Ch. 9 True/ False, Chapter 9, System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_1
A design class diagram is also called a data model
False
A lifeline indicates when a method is executing for a destination object
False
A local business office with a small database which is only used by two or three users would most probably implement a desktop DBMS
False
A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment
False
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.
False
A three-layer architecture requires at least three computers to be implemented correctly
False
A timeline on a communication diagram indicates the sequence of the messages
False
An object-oriented program consists of a set of object classes that work together to process an input message
False
Another term for a network diagram is a deployment diagram
False
Application software that usually executes with a browser is often just called an "app".
False
Dependency relationships cannot exist between classes within packages
False
Design class diagrams and interaction diagrams should be developed independent of each other
False
Design using CRC cards does not require the use of a design class diagram.
False
Every table in a relational database must have a foreign key.
False
In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class
False
In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.
False
In generalization/specialization the attributes (but not the associations) of the subclass are inherited from the superclass
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
False
Including a total amount field as the sum of other fields in a table is a violation of second normal form.
False
It is usually a bad idea to try to include user-interface classes to a CRC design
False
On a sequence diagram the messages are numbered to indicate the order of firing
False
One type of design class stereotype is called a "concrete class" because it can be instantiated
False
Problem domain modeling and database normalization are incompatible techniques for relational database design.
False
Relationships in a relational database are usually represented by embedding a foreign key in each participating table
False
Relationships in a relational database are usually represented by embedding a foreign key in each participating table.
False
Since the design activities all interact with each other, it really doesn't matter which activity occurs first
False
Symmetric key encryption uses a public key and a private key
False
The Internet and the WWW are synonyms
False
The Web is the highway over which messages and information travel from network to network
False
The controller object is usually part of view layer
False
The domain data in a database is sometimes referred to as metadata.
False
The first-cut DCD includes method signatures
False
The initial version of a communication diagram contains view layer and business layer
False
The objective of object-oriented analysis is to identify the objects that must work together to carry out each use case
False
The perfect memory assumption means that there is always adequate memory to execute the program
False
There are two preferred methods to accessing the database. One is to have newly instantiated object call the data access object. The other is to let the controller access the data access object
False
To ensure that the database is designed correctly, an important member of the project team is the data administrator
False
7. A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.
First
Which is a valid sequence of modeling steps for designing a use case?
First cut DCD, Communication diagram, Final DCD, Package Diagram
According to an Agile iterative development process in which iteration would design activities normally start
First iteration
False
For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.
___________ is where the value in one field determines the value in another field in the same record.
Functional dependency
Which of the following is NOT part of a multilayer object-oriented design (OOD)?
Functional module
Each class on an class diagram is represented by a(n) ____ in a relational database.
Table
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table
True
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.
True
A network diagram is a useful model to show three/layer architecture
True
A relational database management system stores data in tables
True
A relational database management system stores data in tables.
True
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field
True
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.
True
Adding a use case controller to a sequence diagram is an example of applying a design pattern
True
An objective of security controls is to maintain a stable operating environment for users
True
Another name for the data model is the domain model
True
Both a communication diagram and a sequence diagram have the same purpose and provide basically the same information
True
Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.
True
Designing a single user interface is now the exception, not the norm.
True
Detailed Object-oriented design (OOD) is done on a use case-by-use case basis
True
Every database in a DBMS consists of two separate data stores
True
In an iterative approach to software development, it is usually best to develop the database in the first few iterations.
True
It is better to have the data access object create a new object when multiple objects may be created.
True
Navigation visibility may be bidirectional
True
On a sequence diagram, view layer objects send messages to the controller
True
Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.
True
Relationships between tables is usually indicated through the use of a foreign key.
True
The Internet can be thought of as the network of networks
True
The majority of new systems today must be integrated into existing networks without disrupting existing applications
True
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction
True
The objective of object-oriented design is to identify and specify all the classes and messages that work together to carry out each use case
True
The output of the design activities is a set of diagrams and documents that describe the solution system
True
The starting point for identifying messages in detailed design of a use case is always the SSD
True
A function or service that is called from a Web application to another Web application is called a(n) ________.
