INFO 311 Chapter 11, Chapter 11, Ch. 10, System analysis CH 10, Chapter 10, Chapter 10, Chapter 6+7+9, System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_2, Info 311-Chapter 11

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Missing milestones on a project may be an indication of project that has high _______ risk.​ a. ​Deployment b. Resource c. Technological d. Schedule

D

Which is NOT an activity associated with establishing the project environment?​ a. Establish team processes and procedures. b. Establish the working environment. c. Record and communicate project information. d. Identify staffing requirements.

D

Which of the following is NOT one of the PMBOK knowledge areas?​ a. Risk Management b. Procurement Management c. Integration Management d. Documentation Management

D

​Which would be the least desirable reason to initiate a new development project? a. To solve an internal business problem b. To take advantage of a new sales opportunity c. To respond to a legislative requirement​ d. ​To take advantage of new technology

D

1. List and briefly describe the four components of a database management system.

1. Application Program Interface -- allows programming language interface to write scripts and logic to produce results based on complex logic. 2. End-user query processor -- this provides the SQL statements to query and update the database. 3. Administrative interface -- provides the functionality to create the schema and change the database configuration parameters. 4. Database access and control logic -- this is the actual DB engine which updates the database and retrieves results.

1. List and briefly describe the three major activities that occur during the support phase.

1. Maintaining the system - Fixing errors and problems 2. Enhancing the system - Adding new capabilities to the existing system 3. Supporting the users - Providing technical help to the users, often with a help desk.

3. List the three constructs that are used for structured programming.

1. Sequence 2. Decision 3. Iteration

3. List and briefly describe the four types of database server architecture described in the textbook.

1. Single database server architecture —One or more databases are hosted by a single DBMS running on a single server. 2. Replicated database server architecture —Complete database copies are hosted by cooperating DBMSs running on multiple servers. The servers are usually distributed across geographic locations. 3. Partitioned database server architecture —Multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers. 4. Cloud-based database server architecture —This architecture isn't really a separate architecture. Rather, it is a specific implementation of one or more of the other architectures by using the services of a cloud computing provider.

Ten Knowledge Areas of PMBOK

1.) Project Integration Management 2.) Project Scope Management 3.) Project Time Management 4.) Project Cost Management 5.) Project Quality Management 6.) Project Human Resources Management 7.) Project Communications Management 8.) Project Risk Management 9.) Project Procurement Management 10.) Project Stakeholder Management

Project Management

> ORGANIZING AND DIRECTING other people to achieve a PLANNED result within a PREDETERMINED schedule and budget > processes used to plan the project and then monitor and control it

DBMS Components

> application program > direct query user > database administrator

1. An approach to the SDLC that plans the project in advance and then progresses according to the plan is called what? a. A predictive approach c. An Agile approach b. An adaptive approach d. A project management approach

A

14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns. a. first c. third b. second d. fourth

A

14. One main principle of structured design is that program modules should be designed so that they are ____. a. highly cohesive c. tightly structured b. tightly coupled d. highly engineered

A

2. Which of the following is NOT a component or function of a typical database management system (DBMS)? a. Low-level process management c. Application program interface b. End-user query processor d. Administrative interface

A

20. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based

A

21. A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure. a. single c. partitioned b. replicated d. cloud-based

A

22. Reuse is one of the primary benefits of using what type of development methodology? a. Object-oriented c. Top-down b. Structured d. Iterative

A

29. In Agile modeling what are the two important reasons for building models? a. To understand what you are building and to communicate the solution b. To document a solution and to instruct other developers c. To communicate with the user and to obtain feedback d. To write good code and to design good databases

A

30. What is the name of a general control technique used to ensure that entered data is correct? a. Data validation control c. Data acceptance control b. Data access control d. Data completeness control

A

35. Which of the following can be classified as privileged users? a. System programmers, application programmers, and system administrators b. Technical users and security personnel c. System operators and clerks d. Administrators and accountants

A

38. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document

A

4. An approach to the SDLC where the phases overlap is often referred to as the _______ approach. a. modified waterfall c. modified predictive b. waterfall d. spiral

A

5. A(n) ____ is a field or set of fields used to uniquely identify each row. a. primary key c. object identifier b. foreign key d. attribute

A

5. The term ____ refers to an approach that completes parts of a system in one or more iterations and puts them into operation for users. a. incremental development c. bottom-up development b. adaptive development d. predictive development

A

6. ____ are a critical element of relational database design because they are the bases for representing relationships among tables. a. Keys c. Fields b. Attributes d. Tables

A

7. One column of a table in a relational database is called a(n) ____. a. attribute c. tuple b. relation d. element

A

7. Which of the following is NOT one of the major activities of the support phase? a. Training the users c. Enhancing the system b. Maintaining the system d. Supporting the users

A

According to the Dr Dobbs report on project success what is the approximate percent of Agile or iterative projects that can be considered completely successful?​ a. 65% b. 80%​ c. 35% d. 50%

A

Project Quality Management is different for Agile projects because they place heavy emphasis in what additional area?​ a. The quality of the project processes. b. The quality of the testing process. c. The quality of the deliverables. d. The quality of the team members.

A

The organization and direction of other people to achieve a planned result within a predetermined schedule and budget is called what?​ a. Project management b. Project delivery management c. Project human resource management d. Project integration management

A

Which of the following is NOT a standard reason for initiating a system development project.​ a. ​To reduce staffing requirements b. To respond to an opportunity c. To respond to an external directive d. To resolve a problem

A

Which of the following is NOT one of the internal responsibilities of a project manager?​ a. Develop specifications b. ​Develop the project schedule c. Assign work to team members d. ​Monitor project milestones

A

30​ day

A Scrum sprint is a firm ____ time box, with a specific goal or deliverable.​

System vision document

A ____ combines three components: the problem description, the business benefits, and the system capabilities.​

Protocol

A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.​

system vision document

A _________________ combines THREE COMPONENTS: the problem description, the business benefits, and the system capabilities?

Three layer architecture

A client/server architecture that divides an application into view, business logic and data layers is called what?

Server

A computer that manages shared resources and allows users to access those resources over a network is called a what?

Microsoft SQL Server is an example of what?

A database management system

Microsoft SQL Server is an example of what?​

A database management system

Network diagram

A diagram that shows how hardware components are interconnected with devices and cabling is called a what?

complex data type

A field in a relational table called "ADDRESS" would be an example of what?​

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.

Client/Server Architecture

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?

False

A network diagram and a location diagram show basically the same information but in a different format.

An approach to the SDLC that plans the project in advance and then progresses according to the plan is called what?

A predictive approach

Hypertext Markup Language

A protocol that defines the structure and content of a web page is called what?

