System Analysis and Design Chapters 4, 5, 6 review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

On an activity diagram, which of the following is NOT a valid use of a synchronization bar?​

To initiate alternative paths

What is the primary purpose of the CRUD technique?

To validate the set of defined use cases

A big part of describing the environment is identifying and defining all the types of computing devices that will be required.​

True

A class of objects is equivalent to a set of objects.​

True

A composite object only exist as part of a whole-part relationship.​

True

A loop frame and an asterisk mean the same thing in a sequence diagram.​

True

A package diagram is useful to document the various subsystems in a system.

True

A semantic net illustrates individual objects within a class diagram.​

True

A superclass only exists as part of a generalization/specialization.​

True

An Opt frame and a true/false condition on a message serve essentially the same purpose.​

True

An activity diagram and the flow of activities in a fully developed use case description serve the same purpose.​

True

An actor is always outside of the automation boundary.​

True

An objective of security controls is to maintain a stable operating environment for users.

True

An oval indicates an embedded use case inside of an activity diagram.​

True

Attributes can sometimes be combined together to form a larger group.​

True

Designing a single user interface is now the exception, not the norm.​

True

During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

True

Every state-machine diagram must have both origin states and destination states.

True

In a sequence diagram, a message is considered to be an action that is invoked on the destination object.

True

In an activity diagram, a separate use case may used as part of the workflow.​

True

In an interaction diagram, messages are sent and received by individual objects, not by classes.​

True

In generalization/specialization the objects in a subclass are always also contained in the parent class.​

True

In the object-oriented approach to systems development, the flow of information is achieved by sending messages either to and from actors or back and forth between internal objects.​

True

In user interface design the detailed screen layouts should be done after the devices have been decided.​

True

In using the CRUD technique, new use cases and new stakeholders may be identified.

True

On a sequence diagram, a message represents a service request.​

True

One of the first steps in designing the application components is to divide the software into subsystems.​

True

Security design and encryption issues are addressed during database design.

True

Synchronization bars are used to indicate looping in an activity diagram.

True

The CRUD technique can be used to identify new use cases as well as delete unnecessary use cases.​

True

The key question to answer with the design of the user interface activity is, "How will the users interact with the system?"​

True

The majority of new systems today must be integrated into existing networks without disrupting existing applications.

True

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.

True

The output of the design activities is a set of diagrams and documents that describe the solution system.​

True

____ is used to describe the relationship between two things of the same type, such as one person being married to another person.​

Unary association

Which of the following really is both an analysis (discovery) and a design process (solution).

User interface design

In a fully developed use case description the exception conditions represent what?

What conditions prevent the system from successfully completing the use case.

In a fully developed use case description normally the preconditions describe what?​

What objects must exist prior to the use case executes.

The guard-condition on a transition indicates what?​

Whether the transition fires.

In a generalization/specialization relationship, it would not make sense for a class at the bottom of the hierarchy to be a ______ class.​

abstract

A ______ control restricts which persons or programs can add, modify or view information.

access

A ____________________ is the list of users who have rights to access the system and data.​

access control list

In UML terminology in a sequence diagram, a message refers to a _______.​

action

In a transition label in a state machine the syntax is A(B)[C]/D. The D stands for what?

action expression

The diagram model that is useful to document the flow of activities on a fully developed use case description is called a _______ diagram.

activity

In UML the constraint denoted by "0..*" indicates what?

an optional relationship

A major comparison between analysis and design can be stated as:​

analysis is understanding, design is solution

A class that represents a many-to-many association between two other classes is called a ____ class.​

association

A descriptive piece of information about a thing or object is called a _______.​

attribute

A piece of information about a particular object is called a _______.

attribute

A technique to identify problem domain objects in which developers and users work together in an open group setting is called the _______ .​

brainstorming technique

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.

brainstorming technique

The objective of Implementation is to

build a new system

When words are concatenated together to form a single word and the first letter of each is capitalized it is called _______ notation.​

camelcase

The crows feet notation on an ERD is a type of _______ constraint.