Web service
A function or service that is called from a Web application to another Web application is called a(n) ________.
Web service
Hypertext Transfer Protocol
What does HTTP stand for?
Local Area Network
What does LAN stand for?
Software as a Service
What does SaaS stand for?
Extensible Markup Language
What does XML stand for?
A Server Computer
What is a computer that manages shared resources for access across a network called?
HTTP is less secure, while HTTPS would be used for credit card transactions.
What is the difference between HTTP and HTTPS?
HTML5
What is the latest version of HTML? (As of 2016)
The set of world wide resources that are available over the Internet.
When you use the term "Web", what is the correct definition?
The objective of Implementation is to -complete the specifications - integrate the application components - build a new system - install a new system
build a new system
In a three-layer architecture, the application server would be part of which layer?
business logic layer
According to an Agile iterative development process in which iteration would implementation activities normally start? -Second iteration -Pre-project activities -First iteration -Sometime after the first iteration
first
6. Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.
normalization
A formal technique for transforming a relational schema to an equivalent one that eliminates data anomalies is called _______.
normalization
An object-oriented program consists of a set of computing ______.
objects
8. A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.
primitive
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key
private
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a(n) ____ key. -asymmetric - private - public -symmetric
private
A user who has special security and access to a system, such as the right to assign passwords, is called a ____. -database administrator -technical user -supervisor user - privileged user
privileged user
15. A technique where all updates to a database are recorded with who, when, and how information is called ________.
transaction logging
A big part of describing the environment is identifying and defining all the types of computing devices that will be required.
true
An objective of security controls is to maintain a stable operating environment for users.
true
During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
true
In user interface design the detailed screen layouts should be done after the devices have been decided.
true
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.
true
The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.
true/false condition
In a relational database, a row can be referred to as a(n)
tuple
After completing a use-case design using CRC cards, the next step is to _______.
update the design class diagram
When there is a piece of work or an action that includes several steps and updates to the data and which all must complete to be valid, that piece or work is called a(n) _______.
transaction
When describing the interfaces to external systems, which is not one of the important issues
Programming languages
When describing the interfaces to external systems, which is not one of the important issues? -Network addresses -Programming languages - Error handling -Message formats
Programming languages
5. A(n) ____ is a field or set of fields used to uniquely identify each row. a. primary key c. object identifier b. foreign key d. attribute
A
Which analysis model serves as an input model to a design class diagram?
Domain model class diagram
38. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document
A
Three layer architecture
A client/server architecture that divides an application into view, business logic and data layers is called what?
Server
A computer that manages shared resources and allows users to access those resources over a network is called a what?
Which of the following is included in the top compartment of a design class?
Stereotype name
3. In a relational database, a row can be referred to as a(n) ____. a. field c. attribute b. tuple d. relation
B
36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with a(n) ____ key. a. asymmetric c. public b. private d. symmetric
B
37. A ____ is an institution's name and public key, which is encrypted and certified by a third party. a. private key c. certifying authority b. digital certificate d. digital key
B
4. Data elements in a relational database are organized into ____. a. attributes c. tables b. objects d. tuples
C
14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns. a. first c. third b. second d. fourth
A
2. Which of the following is NOT a component or function of a typical database management system (DBMS)? a. Low-level process management c. Application program interface b. End-user query processor d. Administrative interface
A
20. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based
A
21. A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure. a. single c. partitioned b. replicated d. cloud-based
A
30. What is the name of a general control technique used to ensure that entered data is correct? a. Data validation control c. Data acceptance control b. Data access control d. Data completeness control
A
35. Which of the following can be classified as privileged users? a. System programmers, application programmers, and system administrators b. Technical users and security personnel c. System operators and clerks d. Administrators and accountants
A
1. List and briefly describe the four components of a database management system.
1. Application Program Interface -- allows programming language interface to write scripts and logic to produce results based on complex logic. 2. End-user query processor -- this provides the SQL statements to query and update the database. 3. Administrative interface -- provides the functionality to create the schema and change the database configuration parameters. 4. Database access and control logic -- this is the actual DB engine which updates the database and retrieves results.