First

A relational database table is in _______ normal form if it has NO repeating fields or groups of fields, and hence all rows have the same columns?

Third

A relational database table is in _______ normal form if no NON-KEY FIELD is functionally dependent on any other non-key field?

Virtual Private Network (VPN)

A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?

What is a computer that manages shared resources for access across a network called?

A server computer

Three-layer architecture

A software architecture that divides an application into view, business logic, and data is called what?

Web service

A software function or set of functions or services that can be executed via Web protocols is called a what?

False

A three-layer architecture requires at least three computers to be implemented correctly.

primary key

A(n) ____ is a field or set of fields used to UNIQUELY IDENTIFY EACH ROW?

adaptive

A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood.​

stem development methodology

A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques.​

model​

A(n) ______ is a representation of an important aspect of the real world.​

schema

A(n) ________ describes the STRUCTURE, CONTENT, and ACCESS CONTROLS of a physical data store or database?

foreign key

A(n) _________ is a field or set of fields stored in one table that ALSO EXISTS as a primary key in another table?

Agile Cost Management

AGILE PROJECT MANAGEMENT: COSTS are more difficult to estimate?

Agile Risk Management

AGILE PROJECT MANAGEMENT: HIGHER RISK aspects of project are completed first?

Agile Quality Management

AGILE PROJECT MANAGEMENT: QUALITY assessed after each iteration?

Agile Time Management

AGILE PROJECT MANAGEMENT: SCHEDULE must be FLEXIBLE due to changes?

Agile Scope Management

AGILE PROJECT MANAGEMENT: SCOPE is not well understood, but needs to be controlled?

65%

According to the Dr Dobbs report on project success what is the approximate percent of Agile or iterative projects that can be considered completely successful?​

identify the problem and obtain approval

Activity of CORE PROCESS ONE?

plan and monitor the project

Activity of CORE PROCESS TWO?

One-To-Many

Add primary key attribute of the "ONE" class to the "MANY" class as a foreign key?

____ is a philosophy and set of guidelines for developing software in an unknown, rapidly changing environment.

Agile development

Rows

All ____ in a table are guaranteed to be UNIQUE if the table's primary key is guaranteed to be UNIQUE?

Which of the following methodologies use an adaptive approach to systems development?

All of them

What is the difference between HTTP and HTTPS?​

Amazon uses HTTPS for credit card information

Web-based Application

An application that uses a browser for the user interface.

2. Explain the difference between "An approach to the SDLC" and "An approach to software construction."

An approach to the SDLC has to do with whether the project methodology is predictive or adaptive and what specific project methodology is used. An approach to software construction has to do with structured development or object-oriented development and the analysis and design models that are used.

4. Explain how a digital certificate works.

An entity who wants a certificate with its name and public key goes to a certifying authority and buys a certificate. The certifying authority encrypts the data with its own private key and gives the data back to the original entity. When someone asks the entity for its public key, it sends the certificate. The customer receives the certificate and opens it with the certifying authority's public key.

. _______ is a qualitative measure of how closely the classes in a design class diagram are linked together.

Coupling

10. The term "_______" is used to separate out some aspect of the real world that is important to understand when we build a model. a. brainstorm c. analysis b. synthesis d. abstraction

D

12. The acronym SADT stands for what? a. Software and Decoding Tools b. Systems Analysis and Development Tools c. Systems Analysis and Design Tools d. Structure Analysis and Design Technique

D

12. ____ is a consistent relational database state in which every foreign key value also exists as a primary key value. a. First normal form (1NF) c. Function dependency b. Database synchronization d. Referential integrity

D

15. An important way to measure the quality of a module in structured programming is by assessing its _____. a. structured design c. internal constructs b. top-down approach d. cohesion and coupling

D

False

Application software that usually executes with a browser is often just called an "App".​

Object classes that are created during design to facilitate the final solution, but are not part of the problem domain are sometimes referred to as ______ ______.

Artifacts

19. _______ is the process of allowing or restricting a specific user's access to specific resources.

Authorization

11. A(n) "_______" is a guideline to help an analyst complete a specific task and often includes step-by-step instructions to do something such as how to create a model. a. tool c. methodology b. technique d. SDLC

B

13. A hierarchical program structure consisting of a boss or control module which calls submodules is called what? a. traditional program structure c. ordered program structure b. top-down programming d. bottom-up programming

B

13. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user

B

16. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth

B

23. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based

B

24. Which of the following is a basic value of agile software development? a. Following a plan over responding to change b. Working software over comprehensive documentation c. Processes and tools over individuals and interactions d. Contract negotiation over customer collaboration

B

25. A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups. a. single c. replicated b. partitioned d. cloud-based

B

27. An integrity control that verifies the data in one field against the data in other fields is called a ____ control. a. completeness c. value b. field combination d. data validation

B

3. In a relational database, a row can be referred to as a(n) ____. a. field c. attribute b. tuple d. relation

B

33. Which user is known to the system and is authorized to access all or certain parts of it? a. Authorized user c. Valid user b. Registered user d. Authenticated user

B

36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with a(n) ____ key. a. asymmetric c. public b. private d. symmetric

B

37. A ____ is an institution's name and public key, which is encrypted and certified by a third party. a. private key c. certifying authority b. digital certificate d. digital key

B

6. The term "____" means that work activities are done once, then again, and yet again. a. agile modeling c. waterfall approach b. iteration d. incremental development

B

15. ____ is a one-to-one correspondence between two field values. a. First normal form c. Referential integrity b. Second normal form d. Functional dependency

D

8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table. a. primary key c. object identifier b. foreign key d. column

B

8. The objective of the ____ is to keep the system running productively during the years following its initial installation. a. version release c. maintenance phase b. support phase d. deployment phase

B

A ____ combines three components: the problem description, the business benefits, and the system capabilities.​ a. Project charter b. System vision document c. Proof-of-concept analysis d. System scope document

B

Given a project schedule with all tasks connected with one-way arrows and task durations. The critical path is _____.​ a. it cannot be determined b. the longest path through the network c. ​neither the longest nor shortest path through the network d. the shortest path through the network

B

The fear of using a computer (computer phobia) is a type of _______ risk.​ a. Resource (people) risk b. Organizational risk c. Deployment risk d. Technological risk

B

The net present value for a year is calculated by _______.​ a. determining when the benefits offset the costs b. applying the discount factor to the combination of benefits and costs c. applying the discount rate to the combination of benefits and costs d. combining benefits and costs for a defined number of years

B

Usually the highest cost for the development and deployment of a new system is _____.​ a. ​License fees for new software b. Salaries of the development team c. Computer and network equipment d. Data center costs

B

What technique is used to control the scope in an Agile project?​ a. Not important to worry about scope. b. ​Keep a prioritized list of required functions. c. ​Freeze the requirements in an early iteration. d. ​Let the client and the users worry about the scope.