cardinality

The number of associations that occur among specific things in an entity relationship diagram is called ____.

cardinality

Inheritance describes a condition between classes where _______.​

classes share some attributes

If we modeled a "sale" and the "sale items" with a whole-part relationship, it would best be described as a _______ relationship.​

composite

A type of relationship where between classes where the objects in one class are a part of the objects in another class AND they can only exist as part of the totality.

composition

An attribute that contains a collection of related attributes is called a _______.​

compound attribute

In a state machine diagram when an object is in multiple states at the same time it is called _________.​

concurrency

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.​

field combination

A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.​

fraud triangle

In a relationship where there are superclasses and subclasses, the relationship is called a _______ relationship.​

generalization/specialization

Which of the following is NOT considered a design model?

Activity diagram

In a fully developed use case description, the flow of activities is most similar to what?​

An activity diagram

On an SSD, a named rectangular box represents what?​

An object

Two methods to show a repeating message are: (Choose two)

Asterisk *, Loop frame

____________________ is the process of identifying a user to verify that he or she can have access to the system.​

Authentication

_______ is the process of allowing or restricting a specific user's access to specific resources.​

Authorization

Which of the following is NOT a factor that affects the risk of fraud?​

Authorization of users

A technique that is used to validate the set of use cases against identified classes is called __________ technique.

CRUD

Which model is most useful in developing a State Machine Diagram

Class Diagram

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​

Completeness control

The idea that the attributes of a superclass are also attributes of a subclass is called ______.​

inheritance

A ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

integrity

An attribute for an object which can be used to uniquely identify that object is called a _______.​

key

An attribute whose value uniquely identifies an object is called a _______.​

key attribute

On a sequence diagram when multiple messages are included within a repeating loop a _______ is used to document it.​

loop frame

The technique for finding problem domain objects by finding and listing all the nouns in a dialog or description is called the _______.​

noun technique

A box in a system sequence diagram refers to a what?​

object

CRUD stands for _______________.​

Create, Read, Update, Delete

Two methods to show a return value are: (Choose two)

Dashed arrow with value,value :=

What is the name of a general control technique used to ensure that entered data is correct?

Data validation control

The domain model is always used as an input to which design activity?

Database design

The design activity key question, "How will this system interact with other systems..." is part of which design activity?

Describe the environment

Software methods are usually identified in which design model?​

Design class diagram

Build or buy questions are usually addressed during which design activity?

Design the application components

Which of the following is not one of the design activities included in the Design System Components core process?​

Design the security controls

Which is NOT an objective of integrity controls?

Ensure a stable functioning operating environment

Which of the following is NOT a step in the development of a state machine diagram?

Expand the name of each state to identify concurrent activities.

What are two key elements of describing the environment?

External systems and technology architecture

A good way to describe a use case scenario is with a state chart.

False

To show a set of messages that may be optional a __________ is used.

opt frame

In a state machine diagram, a state is represented by a _______.

oval

A true/false condition on a message indicates the condition of the return value of the message, i.e. whether the message was successful or not.​

False

A true/false condition on a sequence diagram indicates whether the message can be processed or not.​

False

Activity diagrams are not helpful in developing system sequence diagrams (SSDs).

False

Activity diagrams cannot be used to describe processes that involve automated system activities.​

False

Attributes are part of a UML class diagram, but not included in ERD diagrams.

False

Completeness control is an integrity control that identifies when a value in a field is too large or too small.​

False

Cowboy coding is one of the newer techniques programming, often used with Agile techniques.

False

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.

False

Database design often requires someone with analysis skills since many decisions must be made about the field sizes and characteristics.

False

Defining the technology architecture is part of the activity to Design the application components.​

False

Each concurrent path in a state-machine diagram will contain multiple states.​

False

In UML a zero to many multiplicity constraint is shown with a "O" and crows feet on the line.​

False

In a system sequence diagram a box refers to a class of objects.​

False

In a system sequence diagram the order of the messages is determined by numbering the messages.

