message on a communication diagram

[t/f condition] seq-numb: ret-value := msg-name (para-list)

Referential Integrity Constraint

a CONSTRAINT, stored in the schema, that the DBMS uses to AUTOMATICALLY ENFORCE referential integrity?

Relational Database Management System (RDBMS)

a DBMS that ORGANIZES data in tables?

Normalization

a formal technique for EVALUATING and IMPROVING the quality of a relational database schema?

Shared or Read Lock

a lock where MULTIPLE TRANSACTIONS (users) may read the data?

Exclusive or Write Lock

a lock where only ONE TRANSACTION (user) may access the locked portion of the database?

A personal computing device includes all of the following except ______.​

a router

Database Management Software (DBMS)

a system software component that MANAGES and CONTROLS one or more databases?

Transaction Logging

a technique to RECORD ALL UPDATES including change, date, time, user?

14. A(n) ______ control restricts which persons or programs can add, modify or view information.

access

A(n) ______ control restricts which persons or programs can add, modify or view information.

access

20. A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

Which of the following is NOT considered a design model? ​-Sequence diagram ​-User interface screen layouts ​-Activity diagram ​-Package diagram

activity diagram

6. Using a(n) ____________________ approach to the SDLC assumes requirements and needs for the planned system are uncertain

adaptive

High coupling ____ in a system

adds complexity

14. What is the term used to describe a guiding philosophy in which only the models that are necessary, with a valid need and the right level of detail, are created.

agile modeling

Candidate Key

an attribute or set of attributes that could serve as the PRIMARY KEY?

Key

an attribute or set of attributes, the values of which occur only ONCE in all the rows of the table?

Database (DB)

an integrated COLLECTION OF STORED DATA that is centrally managed and controlled?

A major comparison between analsys and design can be stated as:​

analysis is understanding, design is solution

A major comparison between analsys and design can be stated as:​ -analysis is understanding, design is solution ​-analysis is complex, design is simpler ​-analysis includes users, design does not -​analysis builds models, design does not

analysis is understanding, design is solution

The set of information systems the organization needs to support its operations is often called the ______ ______.

application architecture

A well-defined unit of software built to perform some specific tasks is called a(n) _____________.

application component

In a database table a column is the same thing as a(n) ______.

attribute field

18. ____________________ is the process of identifying a user to verify that he or she can have access to the system.

authentication

Which of the following is NOT a factor that affects the risk of fraud?​ ​-Asset reconciliation -​Monitoring ​-Separation of duties ​-Authorization of users

authorization of users

The objective of Implementation is to

build a new system

The objective of Implementation is to​ ​-complete the specifications - ​integrate the application components - ​build a new system - ​install a new system

build a new system

In a three-layer architecture, the application server would be part of which layer?

business logic layer

13. What is the term used to describe an adaptive type of project that is both chaotic and controlled or ordered?

chaordic

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called ________.​

client/server architecture

Complex Data Types

combinations of or extensions to primitive data types supported by PROGRAMMING LANGUAGES, OS and DBMS?

A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a(n) _______ diagram

communication

9. A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

A(n) ____ class acts as a switchboard between the view layer and the domain layer

controller

The _________________ pattern is a based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.

controller

10. The primary structured analysis model that shows inputs, processes, storage, and outputs is called the ______.

data flow diagram

Primitive Data Types

data types supported directly by the HARDWARE and PROGRAMMING LANGUAGES?

11. When it is necessary to update one database copy with changes made to the other database, it is called _________.

database Synchronization

The person who is in charge of the safety and operation of the DBMS is called the _____ _____.

database administrator

The domain model is always used as an input to which design activity?​ ​-Security and controls design ​-Application Component Design ​-User Interface Design - ​Database design

database design

Referential integrity is normally enforced by the ____.​

database management system

A database that is stored at multiple locations but which does not need to be interconnected or synchronized is called a(n) ______ ______.

decentralized database

The model that best shows how software components are distributed across hardware components is the ________.​

deployment diagram

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​ ​-Design the interfaces ​-Design the application components ​-Describe the environment ​-Design security controls

describe the environment

The main purpose of a(n) ______ ______ diagram is to document and describe the programming classes that will be built for the new system.