3. List and briefly describe the four types of database server architecture described in the textbook.
1. Single database server architecture —One or more databases are hosted by a single DBMS running on a single server. 2. Replicated database server architecture —Complete database copies are hosted by cooperating DBMSs running on multiple servers. The servers are usually distributed across geographic locations. 3. Partitioned database server architecture —Multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers. 4. Cloud-based database server architecture —This architecture isn't really a separate architecture. Rather, it is a specific implementation of one or more of the other architectures by using the services of a cloud computing provider.
6. ____ are a critical element of relational database design because they are the bases for representing relationships among tables. a. Keys c. Fields b. Attributes d. Tables
A
7. One column of a table in a relational database is called a(n) ____. a. attribute c. tuple b. relation d. element
A
Protocol
A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.
Microsoft SQL Server is an example of what?
A database management system
Microsoft SQL Server is an example of what?
A database management system
Network diagram
A diagram that shows how hardware components are interconnected with devices and cabling is called a what?
False
A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.
Client/Server Architecture
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?
False
A network diagram and a location diagram show basically the same information but in a different format.
Hypertext Markup Language
A protocol that defines the structure and content of a web page is called what?
Virtual Private Network (VPN)
A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?
What is a computer that manages shared resources for access across a network called?
A server computer
Three-layer architecture
A software architecture that divides an application into view, business logic, and data is called what?
Web service
A software function or set of functions or services that can be executed via Web protocols is called a what?
False
A three-layer architecture requires at least three computers to be implemented correctly.
What is the difference between HTTP and HTTPS?
Amazon uses HTTPS for credit card information
Web-based Application
An application that uses a browser for the user interface.
4. Explain how a digital certificate works.
An entity who wants a certificate with its name and public key goes to a certifying authority and buys a certificate. The certifying authority encrypts the data with its own private key and gives the data back to the original entity. When someone asks the entity for its public key, it sends the certificate. The customer receives the certificate and opens it with the certifying authority's public key.
33. Which user is known to the system and is authorized to access all or certain parts of it? a. Authorized user c. Valid user b. Registered user d. Authenticated user
B
False
Application software that usually executes with a browser is often just called an "App".
Object classes that are created during design to facilitate the final solution, but are not part of the problem domain are sometimes referred to as ______ ______.
Artifacts
19. _______ is the process of allowing or restricting a specific user's access to specific resources.
Authorization
13. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user
B
16. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth
B
23. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based
B
25. A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups. a. single c. replicated b. partitioned d. cloud-based
B
27. An integrity control that verifies the data in one field against the data in other fields is called a ____ control. a. completeness c. value b. field combination d. data validation
B
8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table. a. primary key c. object identifier b. foreign key d. column
B
1. A(n) ____ describes the structure, content, and access controls of a physical data store or database. a. relation c. schema b. DBMS d. attribute
C
10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique. a. columns c. rows b. foreign keys d. values
C
11. An separate relation must be created to store the attributes of a ____ relationship among two other classes. a. one-to-one c. many-to-many b. one-to-many d. not any (not necessary)
C
17. A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.
C
19. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form
C
22. A ____ database server architecture stores different parts of a database on different servers. a. single c. partitioned b. replicated d. cloud-based
C
24. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive
C
28. What is a control that checks the value of a field to ensure that it is within the correct range? a. Answer control c. Value limit control b. Completeness control d. High-low control
C
32. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user
C
34. A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. supervisor user c. privileged user b. database administrator d. technical user
C
9. Each class on an class diagram is represented by a(n) ____ in a relational database. a. attribute c. table b. row d. column
C
______ ______ ______ is a query language used to access and update the data in a relational database.
structured query language
CRC stands for what?
Class responsibility collaboration
The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.
Class-Level Attribute
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
Completeness control
True
Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.
. _______ is a qualitative measure of how closely the classes in a design class diagram are linked together.