False

Information for Use Case Descriptions is primarily derived from System Sequence Diagrams.​

False

It is just as important to have heavy user involvement during analysis as it is during design.​

False

Model building is a unique to Systems Analysis.​

False

One of the disadvantages of UML and object-oriented models is the difficulty of synchronizing the models.​

False

Package diagrams are used primarily when designing the software classes.

False

Prototypes and mock-ups are most useful in doing the design of the software classes.

False

Since the design activities all interact with each other, it really doesn't matter which activity occurs first.

False

Symmetric key encryption uses a public key and a private key.​

False

The best use of the CRUD technique is used to generate new use cases.

False

The cardinality of a class is a measure of the number of objects in the class.​

False

The noun technique can be thought of as a variation of the brainstorming technique.​

False

The primary purpose of integrity controls is to track external activity.

False

The project plan is required to get the project approved.

False

Two difference scenarios of a use case would normally be described in a single fully developed use case description.​

False

According to an Agile iterative development process in which iteration would design activities normally start?​

First iteration

On an Activity Diagram the arrows represent what?​

Flow of activities

In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter D represents what?

parameter list

A certain set of values or statuses that must exist after a use case completes its processing is called a _______.​

postcondition

A certain set of values or statuses that must exist before a use case begins is called a _______.

precondition

When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a ____ key.

private

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​

privileged user

The specific area of the user's business need that is within the scope of the new system is called the _______.​

problem domain

The beginning state of an object when its states are diagrammed is called a ___________.​

pseudostate

In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter B represents what?

return value

A unique set of internal activities within a use case which represents a unique path through the use case is called a _______.

scenario

Use cases may have different "paths" or sequence of steps through the use case. These different paths are called _______.

scenario

A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.​

security

A UML diagram that shows the life of an object in states and transitions is called a __________.​

state machine

For real-world objects the state of an object is the same as its _______.

status condition

On an activity diagram, what are the vertical rectangles that contain the activity ovals called?

swim lanes

In ____________________ encryption, the same key encrypts and decrypts the data.

symmetric

The symbol that is used to initiate concurrent paths in a state machine diagram is what?​

synchronization bar

A diagram that shows the messages between an actor and the system is called a _______.

system sequence diagram

A good way to ensure that all the use cases have been identified is through _______________.​

the CRUD technique

Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to _______.

tie the exception condition to a processing step

The movement of an object from one state to another is done through the process of a ___________.​

transition

Which of the following is NOT an element in a transition label?

trigger

The following is the message syntax for an SSD. "[ _________ ] return-value := message-name (parameter-list)" What is missing?

true/false condition

Three types of users that are considered in the design of a security system are ____.​

unauthorized user, registered user, and privileged user

An application component can be thought of as a __________

unit of software

A textual model that describes the processing details of a use case is called a ________.

use case description

The ____ are the primary models from which other models draw information.​

use case diagram and the problem domain class diagram

A control that checks the value of a field to ensure that it is within the correct range is a _______ control.​

value limit

In a sequence diagram the message-name is usually given in what format?​

verb-noun

Using digital signatures is primarily a technique to ____.​

verifying who sent a document

The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?

​Design the software classes

In a fully developed use case description the postcondition data describes what conditions?

​The existence of domain model objects.

In a sequence diagram a horizontal dashed line represents what?​

A return message

Which of the following is NOT a valid construct as part of an activity diagram?

Relationship line

On an SSD, a dashed arrow usually represents what?

Return value(s)

If the True/False condition on a message evaluates to false in a sequence diagram, which of the following is correct?​

The message is not sent

​A vehicle object is denoted with the following label.

:Vehicle _______

When analyzing the list of nouns to determine whether to EXCLUDE a particular noun as an important "thing," which of the following questions should be asked about the noun? (choose two)

Is it a synonym of an existing thing? Is it an output from the system?