B

Which of the following is NOT one of the external responsibilities of a project manager?​ a. ​Work with the client b. Assess project risks c. Identify resource needs d. Report project status

B

​The present value of $200,000 development costs in year 0 assuming a 10% discount rate is: a. $180,000 b. $200,000 c. $190,000​ d. $210,000

B

​When the project team asks "Are our working relationships with the user effective?" it is doing what? a. A work breakdown structure b. An end of iteration review c. An end of project review d. A performance review

B

17. A(n) ____ program is one that has one beginning and one ending. a. iterative c. object-oriented b. incremental d. structured

D

18. A(n) ____ is a representation of an important aspect of the real world. a. methodology c. technique b. tool d. model

D

1. A(n) ____ describes the structure, content, and access controls of a physical data store or database. a. relation c. schema b. DBMS d. attribute

C

10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique. a. columns c. rows b. foreign keys d. values

C

11. An separate relation must be created to store the attributes of a ____ relationship among two other classes. a. one-to-one c. many-to-many b. one-to-many d. not any (not necessary)

C

17. A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

C

19. A graphical diagram whish shows the hierarchical organization of modules is called a(n) _______. a. Entity relationship diagram (ERD) c. structure chart b. top-down chart d. data flow diagram

C

19. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form

C

2. The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase. a. iterative c. waterfall model b. spiral model d. prototyping

C

21. A(n) _______ is used to show the interacting messages between objects that collaborate. a. activity diagram c. sequence diagram b. class diagram d. data flow diagram

C

22. A ____ database server architecture stores different parts of a database on different servers. a. single c. partitioned b. replicated d. cloud-based

C

24. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive

C

27. An example of a project phase in a predictive project is ____. a. gathering information about the user's needs b. performing a project cost/benefit analysis c. planning the project d. drawing the system interface

C

28. What is a control that checks the value of a field to ensure that it is within the correct range? a. Answer control c. Value limit control b. Completeness control d. High-low control

C

32. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user

C

34. A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. supervisor user c. privileged user b. database administrator d. technical user

C

4. Data elements in a relational database are organized into ____. a. attributes c. tables b. objects d. tuples

C

9. A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques. a. predictive approach b. object-oriented analysis c. system development methodology d. systems development life cycle

C

9. Each class on an class diagram is represented by a(n) ____ in a relational database. a. attribute c. table b. row d. column

C

The creation of a work breakdown structure is helpful in the development of what? a. ​Software testing plan. b. Detailed effort estimates of work tasks. c. Detailed work schedule. d. Project iteration schedule.

C

The time from the deployment of a new system until the break-even point is reached is sometimes called the ______.​ a. investment period b. return on investment c. payback period d. net present value

C

Which is NOT a criterion that is used to determine how to define tasks for a work breakdown structure.​ a. How to estimate the effort required. b. ​How to know when the task is complete. c. A logical way to determine its predecessor. d. It should take one to five days.

C

Which of the following is NOT a common question asked by the client before giving project approval?​ a. How long will it take? b. How much will it cost?​ c. Who is the project manager? d. What are the benefits?

C

Which of the following is NOT one of the activities associated with staffing the project team?​ a. Organizing work groups. b. Developing a resource plan. c. Setting up programming rules and guidelines. d. Conducting team-building exercises.

C

Which of the following is NOT one of the activities of the second core process to plan and monitor the project.​ a. Establish the work environment. b. ​Evaluate work processes c. Estimate the project length d. Build work schedule

C

Which of the following is also called a steering committee?​ a. ​Strategic planning committee b. Project approval committee c. Oversight committee d. Executive committee

C

Which of the following principles of project management evaluates Requests for Proposals?​ a. Integration Management b. Quality Management c. Procurement Management d. Human Resource Management

C

Which of the following statements best defines what a project is?​ a. A sequence of steps with a scheduled completion. b. ​A set of procedures that must be completed in a timely fashion. c. A planned undertaking with a start and stop and that produces a result. d. A planned activity consisting of defined tasks by a team of people

C

​Estimating the effort required and identifying task dependencies is usually part of the work to create what? a. The project time estimate b. The project iteration schedule c. The detailed work schedule d. The critical path

C

Oversight Committee

CLIENTS and KEY MANAGERS who REVIEW the progress and DIRECT the project?

CRC stands for what?

Class responsibility collaboration

The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.

Class-Level Attribute

23. ____ is a philosophy and set of guidelines for developing software in an unknown, rapidly changing environment. a. Object-oriented development c. Pair programming b. Refactoring d. Agile development

D

25. What is the primary goal in Agile Modeling? a. building model templates for future projects b. building multiple models c. focusing on representation with good models d. developing software

D

26. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment

D

26. Which of the following is NOT an Agile Modeling principle? a. Minimize your modeling activity b. Know your models and how to use them c. Focus on content rather than representation d. Maintain core models to verify past decisions

D

28. A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood. a. predictive c. incremental b. persistent d. adaptive

D

29. What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? a. Secure control c. Comprehensive control b. Total control d. Completeness control

D

3. An adaptive approach to a development project is best used when _______. a. the system has low technical risk b. the requirements are simple and the system is small c. the requirements are well understood d. the requirements are uncertain

D

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

Completeness control

True

Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.​

31. Which of the following is NOT a factor that affects the risk of fraud? a. Separation of duties c. Asset reconciliation b. Monitoring d. Authorization of users

D

What do we call the notation that shows all the information required to call or invoke a method?

Method signature

Which of the following is usually NOT included in a first-cut design class diagram? a.Initial value information for attributes b.Attribute types c. Method signatures d.Navigation visibility arrows

Method signatures

database management system

Microsoft SQL Server is an example of what?​

Which of the following is NOT an XP practice?

No required coding standards

Which of the following is NOT an XP practice?​

No required coding standards

20. _____ consists of writing statements in a programming language to define what each type of object does. a. OOP c. OOD b. OOA d. OOS

OOP

Attribute

One COLUMN of a table in a relational database is called a(n) ______________?

System software usually refers to what kind of software?​

Operating systems and web servers

If you are doing detailed design for the use case Create New Order, which class should receive the first input? (Order Transaction, Order, Order Handler, Customer)

Order Handler

Which of the following is completed in the inception phase of the UP?