Coupling
12. ____ is a consistent relational database state in which every foreign key value also exists as a primary key value. a. First normal form (1NF) c. Function dependency b. Database synchronization d. Referential integrity
D
15. ____ is a one-to-one correspondence between two field values. a. First normal form c. Referential integrity b. Second normal form d. Functional dependency
D
26. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment
D
29. What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? a. Secure control c. Comprehensive control b. Total control d. Completeness control
D
31. Which of the following is NOT a factor that affects the risk of fraud? a. Separation of duties c. Asset reconciliation b. Monitoring d. Authorization of users
D
What is the name of a general control technique used to ensure that entered data is correct? -Data validation control -Data completeness control -Data access control -Data acceptance control
Data Validation control
What is the least cohesive approach in creating use case controllers in a system?
Define a single controller for all use cases.
True
Describing the environment is one of the detailed activities of core process 4: Design system components.
A primary model used in software design is which of the following
Design class diagram
Software methods are usually identified in which design model
Design class diagram
Which of the following is NOT one of the activities of Core Process 4: Design system components?
Design security and integrity controls
Which of the following is not one of the design activities included in the Design System Components core process?
Design the security controls
The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity? -Design the user interface -Design the application components -Design the software classes -Describe the environment
Design the software classes
A deployment diagram is most useful for which design activity? -Designing the user interface -Designing software classes -Describing the environment -Designing application components
Designing application component
A deployment diagram is most useful for which design activity
Designing application components
A knowledge of all the computing devices accessed by clients is required for which design activity?
Designing the user interface
Which is NOT one of the responsibilities of the database administrator?
Determine data confidentiality
Which is NOT an objective of integrity controls? -Ensure that transactions are recorded completely - Ensure a stable functioning operating environment - Protect the assets of the organization -Allow only valid business transactions
Ensure a stable functioning operating environment
A toolbar might be considered an example of what?
Embedded Software
Which is NOT an objective of integrity controls?
Ensure a stable functioning operating environment
What does XML stand for?
Extensible Markup Language
What does XML stand for?
Extensible markup language
The activity of Describing the Environment consists of what two key elements
External systems and technology architecture
The activity of Describing the Environment consists of what two key elements?
External systems and technology architecture
A protocol that defines the structure and content of a web page is called _____ _____ _____.
HTML (Hypertext Markup Language)
What is the latest version of HTML?
HTML5
A _______ contains both global and local schemas with distinct DBMSs?
Heterogeneous distributed database
What does HTML stand for?
Hypertext Markup Language
A protocol that defines the format and content of Web requests and data communication is called _____ _____ _____.
Hypertext Transfer Protocol
What does HTTP stand for?
Hypertext Transfer Protocol
What can be said about the following relational database table (key is bold): *CourseSectionID, StudentID*, Grade, StudentName
In First Normal Form
False
In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.
True
In a client/server configuration, it is possible for a single software component to be both client and server.
Domain Layer
In a three-layer architecture, another name for the business logic layer is what?
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
What term is used to describe a design principle in which an intermediate class is placed between two classes to decouple them but still link them?
Indirection
What do we call the notation that shows all the information required to call or invoke a method?
Method signature
Which of the following is usually NOT included in a first-cut design class diagram? a.Initial value information for attributes b.Attribute types c. Method signatures d.Navigation visibility arrows
Method signatures
System software usually refers to what kind of software?
Operating systems and web servers
If you are doing detailed design for the use case Create New Order, which class should receive the first input? (Order Transaction, Order, Order Handler, Customer)
Order Handler
A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?
Protection from variations
What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?
Protection from variations
5. _________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.
Referential integrity
2. What danger(s) is/are inherent in using keys invented by external agents as primary keys in a relational database?
Referential integrity depends on primary key uniqueness. By using key values assigned by external entities, an organization risks the possibility that referential integrity may be broken at some time in the future (e.g., duplicate shipment tracking numbers from competing shipping companies
Which user is known to the system and is authorized to access all or certain parts of it? -Registered user -Authorized user - Valid user -Authenticated user
Registered user
1. A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.
Schema
Limiting user access to the system is considered what type of design activity?