design class

A primary model used in software design is which of the following?​

design class diagram

Software methods are usually identified in which design model?​ ​-System sequence diagram ​-Deployment diagram ​-State-machine diagram -​Design class diagram

design class diagram

A ____ is an institution's name and public key, which is encrypted and certified by a third party

digital certificate

22. The encoding of a message with a private key is called ____________________.

digital signing

The encoding of a message with a private key is called ____________________.

digital signing

In a three-layer architecture, another name for the business logic layer is the ______ ______.

domain layer

A design class diagram is also called a data model.​

false

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.​

false

Symmetric key encryption uses a public key and a private key.​

false

Which of the following is not a synonym of the others? a. row b. Tuple c. record d. field

field

An integrity control that verifies the data in one field against the data in other fields is called a ____ control

field combination

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.​ ​-completeness ​-value ​-data validation ​-field combination

field combination

A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

first

According to an Agile iterative development process in which iteration would implementation activities normally start?​ -​Second iteration ​-Pre-project activities ​-First iteration ​-Sometime after the first iteration

first

4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.

foreign key

16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

In a distributed database when the data is divided so that separate columns of the same table are at distinct locations that is referred to as _________.

horizontal partitioning

When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.

hyperlink

When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.​

hyperlink

15. An SDLC approach that completes portions of the system in small increments across iterations and integrates it into the whole is called _____.

incremental approach

16. A set of tools that work together to provide a comprehensive development and programming environment is called a(n) _____.

incremental development evironment

12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

integrity

The perfect technology assumption implies that _______.

issues related to technology are ignored

An attribute or set of attributes that uniquely define the rows in a table is called a(n) ______.

key

A separate relation must be created to store the attributes of a ____ relationship among two other classes.

many-to-many

The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.

navigation visibility

A diagram that shows how hardware components are interconnected with devices and cabling is called a(n) ______ _____

network diagram

6. Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.

normalization

In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.

perfect memory assumption

Database Administrator (DBA)

person in charge of SAFETY and the OPERATION of the database?

Data Administrator (DA)

person in charge of STRUCTURE and INTEGRITY of the data?

1. The term "____________________" refers to related system development activities, which are grouped into categories of project planning, analysis, design, implementation, and support.

phase

2. A(n) _______ is the database component that actually stores the raw bytes of data.

physical data store

A(n) ____ is a field or set of fields used to uniquely identify each row

primary key

A(n) ____ is a field or set of fields used to uniquely identify each row.​

primary key

8. A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.

primitive

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key

private

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.​ ​-asymmetric - ​private - ​public -​symmetric

private

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ -​database administrator -​technical user -​supervisor user - ​privileged user

privileged user

In design class notation, the ____ of an attribute is enclosed in curly braces {}.

property

A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.​

protocol

A(n) ____ describes the structure, content, and access controls of a physical data store or database.

schema

Communication diagrams indicates the order of the messages with ____.

sequence numbers

A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.

singleton

An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.​

software as a service

3. One of the earliest adaptive SDLC approaches that cycles over and over again through development activities is called the _______.

spiral model

7. The "_______" refers to software development using structured analysis and structured design models.

structured approach

9. Name the programming approach where each module has one start point and one end point and uses only sequence, decision, and iteration.

structured programming

What does SQL stand for?

structured query language

______ ______ ______ is a query language used to access and update the data in a relational database.

structured query language

21. In ____________________ encryption, the same key encrypts and decrypts the data.

symmetric

Software, such as Web server software, and works behind the scenes is called ______ ______.

system software

3. In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.

table

Each class on an class diagram is represented by a(n) ____ in a relational database.​

table

Data elements in a relational database are organized into ____.

tables

Database Lock

technique to apply EXCLUSIVE CONTROL to a portion of the database to one user at a time?

. The set of computing hardware, network hardware and system software used by an organization is called the _________.

technology architecture

The set of computing hardware, network hardware and system software used by an organization is called the _________.​

technology architecture

Structured Query Language (SQL)

the LANGUAGE to ACCESS and UPDATE data in a relational DBMS?

Attribute Value

the VALUE held in a SINGLE TABLE CELL?