Produce rough estimates of cost and schedule

When describing the interfaces to external systems, which is not one of the important issues

Programming languages

When describing the interfaces to external systems, which is not one of the important issues?​ ​-Network addresses ​-Programming languages - ​Error handling ​-Message formats

Programming languages

PMBOK

Project Management Body Of Knowledge acronym?

the quality of the project processes

Project Quality Management is different for Agile projects because they place heavy emphasis in what additional area?​

Failed Projects

Project Success: > cancelled or not used

IT Development Projects

Projects that usually do to these 3 things: > Respond to an OPPORTUNITY > Resolve a PROBLEM > Respond to an EXTERNAL DIRECTIVE

A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?

Protection from variations

What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?

Protection from variations

5. _________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.

Referential integrity

2. What danger(s) is/are inherent in using keys invented by external agents as primary keys in a relational database?

Referential integrity depends on primary key uniqueness. By using key values assigned by external entities, an organization risks the possibility that referential integrity may be broken at some time in the future (e.g., duplicate shipment tracking numbers from competing shipping companies

Database Management System

Referential integrity is normally ENFORCED by the __________________?

Which user is known to the system and is authorized to access all or certain parts of it?​ ​-Registered user ​-Authorized user - ​Valid user ​-Authenticated user

Registered user

1. A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.

Schema

team

Scrum focuses primarily on the ____ level.​

Limiting user access to the system is considered what type of design activity?

Security and controls design

Which design activity that pervades all other design activities

Security and controls design

Which design activity that pervades all other design activities?​ ​-Environment design ​-Database design -​Interface design -​Security and controls design

Security and controls design

10. _______ database server architecture is poorly suited to applications that must be available on a seven-day, 24-hour basis.

Single

What does SaaS stand for?

Software as a Service

System Software

Software, such as Web server software, and works behind the scenes is called what?

Which of the following is included in the top compartment of a design class?

Stereotype name

Which of the following can be classified as privileged users A) System programmers, application programmers, and system administrators B) Technical users and security personnel C)System operators and clerks D) Administrators and accountants

System programmers, application programmers, and system administrators

Which of the following is NOT one of the design models used for object-oriented design a. Communication diagram b. System sequence diagram c. CRC cards d. Design class diagram

System sequence diagram

Which of the following is a type of model used in user interface design?​ -​System sequence diagram -​Activity Diagram -​Communication diagram ​-Class diagram

System sequence diagram

8. SADT stands for what?

Systems analysis and Design technique

Each class on an class diagram is represented by a(n) ____ in a relational database.

Table

detailed work structure

The CREATION OF A WORK BREAKDOWN STRUCTURE is helpful in the development of what?

True

The Internet can be thought of as the network of networks.​

project iteration schedule

The LIST OF ITERATIONS and USE CASES or USER STORIES assigned to each iteration?

200,000

The PRESENT VALUE of $200,000 development costs in year 0 assuming a 10% discount rate is?

payback period

The TIME from the deployment of a new system until the BREAK-EVEN POINT is reached is sometimes called the ___________________?

phases, disciplines, and iterations​

The UP life cycle model includes all of the following:​

False

The Web is the highway over which messages and information travel from network to network.​

waterfall model

The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase.​

Interoperability

The ability of a component or system to interact with other components or systems is referred to as what?

External systems and technology architecture.

The activity of Describing the Environment consists of what two key elements?​

user stories

The basis of an XP plan is a set of ____ that users develop.​

Detailed work schedule.

The creation of a work breakdown structure is helpful in the development of what?

organizational

The fear of using a computer (computer phobia) is a type of ___________ risk?

planning a series of iterations

The first release-level activity in an XP development approach is ____.​

Internet Backbone Network

The high-speed, high capacity network that interconnects regions, countries, and continents.

What is the best coupling choice for an input window, domain, and database object in a system?

The input window is coupled to the domain and the domain is coupled to the database.

False

The primary benefit of a network diagram, is to show the network cabling and the network routers.​

Given the following URL, what is the correct description of the portion shown in bold? https://*www.reddit.com*/r/The_Donald/

The server name

Given the following URL, what is the correct description of the portion shown in bold? http://www.barnesandnoble.com/u/books-best selling-books/379003057

The server name

Technology Architecture

The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?

Technology Architecture

The set of computing hardware, network hardware and system software used by an organization is called the what?

Application Architecture

The set of information systems the organization needs to support its operations is often called the what?

Application Architecture

The set of information systems the organization needs to support its operations.

World Wide Web

The set of resources that can be accessed over the Internet is referred to what?

When we use the term the Web what is the correct definition?​

The set of world wide resources that are available over the Internet

iteration​

The term "____" means that work activities are done once, then again, and yet again.​

abstraction​

The term "_______" is used to separate out some aspect of the real world that is important to understand when we build a model.​

​incremental development

The term ____ refers to an approach that completes parts of a system in one or more iterations and puts them into operation for users.​

​payback period

The time from the deployment of a new system until the break-even point is reached is sometimes called the ______.​

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table

True

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.​

True

A model is a representation of an important aspect of the real world.

True

A network diagram is a useful model to show three/layer architecture

True

A relational database management system stores data in tables

True

A relational database management system stores data in tables.​

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.​

True

A tool is a software support that helps create models or other components required in the project.

True

Adding a use case controller to a sequence diagram is an example of applying a design pattern

True

Agile Modeling emphasizes creating only models that are necessary.

True

All adaptive approaches include iterations

True

All adaptive approaches include iterations.

True

An Agile Modeling practice used in incremental modeling is to create several models in parallel

True

An objective of security controls is to maintain a stable operating environment for users

True

Another name for the data model is the domain model

True

Both a communication diagram and a sequence diagram have the same purpose and provide basically the same information

True

Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.​

True

Designing a single user interface is now the exception, not the norm.

True

Detailed Object-oriented design (OOD) is done on a use case-by-use case basis

True

Every database in a DBMS consists of two separate data stores

True

In Agile Development, contracts include options for the customer to cancel if the project is not progressing, as measured by the incremental deliverables.

True

In an iterative approach to software development, it is usually best to develop the database in the first few iterations.​

True

In the UP life cycle, some working software is tested and reviewed with system users at the end of each iteration.

True

It is better to have the data access object create a new object when multiple objects may be created.

True

Most iterations in the UP involve work in all disciplines.​

True

Navigation visibility may be bidirectional

True

On a sequence diagram, view layer objects send messages to the controller

True

Once a Scrum team has agreed on a goal and has selected items from the backlog list, the scope of the sprint is frozen.​

True

Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.​

True

Relationships between tables is usually indicated through the use of a foreign key.​

True

The Internet can be thought of as the network of networks

True

The Unified Process (UP) life cycle has four phases: inception, elaboration, construction, and conversion.

True

The majority of new systems today must be integrated into existing networks without disrupting existing applications

True

The modified waterfall approach requires overlapping phases.