Security and controls design
Which design activity that pervades all other design activities
Security and controls design
Which design activity that pervades all other design activities? -Environment design -Database design -Interface design -Security and controls design
Security and controls design
10. _______ database server architecture is poorly suited to applications that must be available on a seven-day, 24-hour basis.
Single
What does SaaS stand for?
Software as a Service
System Software
Software, such as Web server software, and works behind the scenes is called what?
Which of the following can be classified as privileged users A) System programmers, application programmers, and system administrators B) Technical users and security personnel C)System operators and clerks D) Administrators and accountants
System programmers, application programmers, and system administrators
Which of the following is NOT one of the design models used for object-oriented design a. Communication diagram b. System sequence diagram c. CRC cards d. Design class diagram
System sequence diagram
Which of the following is a type of model used in user interface design? -System sequence diagram -Activity Diagram -Communication diagram -Class diagram
System sequence diagram
True
The Internet can be thought of as the network of networks.
False
The Web is the highway over which messages and information travel from network to network.
Interoperability
The ability of a component or system to interact with other components or systems is referred to as what?
External systems and technology architecture.
The activity of Describing the Environment consists of what two key elements?
Internet Backbone Network
The high-speed, high capacity network that interconnects regions, countries, and continents.
What is the best coupling choice for an input window, domain, and database object in a system?
The input window is coupled to the domain and the domain is coupled to the database.
False
The primary benefit of a network diagram, is to show the network cabling and the network routers.
Given the following URL, what is the correct description of the portion shown in bold? https://*www.reddit.com*/r/The_Donald/
The server name
Given the following URL, what is the correct description of the portion shown in bold? http://www.barnesandnoble.com/u/books-best selling-books/379003057
The server name
Technology Architecture
The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?
Technology Architecture
The set of computing hardware, network hardware and system software used by an organization is called the what?
Application Architecture
The set of information systems the organization needs to support its operations is often called the what?
Application Architecture
The set of information systems the organization needs to support its operations.
World Wide Web
The set of resources that can be accessed over the Internet is referred to what?
When we use the term the Web what is the correct definition?
The set of world wide resources that are available over the Internet
The identifier of a Web resource and which defines a protocol, a server or domain name, and a resource identifier is called a(n)
Uniform Resource Locator
___ methods must be included in a design class diagram
Use case specific
Which of the following really is both an analysis (discovery) and a design process (solution).
User interface design
Web-based application is software with the following characteristics:
Uses a browser and web-server
Which of the following is NOT a valid Web protocol?
VPN
Which of the following is not a valid Web protocol? a. VPN b. HTTPS c. HTML d. XML
VPN (This question is stupid)
What is the correct syntax notation for a message on a communication diagram
[t/f condition] seq-numb: ret-value := msg-name (para-list)
A personal computing device includes all of the following except ______.
a router
14. A(n) ______ control restricts which persons or programs can add, modify or view information.
access
A(n) ______ control restricts which persons or programs can add, modify or view information.
access
20. A(n) ____________________ is the list of users who have rights to access the system and data.
access control list
A(n) ____________________ is the list of users who have rights to access the system and data.
access control list
Which of the following is NOT considered a design model? -Sequence diagram -User interface screen layouts -Activity diagram -Package diagram
activity diagram
High coupling ____ in a system
adds complexity
A major comparison between analsys and design can be stated as:
analysis is understanding, design is solution
A major comparison between analsys and design can be stated as: -analysis is understanding, design is solution -analysis is complex, design is simpler -analysis includes users, design does not -analysis builds models, design does not
analysis is understanding, design is solution
The set of information systems the organization needs to support its operations is often called the ______ ______.
application architecture
A well-defined unit of software built to perform some specific tasks is called a(n) _____________.
application component
In a database table a column is the same thing as a(n) ______.
attribute field
18. ____________________ is the process of identifying a user to verify that he or she can have access to the system.
authentication
Which of the following is NOT a factor that affects the risk of fraud? -Asset reconciliation -Monitoring -Separation of duties -Authorization of users
authorization of users
The objective of Implementation is to
build a new system
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called ________.