A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

third

A client/server architecture that divides an application into view, business logic and data layers is called _____ _____ ______.

three-layer architecture

A software architecture that divides an application into view, business logic, and data is called a(n) ________.

three-layer architecture

Amazon.com is a good example of what kind of architecture?​

three-layer architecture

17. In the structured approach the concept of dividing a complex program into a hierarchy of program modules is called _____.

top down programming

When there is a piece of work or an action that includes several steps and updates to the data and which all must complete to be valid, that piece or work is called a(n) _______.

transaction

An objective of security controls is to maintain a stable operating environment for users.

true

After completing a use-case design using CRC cards, the next step is to _______.

update the design class diagram

Which of the following really is both an analysis (discovery) and a design process (solution).​ ​-User interface design ​-System interface design -​Environment design -​Database design

user interface design

13. A control that checks the value of a field to ensure that it is within the correct range is a(n) _______ control.

value limit

What is a control that checks the value of a field to ensure that it is within the correct range?​ ​-Answer control ​-High-low control -​Completeness control ​-Value limit control

value limit control

Using digital signatures is primarily a technique to ____.​ ​-verifying who sent a document ​-allow for remote signatures on official documents ​-digitize (scan) a signed document -​electronically send a signature

verify who sent a doc

A class that is responsible for accessing both the Internet and a database has ____ cohesion

very low

In a three-layer architecture, what are the three layers?​

view layer, business logic layer, and data layer

User interface objects in a sequence diagram often are labeled with the stereotype __________?

view or boundary

What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?

visibility

4. A development approach in which the complete system structure is built but with minimum functionality is called the _______.

walking skeleton

2. A method of executing the systems development life cycle (SDLC) which assumes rigid planning and final decision making at each step, is called the ____________________ approach.

waterfall

A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______

with the adapter pattern

many-to-many

​A separate relation must be created to store the attributes of a __________________ relationship among TWO other classes?

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​ -​Completeness control ​-Total control ​-Secure control ​-Comprehensive control

​Completeness control

Which of the following is not one of the design activities included in the Design System Components core process?​ ​-Describe the environment -​Design the software methods - ​Design the security controls ​-Design the user interface

​Design the security controls

What are two key elements of describing the environment?​ - Programming language and operating system environment ​-External systems and technology architecture ​-Communication protocols and security methods ​-Hardware configuration and DBMS's

​External systems and technology architecture

What is a control that checks the value of a field to ensure that it is within the correct range?​ ​-Answer control -​High-low control ​-Value limit control -​Completeness control

​Value limit control

Which of the following is NOT considered a design model?

​activity diagram

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​

​describe the environment

Which is not a model normally produced as part of application component design?​

​design class diagram

Build or buy questions are usually addressed during which design activity?​

​design the application components

A deployment diagram is most useful for which design activity?​

​designing application components

A knowledge of all the computing devices accessed by clients is required for which design activity?​

​designing the user interface

Which is NOT an objective of integrity controls?​

​ensure a stable functioning operating environment

Which user is known to the system and is authorized to access all or certain parts of it?​

​registered user

One-To-Many

Add primary key attribute of the "ONE" class to the "MANY" class as a foreign key?

2. Explain the difference between "An approach to the SDLC" and "An approach to software construction."

An approach to the SDLC has to do with whether the project methodology is predictive or adaptive and what specific project methodology is used. An approach to software construction has to do with structured development or object-oriented development and the analysis and design models that are used.

A deployment diagram is most useful for which design activity?​ -​Designing the user interface ​-Designing software classes -​Describing the environment -​Designing application components

Designing application component

A deployment diagram is most useful for which design activity

Designing application components

A knowledge of all the computing devices accessed by clients is required for which design activity?

Designing the user interface

Which is NOT one of the responsibilities of the database administrator?

Determine data confidentiality

DBMS Components

> application program > direct query user > database administrator

1. An approach to the SDLC that plans the project in advance and then progresses according to the plan is called what? a. A predictive approach c. An Agile approach b. An adaptive approach d. A project management approach

A

14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns. a. first c. third b. second d. fourth

A

14. One main principle of structured design is that program modules should be designed so that they are ____. a. highly cohesive c. tightly structured b. tightly coupled d. highly engineered

A

2. Which of the following is NOT a component or function of a typical database management system (DBMS)? a. Low-level process management c. Application program interface b. End-user query processor d. Administrative interface

A

20. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based

A

21. A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure. a. single c. partitioned b. replicated d. cloud-based

A

22. Reuse is one of the primary benefits of using what type of development methodology? a. Object-oriented c. Top-down b. Structured d. Iterative

A

Network diagram

A diagram that shows how hardware components are interconnected with devices and cabling is called a what?