True

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction

True

The objective of object-oriented design is to identify and specify all the classes and messages that work together to carry out each use case

True

The output of the design activities is a set of diagrams and documents that describe the solution system

True

The starting point for identifying messages in detailed design of a use case is always the SSD

True

​four weeks

UP disciplines are involved in each iteration, which is typically planned to span ____.​

The identifier of a Web resource and which defines a protocol, a server or domain name, and a resource identifier is called a(n)

Uniform Resource Locator

___ methods must be included in a design class diagram

Use case specific

Tangible "Dollar" Benefits

Used for Cost/Benefit Analysis: > process of COMPARING COSTS and BENEFITS to see whether investing in a new system will be BENEFICIAL > a benefit that can be measured or estimated in terms of dollars

Which of the following really is both an analysis (discovery) and a design process (solution).

User interface design

Web-based application is software with the following characteristics:​

Uses a browser and web-server

salaries for the development team

Usually the HIGHEST COST for the development and deployment of a new system is ______________?

Which of the following is NOT a valid Web protocol?

VPN

Which of the following is not a valid Web protocol? a. VPN b. HTTPS c. HTML d. XML

VPN (This question is stupid)

A function or service that is called from a Web application to another Web application is called a(n) ________.

Web service

A function or service that is called from a Web application to another Web application is called a(n) ________.​

Web service

undefined project management practices

What best describes the reason why projects fail?​

in first and second normal form

What can be said about the following relational database table? (key is underlined): StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding

In First Normal Form

What can be said about the following relational database table? (key is underlined): CourseSectionID, StudentID, Grade, StudentName

Heterogeneous Distributed Database

What contains both GLOBAL and LOCAL schemas with distinct DBMS's?​

Hypertext Transfer Protocol

What does HTTP stand for?​

Local Area Network

What does LAN stand for?​

Software as a Service

What does SaaS stand for?

Extensible Markup Language

What does XML stand for?​

low-level process management

What is NOT a component or function of a typical database management system (DBMS)?​

reducing staffing requirements

What is NOT a standard reason for initiating a system development project?

identifying staffing requirements

What is NOT an activity associated with ESTABLISHING THE PROJECT ENVIRONMENT?​

documentation management

What is NOT one of the PMBOK knowledge areas?

setting up programming rules and guidelines

What is NOT one of the activities associated with staffing the project team?​

estimate the project length

What is NOT one of the activities of the SECOND CORE PROCESS to plan and monitor the project?

assess project risks

What is NOT one of the external responsibilities of a project manager?​

develop specifications

What is NOT one of the internal responsibilities of a project manager?​

deployment risks

What is NOT one of the primary areas for RISK and FEASIBILITY ANALYSIS?​

establish user authentication for data access

What is NOT one of the responsibilities of the DA?​

determine data confidentiality

What is NOT one of the responsibilities of the database administrator?​

A Server Computer

What is a computer that manages shared resources for access across a network called?​

oversight committee

What is also called a STEERING COMMITTEE?​

HTTP is less secure, while HTTPS would be used for credit card transactions.

What is the difference between HTTP and HTTPS?​

HTML5

What is the latest version of HTML?​ (As of 2016)

Keep a prioritized list of required functions.

What technique is used to control the scope in an Agile project?​

take advantage of the new technology

What would be the LEAST DESIRABLE REASON to initiate a new development project?

an end of iteration review

When the project team asks "Are our working relationships with the user effective?" it is doing what?

​An end of iteration review

When the project team asks "Are our working relationships with the user effective?" it is doing what?

The set of world wide resources that are available over the Internet.

When you use the term "Web", what is the correct definition?​

​Identify staffing requirements.

Which is NOT an activity associated with establishing the project environment?​

Tuple

Which of the following below is NOT a synonym of the others?​ > Column, Tuple, Attribute, Field

Field

Which of the following below is NOT a synonym of the others?​ > Tuple, Field, Row, Record

Undefined project management practices

Which of the following best describes the reason why projects fail?​

​Who is the project manager?

Which of the following is NOT a common question asked by the client before giving project approval?​

To reduce staffing requirements

Which of the following is NOT a standard reason for initiating a system development project.​

No required coding standards

Which of the following is NOT an XP practice?​

Documentation Management

Which of the following is NOT one of the PMBOK knowledge areas?​

Setting up programming rules and guidelines.

Which of the following is NOT one of the activities associated with staffing the project team?​

​Setting up programming rules and guidelines.

Which of the following is NOT one of the external responsibilities of a project manager?​

​Training the users

Which of the following is NOT one of the major activities of the support phase?​

Working software over comprehensive documentation

Which of the following is a basic value of agile software development?​

Oversight committee

Which of the following is also called a steering committee?​

Produce rough estimates of cost and schedule​

Which of the following is completed in the inception phase of the UP?​

Complete beta test

Which of the following is completed in the transition phase of the UP?​

All of them

Which of the following methodologies use an adaptive approach to systems development?​

A planned undertaking with a start and stop and that produces a result.

Which of the following statements best defines what a project is?​

Which of the following is a basic value of agile software development?

Working software over comprehensive documentation

What is the correct syntax notation for a message on a communication diagram

[t/f condition] seq-numb: ret-value := msg-name (para-list)

Referential Integrity

_________ is a consistent relational database state in which EVERY FOREIGN KEY VALUE also exists as a PRIMARY KEY VALUE?

Keys

_______________ are a critical element of relational database design because they are the BASES FOR REPRESENTING RELATIONSHIPS among tables?

Functional Dependency

_________________ is where the value in ONE field determines the value in ANOTHER field in the SAME record?

Referential Integrity Constraint

a CONSTRAINT, stored in the schema, that the DBMS uses to AUTOMATICALLY ENFORCE referential integrity?

Relational Database Management System (RDBMS)

a DBMS that ORGANIZES data in tables?

critical path

a SEQUENCE OF TASKS that CAN'T be delayed without causing the entire project to be delayed?

Normalization

a formal technique for EVALUATING and IMPROVING the quality of a relational database schema?

Shared or Read Lock

a lock where MULTIPLE TRANSACTIONS (users) may read the data?

Exclusive or Write Lock

a lock where only ONE TRANSACTION (user) may access the locked portion of the database?

A personal computing device includes all of the following except ______.​

a router

Database Management Software (DBMS)

a system software component that MANAGES and CONTROLS one or more databases?

Transaction Logging

a technique to RECORD ALL UPDATES including change, date, time, user?