When analyzing the list of nouns to determine whether to INCLUDE a particular noun as an important "thing," which of the following questions should be asked about the noun?

Is it unique? Are there multiple instances of it?

When describing the interfaces to external systems, which is not one of the important issues?​

Programming languages

Which user is known to the system and is authorized to access all or certain parts of it?​

Registered user

Limiting user access to the system is considered what type of design activity?​

Security and controls design

Which design activity that pervades all other design activities?​

Security and controls design

When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions?​

Should it be researched further?

Activity diagrams are useful in the development of ______________.

System Sequence Diagrams

Which of the following is the best model to use to document the inputs and the outputs to a system?​

System Sequence Diagrams

Which of the following can be classified as privileged users?​

System programmers, application programmers, and system administrators

On a systems sequence diagram, ____ indicate(s) a true/false condition.​

[]

Which of the following is NOT an advantage of object-oriented modeling with several models is that _____.​

developing new models allows the analyst to discard unnecessary diagrams.

A ____ is an institution's name and public key, which is encrypted and certified by a third party.​

digital certificate

The encoding of a message with a private key is called ____________________.​

digital signature

A type of relationship where between classes where the objects in one class are a part of the objects in another class BUT they can also exist as separate objects alone.​

aggregation

To show if-then-else condition on a sequence diagram use a ______.

alt frame

A term in UML that describes a naturally occurring relationship between specific things is called a _______.​

association

An association that is also treated as a class is called a _______.

association class

On a sequence diagram a short notation that indicates a repeating message is a _______.​

asterisk

In the traditional approach to system development, the system stores information about ____.​

data entities

When an object moves from one state to another the ending state is a called a __________.

destination state

Vertical dashed lines on a system sequence diagram are used to depict a what?

lifeline

A relationship that has a cardinality constraint of one or more is a _______ relationship.

mandatory

An association class is frequently required for what kind of relationship?

many to many

An arrow on a system sequence diagram is used to depict a what?​

message

A synonym for cardinality (used with UML class diagrams) is ____.​

multiplicity

In UML notation for object-oriented approach the term _______ is used instead of cardinality.​

multiplicity

One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called the _______.​

noun technique

A sequential set of connected states and transitions is called a _______________.​

path

A drawing which shows individual objects and their links with other objects, and which is used to help understand the problem domain classes is called a _______ .​

semantic net

An example of an attribute of an object might be _______.​

social security number

A condition during an object's life when it satisfies some criterion is called a ______.​

state

The general relationship between classes in which one class is a part or component of another class is called a _______ relationship.​

whole-part

The action-expression occurs when?​

​Before the object enters the destination state.

A relationship between a "sports team" and the players, coaches, and sponsor would be described as what kind of relationship?​

Aggregation

A state-machine diagram is usually developed for every class in the problem domain class diagram.​

False

Activity diagrams are not helpful when the flow of activities is too complex.​

False

An Opt frame and an Alt frame do essentially the same thing.​

False

An abstract class is used to describe a "thing" that is abstract, i.e. not tangible.

False

On an activity diagram, the diamond represents an "AND" condition.​

False

Two techniques to identify things in the problem domain are the noun technique and the verb technique.

False

When identifying things in the problem domain, an analyst should focus primarily on tangible things about which information is required.​

False

_____ is based on the idea that people classify things in terms of similarities and differences.​

Generalization/Specialization

_______ is used to describe the actual range of linkups allowed in an association (the minimum and maximum values).​

Multiplicity Constraints

When using the brainstorming technique it is often helpful to think about each use case and talking to users.

True

When using the noun technique, the analyst begins by listing all the nouns that the users mention.

True


Set pelajaran terkait

BUS 346 Chapter 10, BUS 346 Ch 8, chapter 8 marketing, Exam 3

View Set

chapter 10 (psychology of aging)

View Set

German tenses (Present, Past, Future + "can" with 'ich')

View Set

Chapter 6: Learning - Application

View Set