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.

False

A network diagram and a location diagram show basically the same information but in a different format.

Third

A relational database table is in _______ normal form if no NON-KEY FIELD is functionally dependent on any other non-key field?

Virtual Private Network (VPN)

A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?

What is a computer that manages shared resources for access across a network called?

A server computer

Web service

A software function or set of functions or services that can be executed via Web protocols is called a what?

Rows

All ____ in a table are guaranteed to be UNIQUE if the table's primary key is guaranteed to be UNIQUE?

What is the difference between HTTP and HTTPS?​

Amazon uses HTTPS for credit card information

Web-based Application

An application that uses a browser for the user interface.

16. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth

B

23. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based

B

24. Which of the following is a basic value of agile software development? a. Following a plan over responding to change b. Working software over comprehensive documentation c. Processes and tools over individuals and interactions d. Contract negotiation over customer collaboration

B

8. The objective of the ____ is to keep the system running productively during the years following its initial installation. a. version release c. maintenance phase b. support phase d. deployment phase

B

13. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user

B

10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique. a. columns c. rows b. foreign keys d. values

C

11. An separate relation must be created to store the attributes of a ____ relationship among two other classes. a. one-to-one c. many-to-many b. one-to-many d. not any (not necessary)

C

17. A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

C

19. A graphical diagram whish shows the hierarchical organization of modules is called a(n) _______. a. Entity relationship diagram (ERD) c. structure chart b. top-down chart d. data flow diagram

C

19. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form

C

2. The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase. a. iterative c. waterfall model b. spiral model d. prototyping

C

12. The acronym SADT stands for what? a. Software and Decoding Tools b. Systems Analysis and Development Tools c. Systems Analysis and Design Tools d. Structure Analysis and Design Technique

D

15. ____ is a one-to-one correspondence between two field values. a. First normal form c. Referential integrity b. Second normal form d. Functional dependency

D

18. A(n) ____ is a representation of an important aspect of the real world. a. methodology c. technique b. tool d. model

D

25. What is the primary goal in Agile Modeling? a. building model templates for future projects b. building multiple models c. focusing on representation with good models d. developing software

D

26. Which of the following is NOT an Agile Modeling principle? a. Minimize your modeling activity b. Know your models and how to use them c. Focus on content rather than representation d. Maintain core models to verify past decisions

D

28. A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood. a. predictive c. incremental b. persistent d. adaptive

D

Which of the following is NOT one of the activities of Core Process 4: Design system components?

Design security and integrity controls

Which of the following is not one of the design activities included in the Design System Components core process?

Design the security controls

A three-layer architecture requires at least three computers to be implemented correctly

False

A timeline on a communication diagram indicates the sequence of the messages

False

An object-oriented program consists of a set of object classes that work together to process an input message

False

Another term for a network diagram is a deployment diagram

False

Application software that usually executes with a browser is often just called an "app".

False

Dependency relationships cannot exist between classes within packages

False

Design class diagrams and interaction diagrams should be developed independent of each other

False

Design using CRC cards does not require the use of a design class diagram.

False

Every table in a relational database must have a foreign key.​

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.​

False

In generalization/specialization the attributes (but not the associations) of the subclass are inherited from the superclass

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

False

Since the design activities all interact with each other, it really doesn't matter which activity occurs first

False

Symmetric key encryption uses a public key and a private key

False

The Internet and the WWW are synonyms

False

The Web is the highway over which messages and information travel from network to network

False

The controller object is usually part of view layer

False

The domain data in a database is sometimes referred to as metadata.​

False

7. A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

First

According to an Agile iterative development process in which iteration would design activities normally start

First iteration

database management system

Microsoft SQL Server is an example of what?​

System Software

Software, such as Web server software, and works behind the scenes is called what?

Which of the following is NOT one of the design models used for object-oriented design a. Communication diagram b. System sequence diagram c. CRC cards d. Design class diagram

System sequence diagram

Given the following URL, what is the correct description of the portion shown in bold? https://*www.reddit.com*/r/The_Donald/

The server name

Given the following URL, what is the correct description of the portion shown in bold? http://www.barnesandnoble.com/u/books-best selling-books/379003057

The server name

Technology Architecture

The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?