14. A(n) ______ control restricts which persons or programs can add, modify or view information.

access

A(n) ______ control restricts which persons or programs can add, modify or view information.

access

20. A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

Which of the following is NOT considered a design model? ​-Sequence diagram ​-User interface screen layouts ​-Activity diagram ​-Package diagram

activity diagram

6. Using a(n) ____________________ approach to the SDLC assumes requirements and needs for the planned system are uncertain

adaptive

A(n) _____ approach to the SDLC is used when the exact requirements of a system or needs of users are not well understood.

adaptive

High coupling ____ in a system

adds complexity

14. What is the term used to describe a guiding philosophy in which only the models that are necessary, with a valid need and the right level of detail, are created.

agile modeling

Candidate Key

an attribute or set of attributes that could serve as the PRIMARY KEY?

Key

an attribute or set of attributes, the values of which occur only ONCE in all the rows of the table?

Database (DB)

an integrated COLLECTION OF STORED DATA that is centrally managed and controlled?

A major comparison between analsys and design can be stated as:​

analysis is understanding, design is solution

A major comparison between analsys and design can be stated as:​ -analysis is understanding, design is solution ​-analysis is complex, design is simpler ​-analysis includes users, design does not -​analysis builds models, design does not

analysis is understanding, design is solution

The set of information systems the organization needs to support its operations is often called the ______ ______.

application architecture

A well-defined unit of software built to perform some specific tasks is called a(n) _____________.

application component

In a database table a column is the same thing as a(n) ______.

attribute field

18. ____________________ is the process of identifying a user to verify that he or she can have access to the system.

authentication

Which of the following is NOT a factor that affects the risk of fraud?​ ​-Asset reconciliation -​Monitoring ​-Separation of duties ​-Authorization of users

authorization of users

The objective of Implementation is to

build a new system

The objective of Implementation is to​ ​-complete the specifications - ​integrate the application components - ​build a new system - ​install a new system

build a new system

In a three-layer architecture, the application server would be part of which layer?

business logic layer

13. What is the term used to describe an adaptive type of project that is both chaotic and controlled or ordered?

chaordic

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called ________.​

client/server architecture

Complex Data Types

combinations of or extensions to primitive data types supported by PROGRAMMING LANGUAGES, OS and DBMS?

A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a(n) _______ diagram

communication

9. A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

A(n) ____ class acts as a switchboard between the view layer and the domain layer

controller

The _________________ pattern is a based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.

controller

10. The primary structured analysis model that shows inputs, processes, storage, and outputs is called the ______.

data flow diagram

Primitive Data Types

data types supported directly by the HARDWARE and PROGRAMMING LANGUAGES?

11. When it is necessary to update one database copy with changes made to the other database, it is called _________.

database Synchronization

The person who is in charge of the safety and operation of the DBMS is called the _____ _____.

database administrator

The domain model is always used as an input to which design activity?​ ​-Security and controls design ​-Application Component Design ​-User Interface Design - ​Database design

database design

Referential integrity is normally enforced by the ____.​

database management system

A database that is stored at multiple locations but which does not need to be interconnected or synchronized is called a(n) ______ ______.

decentralized database

The model that best shows how software components are distributed across hardware components is the ________.​

deployment diagram

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​ ​-Design the interfaces ​-Design the application components ​-Describe the environment ​-Design security controls

describe the environment

The main purpose of a(n) ______ ______ diagram is to document and describe the programming classes that will be built for the new system.

design class

A primary model used in software design is which of the following?​

design class diagram

Software methods are usually identified in which design model?​ ​-System sequence diagram ​-Deployment diagram ​-State-machine diagram -​Design class diagram

design class diagram

Which is not a model normally produced as part of application component design

design class diagram

Which is not a model normally produced as part of application component design?​ -​deployment diagram ​-component diagram - ​package diagram ​-design class diagram

design class diagram

What is the primary goal in Agile Modeling?

developing software

A ____ is an institution's name and public key, which is encrypted and certified by a third party

digital certificate

22. The encoding of a message with a private key is called ____________________.

digital signing

The encoding of a message with a private key is called ____________________.

digital signing

In a three-layer architecture, another name for the business logic layer is the ______ ______.

domain layer

A design class diagram is also called a data model.​

false

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.​

false

Symmetric key encryption uses a public key and a private key.​

false

Which of the following is not a synonym of the others? a. row b. Tuple c. record d. field

field

An integrity control that verifies the data in one field against the data in other fields is called a ____ control

field combination

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.​ ​-completeness ​-value ​-data validation ​-field combination

field combination

A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

first

According to an Agile iterative development process in which iteration would implementation activities normally start?​ -​Second iteration ​-Pre-project activities ​-First iteration ​-Sometime after the first iteration

first

4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.

foreign key

UP disciplines are involved in each iteration, which is typically planned to span ____.

four weeks

16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

In a distributed database when the data is divided so that separate columns of the same table are at distinct locations that is referred to as _________.

horizontal partitioning

When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.

hyperlink

When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.​

hyperlink

15. An SDLC approach that completes portions of the system in small increments across iterations and integrates it into the whole is called _____.

incremental approach

16. A set of tools that work together to provide a comprehensive development and programming environment is called a(n) _____.

incremental development evironment

12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

integrity

The perfect technology assumption implies that _______.

issues related to technology are ignored

An attribute or set of attributes that uniquely define the rows in a table is called a(n) ______.

key

A separate relation must be created to store the attributes of a ____ relationship among two other classes.

many-to-many

An approach to the SDLC where the phases overlap is often referred to as the _______ approach

modified waterfall

The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.

navigation visibility

Survival

need to do it to COMPETE?

A diagram that shows how hardware components are interconnected with devices and cabling is called a(n) ______ _____

network diagram

6. Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.

normalization

A formal technique for transforming a relational schema to an equivalent one that eliminates data anomalies is called _______.

normalization

11. A thing in an information system that responds to messages by executing functions or methods is called a(n) _______.

object

12. What is the term used to describe system development based on the view that a system is a set of interacting objects that work together?

object oriented approach

An object-oriented program consists of a set of computing ______.

objects

Row

one HORIZONTAL GROUP of data attribute values?

In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.

perfect memory assumption

Database Administrator (DBA)

person in charge of SAFETY and the OPERATION of the database?

Data Administrator (DA)

person in charge of STRUCTURE and INTEGRITY of the data?

1. The term "____________________" refers to related system development activities, which are grouped into categories of project planning, analysis, design, implementation, and support.

phase

2. A(n) _______ is the database component that actually stores the raw bytes of data.

physical data store

A(n) ____ is a field or set of fields used to uniquely identify each row

primary key

A(n) ____ is a field or set of fields used to uniquely identify each row.​

primary key

8. A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.

primitive

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key

private

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key.​ ​-asymmetric - ​private - ​public -​symmetric

private

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ -​database administrator -​technical user -​supervisor user - ​privileged user

privileged user

In Scrum, the ____ maintains the product backlog list

product owner

In design class notation, the ____ of an attribute is enclosed in curly braces {}.

property

A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.​

protocol

A(n) ____ describes the structure, content, and access controls of a physical data store or database.

schema

17. A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.

security

Limiting user access to the system is considered what type of design activity?​ ​-Describing the environment ​-Security and controls design ​-Application components design -​User interface design

security and control

Communication diagrams indicates the order of the messages with ____.

sequence numbers

A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.

singleton

An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.​

software as a service

3. One of the earliest adaptive SDLC approaches that cycles over and over again through development activities is called the _______.

spiral model

7. The "_______" refers to software development using structured analysis and structured design models.

structured approach

9. Name the programming approach where each module has one start point and one end point and uses only sequence, decision, and iteration.

structured programming

What does SQL stand for?

structured query language

______ ______ ______ is a query language used to access and update the data in a relational database.

structured query language

21. In ____________________ encryption, the same key encrypts and decrypts the data.

symmetric

A(n) _____ provides guidelines to follow for completing every activity in systems development, including specific models, tools, and techniques.

system development methodology

In XP development, a(n) ____ can guide members toward a vision and help them understand the system

system metaphor

Software, such as Web server software, and works behind the scenes is called ______ ______.

system software

3. In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.

table

Each class on an class diagram is represented by a(n) ____ in a relational database.​

table

Data elements in a relational database are organized into ____.

tables

A(n) "_______" is a guideline to help an analyst complete a specific task and often includes step-by-step instructions to do something such as how to create a model.

technique

Database Lock

technique to apply EXCLUSIVE CONTROL to a portion of the database to one user at a time?

. The set of computing hardware, network hardware and system software used by an organization is called the _________.

technology architecture

The set of computing hardware, network hardware and system software used by an organization is called the _________.​

technology architecture

Structured Query Language (SQL)

the LANGUAGE to ACCESS and UPDATE data in a relational DBMS?

Users

the PERSON or GROUP of people who will USE the new system?

Client

the PERSON or GROUP that FUNDS the project?

Attribute Value

the VALUE held in a SINGLE TABLE CELL?

An adaptive approach to a development project is best used when _______.

the requirements are uncertain

A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

third

A client/server architecture that divides an application into view, business logic and data layers is called _____ _____ ______.

three-layer architecture

A software architecture that divides an application into view, business logic, and data is called a(n) ________.

three-layer architecture

Amazon.com is a good example of what kind of architecture?​

three-layer architecture

17. In the structured approach the concept of dividing a complex program into a hierarchy of program modules is called _____.

top down programming

When there is a piece of work or an action that includes several steps and updates to the data and which all must complete to be valid, that piece or work is called a(n) _______.

transaction

15. A technique where all updates to a database are recorded with who, when, and how information is called ________.

transaction logging

A big part of describing the environment is identifying and defining all the types of computing devices that will be required.​

true

An objective of security controls is to maintain a stable operating environment for users.

true

During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

true

In user interface design the detailed screen layouts should be done after the devices have been decided.​

true

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.​

true

The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.

true/false condition

In a relational database, a row can be referred to as a(n)

tuple

After completing a use-case design using CRC cards, the next step is to _______.

update the design class diagram

Which of the following really is both an analysis (discovery) and a design process (solution).​ ​-User interface design ​-System interface design -​Environment design -​Database design

user interface design

13. A control that checks the value of a field to ensure that it is within the correct range is a(n) _______ control.

value limit

What is a control that checks the value of a field to ensure that it is within the correct range?​ ​-Answer control ​-High-low control -​Completeness control ​-Value limit control

value limit control

Using digital signatures is primarily a technique to ____.​ ​-verifying who sent a document ​-allow for remote signatures on official documents ​-digitize (scan) a signed document -​electronically send a signature

verify who sent a doc

A class that is responsible for accessing both the Internet and a database has ____ cohesion

very low

In a three-layer architecture, what are the three layers?​

view layer, business logic layer, and data layer

User interface objects in a sequence diagram often are labeled with the stereotype __________?

view or boundary

What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?

visibility

4. A development approach in which the complete system structure is built but with minimum functionality is called the _______.

walking skeleton

2. A method of executing the systems development life cycle (SDLC) which assumes rigid planning and final decision making at each step, is called the ____________________ approach.

waterfall

The _____ approach is an SDLC approach that assumes the output of each phase are frozen before moving on to the next phase.

waterfall model

A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______

with the adapter pattern

many-to-many

​A separate relation must be created to store the attributes of a __________________ relationship among TWO other classes?

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​ -​Completeness control ​-Total control ​-Secure control ​-Comprehensive control

​Completeness control

Which of the following is not one of the design activities included in the Design System Components core process?​ ​-Describe the environment -​Design the software methods - ​Design the security controls ​-Design the user interface

​Design the security controls

What are two key elements of describing the environment?​ - Programming language and operating system environment ​-External systems and technology architecture ​-Communication protocols and security methods ​-Hardware configuration and DBMS's

​External systems and technology architecture

What is a control that checks the value of a field to ensure that it is within the correct range?​ ​-Answer control -​High-low control ​-Value limit control -​Completeness control

​Value limit control

Which of the following is NOT considered a design model?

​activity diagram

The design activity key question, "How will this system interact with other systems..." is part of which design activity?​

​describe the environment

Which is not a model normally produced as part of application component design?​

​design class diagram

Build or buy questions are usually addressed during which design activity?​

​design the application components

A deployment diagram is most useful for which design activity?​

​designing application components

A knowledge of all the computing devices accessed by clients is required for which design activity?​

​designing the user interface

Which is NOT an objective of integrity controls?​

​ensure a stable functioning operating environment

Which user is known to the system and is authorized to access all or certain parts of it?​

​registered user

Which of the following is a type of model used in user interface design?​

​system sequence diagram

Three types of users that are considered in the design of a security system are ____.​

​unauthorized user, registered user, and privileged user

tables

DATA ELEMENTS in a relational database are organized into ________?

Waterfall Development

DESIGN and IMPLEMENT database FIRST?

What is the name of a general control technique used to ensure that entered data is correct?​ ​-Data validation control ​-Data completeness control ​-Data access control -​Data acceptance control

Data Validation control

What is the least cohesive approach in creating use case controllers in a system?

Define a single controller for all use cases.

True

Describing the environment is one of the detailed activities of core process 4: Design system components.​

A primary model used in software design is which of the following

Design class diagram

Software methods are usually identified in which design model

Design class diagram

Which of the following is NOT one of the activities of Core Process 4: Design system components?

Design security and integrity controls

Which of the following is not one of the design activities included in the Design System Components core process?