Technology Architecture

The set of computing hardware, network hardware and system software used by an organization is called the what?

A relational database management system stores data in tables.​

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.​

True

Adding a use case controller to a sequence diagram is an example of applying a design pattern

True

Detailed Object-oriented design (OOD) is done on a use case-by-use case basis

True

Every database in a DBMS consists of two separate data stores

True

In an iterative approach to software development, it is usually best to develop the database in the first few iterations.​

True

The majority of new systems today must be integrated into existing networks without disrupting existing applications

True

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction

True

The objective of object-oriented design is to identify and specify all the classes and messages that work together to carry out each use case

True

The output of the design activities is a set of diagrams and documents that describe the solution system

True

The starting point for identifying messages in detailed design of a use case is always the SSD

True

Referential Integrity

_________ is a consistent relational database state in which EVERY FOREIGN KEY VALUE also exists as a PRIMARY KEY VALUE?

Keys

_______________ are a critical element of relational database design because they are the BASES FOR REPRESENTING RELATIONSHIPS among tables?

Functional Dependency

_________________ is where the value in ONE field determines the value in ANOTHER field in the SAME record?

The identifier of a Web resource and which defines a protocol, a server or domain name, and a resource identifier is called a(n)

Uniform Resource Locator

___ methods must be included in a design class diagram

Use case specific

A function or service that is called from a Web application to another Web application is called a(n) ________.​

Web service

in first and second normal form

What can be said about the following relational database table? (key is underlined): StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding

In First Normal Form

What can be said about the following relational database table? (key is underlined): CourseSectionID, StudentID, Grade, StudentName

Heterogeneous Distributed Database

What contains both GLOBAL and LOCAL schemas with distinct DBMS's?​

Local Area Network

What does LAN stand for?​

Software as a Service

What does SaaS stand for?

Extensible Markup Language

What does XML stand for?​

low-level process management

What is NOT a component or function of a typical database management system (DBMS)?​

establish user authentication for data access

What is NOT one of the responsibilities of the DA?​

determine data confidentiality

What is NOT one of the responsibilities of the database administrator?​

A Server Computer

What is a computer that manages shared resources for access across a network called?​

HTTP is less secure, while HTTPS would be used for credit card transactions.

What is the difference between HTTP and HTTPS?​

HTML5

What is the latest version of HTML?​ (As of 2016)

Tuple

Which of the following below is NOT a synonym of the others?​ > Column, Tuple, Attribute, Field

Field

Which of the following below is NOT a synonym of the others?​ > Tuple, Field, Row, Record

Which is not a model normally produced as part of application component design

design class diagram

Which is not a model normally produced as part of application component design?​ -​deployment diagram ​-component diagram - ​package diagram ​-design class diagram

design class diagram

A formal technique for transforming a relational schema to an equivalent one that eliminates data anomalies is called _______.

normalization

11. A thing in an information system that responds to messages by executing functions or methods is called a(n) _______.

object

12. What is the term used to describe system development based on the view that a system is a set of interacting objects that work together?

object oriented approach

An object-oriented program consists of a set of computing ______.

objects

Row

one HORIZONTAL GROUP of data attribute values?

Three types of users that are considered in the design of a security system are ____.​

​unauthorized user, registered user, and privileged user

17. A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.

security

Limiting user access to the system is considered what type of design activity?​ ​-Describing the environment ​-Security and controls design ​-Application components design -​User interface design

security and control

15. A technique where all updates to a database are recorded with who, when, and how information is called ________.

transaction logging

A big part of describing the environment is identifying and defining all the types of computing devices that will be required.​

true

During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

true

In user interface design the detailed screen layouts should be done after the devices have been decided.​

true

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.​

true

The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.

true/false condition

In a relational database, a row can be referred to as a(n)

tuple

Which of the following is a type of model used in user interface design?​

​system sequence diagram


Ensembles d'études connexes

2015-2020 Dietary Guidelines for Americans

View Set

chapter 4 bio 135 multiple choice

View Set

Strategic Management Chapter 6-11

View Set

Intro to Politics ~ Quiz Two and Test One

View Set