Design the security controls

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?​ ​-Design the user interface ​-Design the application components ​-Design the software classes -​Describe the environment

Design the software classes

A deployment diagram is most useful for which design activity?​ -​Designing the user interface ​-Designing software classes -​Describing the environment -​Designing application components

Designing application component

A deployment diagram is most useful for which design activity

Designing application components

A knowledge of all the computing devices accessed by clients is required for which design activity?

Designing the user interface

Which is NOT one of the responsibilities of the database administrator?

Determine data confidentiality

List at least 5 principles of Agile Modeling.

Develop software as your primary goal Enable the next effort as your secondary goal. Minimize your modeling activity—few and simple. Embrace change, and change incrementally. Model with a purpose. Build multiple models. Build high-quality models and get feedback rapidly. Focus on content rather than representation. Learn from each other with open communication.

Which analysis model serves as an input model to a design class diagram?

Domain model class diagram

table

Each class on an class diagram is represented by a(n) __________ in a relational database?

A toolbar might be considered an example of what?​

Embedded Software

Which is NOT an objective of integrity controls?

Ensure a stable functioning operating environment

Which is NOT an objective of integrity controls?​ -​Ensure that transactions are recorded completely - ​Ensure a stable functioning operating environment - ​Protect the assets of the organization -​Allow only valid business transactions

Ensure a stable functioning operating environment

The detailed work schedule

Estimating the effort required and identifying task dependencies is usually part of the work to create what?

detailed work schedule

Estimating the effort required and identifying task dependencies is usually part of the work to create what?

What does XML stand for?

Extensible Markup Language

What does XML stand for?​

Extensible markup language

The activity of Describing the Environment consists of what two key elements

External systems and technology architecture

The activity of Describing the Environment consists of what two key elements?​

External systems and technology architecture

A design class diagram is also called a data model

False

A lifeline indicates when a method is executing for a destination object

False

A local business office with a small database which is only used by two or three users would most probably implement a desktop DBMS

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment

False

A project that has high technical risk should use the predictive approach.

False

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.​

False

A three-layer architecture requires at least three computers to be implemented correctly

False

A timeline on a communication diagram indicates the sequence of the messages

False

An object-oriented program consists of a set of object classes that work together to process an input message

False

Another term for a network diagram is a deployment diagram

False

Application software that usually executes with a browser is often just called an "app".

False

Dependency relationships cannot exist between classes within packages

False

Design class diagrams and interaction diagrams should be developed independent of each other

False

Design using CRC cards does not require the use of a design class diagram.

False

Every table in a relational database must have a foreign key.​

False

In Agile Modeling, change is seen as the exception, not the norm.

False

In XP, each programmer is responsible for her or her own code.

False

In XP, each programmer is responsible for her or her own code.​

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.​

False

In generalization/specialization the attributes (but not the associations) of the subclass are inherited from the superclass

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

False

Including a total amount field as the sum of other fields in a table is a violation of second normal form.​

False

It is usually a bad idea to try to include user-interface classes to a CRC design

False

Maintaining simplicity in Agile Modeling eliminates the need for validating the models with code.

False

On a sequence diagram the messages are numbered to indicate the order of firing

False

One type of design class stereotype is called a "concrete class" because it can be instantiated

False

Problem domain modeling and database normalization are incompatible techniques for relational database design.​

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table.​

False

Since the design activities all interact with each other, it really doesn't matter which activity occurs first

False

Symmetric key encryption uses a public key and a private key

False

The Internet and the WWW are synonyms

False

The Scrum master sets the project schedule and assigns tasks.​

False

The UP should not be tailored to the needs of a specific organization or system project.

False

The Unified Process (UP) life cycle has four phases: inception, elaboration, construction, and conversion.​

False

The Web is the highway over which messages and information travel from network to network

False

The controller object is usually part of view layer

False

The domain data in a database is sometimes referred to as metadata.​

False

The first-cut DCD includes method signatures

False

The initial version of a communication diagram contains view layer and business layer

False

The objective of object-oriented analysis is to identify the objects that must work together to carry out each use case

False

The perfect memory assumption means that there is always adequate memory to execute the program

False

The purpose of a Scrum daily meeting is to find solutions for any issues that have arisen since the last meeting.

False

The purpose of a Scrum daily meeting is to find solutions for any issues that have arisen since the last meeting.​

False

There are two preferred methods to accessing the database. One is to have newly instantiated object call the data access object. The other is to let the controller access the data access object

False

To ensure that the database is designed correctly, an important member of the project team is the data administrator

False

XP recommends that system code be written before test code

False

XP recommends that system code be written before test code.​

False

7. A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

First

Which is a valid sequence of modeling steps for designing a use case?

First cut DCD, Communication diagram, Final DCD, Package Diagram

According to an Agile iterative development process in which iteration would design activities normally start

First iteration

False

For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.​

___________ is where the value in one field determines the value in another field in the same record.​

Functional dependency

Which of the following is NOT part of a multilayer object-oriented design (OOD)?

Functional module

​the longest path through the network

Given a project schedule with all tasks connected with one-way arrows and task durations. The critical path is _____.​

the longest path through the network

Given a project schedule with all tasks connected with one-way arrows and task durations. The critical path is _______________?

Technology Architecture

HARDWARE and NETWORKS?

A protocol that defines the structure and content of a web page is called _____ _____ _____.

HTML (Hypertext Markup Language)

What is the latest version of HTML?​

HTML5

A _______ contains both global and local schemas with distinct DBMSs?

Heterogeneous distributed database

What does HTML stand for?

Hypertext Markup Language

A protocol that defines the format and content of Web requests and data communication is called _____ _____ _____.

Hypertext Transfer Protocol

What does HTTP stand for?​

Hypertext Transfer Protocol

What can be said about the following relational database table (key is bold): *CourseSectionID, StudentID*, Grade, StudentName

In First Normal Form

product owner

In Scrum, the ____ maintains the product backlog list.​

the associated tables

In a MANY-TO-MANY association, the PRIMARY KEY of the created table consists of?

False

In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.​

True

In a client/server configuration, it is possible for a single software component to be both client and server.​

Domain Layer

In a three-layer architecture, another name for the business logic layer is what?

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

What term is used to describe a design principle in which an intermediate class is placed between two classes to decouple them but still link them?

Indirection

Which of the following is NOT an Agile Modeling principle?

Maintain core models to verify past decisions


संबंधित स्टडी सेट्स

Promulgated Contracts Test Questions

View Set

TX Govt CH.4 The Executive Department

View Set

Anatomy and Physiology ( Skeletal System)

View Set

Social Problems 13th Movie: Final

View Set

Practice Questions for Last Five Weeks of Material

View Set