client/server architecture
A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a(n) _______ diagram
communication
9. A data type that is defined by extending or combining other data types is called a(n) ______ data type.
complex
A data type that is defined by extending or combining other data types is called a(n) ______ data type.
complex
A(n) ____ class acts as a switchboard between the view layer and the domain layer
controller
The _________________ pattern is a based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.
controller
11. When it is necessary to update one database copy with changes made to the other database, it is called _________.
database Synchronization
The person who is in charge of the safety and operation of the DBMS is called the _____ _____.
database administrator
The domain model is always used as an input to which design activity? -Security and controls design -Application Component Design -User Interface Design - Database design
database design
Referential integrity is normally enforced by the ____.
database management system
A database that is stored at multiple locations but which does not need to be interconnected or synchronized is called a(n) ______ ______.
decentralized database
The model that best shows how software components are distributed across hardware components is the ________.
deployment diagram
The design activity key question, "How will this system interact with other systems..." is part of which design activity? -Design the interfaces -Design the application components -Describe the environment -Design security controls
describe the environment
The main purpose of a(n) ______ ______ diagram is to document and describe the programming classes that will be built for the new system.
design class
A primary model used in software design is which of the following?
design class diagram
Software methods are usually identified in which design model? -System sequence diagram -Deployment diagram -State-machine diagram -Design class diagram
design class diagram
Which is not a model normally produced as part of application component design
design class diagram
Which is not a model normally produced as part of application component design? -deployment diagram -component diagram - package diagram -design class diagram
design class diagram
A ____ is an institution's name and public key, which is encrypted and certified by a third party
digital certificate
22. The encoding of a message with a private key is called ____________________.
digital signing
The encoding of a message with a private key is called ____________________.
digital signing
In a three-layer architecture, another name for the business logic layer is the ______ ______.
domain layer
A design class diagram is also called a data model.
false
Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.
false
Symmetric key encryption uses a public key and a private key.
false
Which of the following is not a synonym of the others? a. row b. Tuple c. record d. field
field
An integrity control that verifies the data in one field against the data in other fields is called a ____ control
field combination
An integrity control that verifies the data in one field against the data in other fields is called a ____ control. -completeness -value -data validation -field combination
field combination
A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.
first
The perfect technology assumption implies that _______.
issues related to technology are ignored
4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.
foreign key
16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.
fraud triangle
A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.
fraud triangle
In a distributed database when the data is divided so that separate columns of the same table are at distinct locations that is referred to as _________.
horizontal partitioning
When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.
hyperlink
When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.
hyperlink
12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.
integrity
An attribute or set of attributes that uniquely define the rows in a table is called a(n) ______.
key
A separate relation must be created to store the attributes of a ____ relationship among two other classes.
many-to-many
The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.
navigation visibility
A diagram that shows how hardware components are interconnected with devices and cabling is called a(n) ______ _____
network diagram
A(n) ____ is a field or set of fields used to uniquely identify each row.
primary key
In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.
perfect memory assumption
2. A(n) _______ is the database component that actually stores the raw bytes of data.
physical data store
A(n) ____ is a field or set of fields used to uniquely identify each row
primary key
In design class notation, the ____ of an attribute is enclosed in curly braces {}.
property
A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.
protocol
What does SQL stand for?
structured query language
A(n) ____ describes the structure, content, and access controls of a physical data store or database.
schema
17. A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.
security
Limiting user access to the system is considered what type of design activity? -Describing the environment -Security and controls design -Application components design -User interface design
security and control
Communication diagrams indicates the order of the messages with ____.
sequence numbers
A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.
singleton
An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.
software as a service
21. In ____________________ encryption, the same key encrypts and decrypts the data.
symmetric
Software, such as Web server software, and works behind the scenes is called ______ ______.
system software
3. In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.
table
Each class on an class diagram is represented by a(n) ____ in a relational database.
table
Data elements in a relational database are organized into ____.
tables
. The set of computing hardware, network hardware and system software used by an organization is called the _________.
technology architecture
The set of computing hardware, network hardware and system software used by an organization is called the _________.
technology architecture
A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.
third
A client/server architecture that divides an application into view, business logic and data layers is called _____ _____ ______.
three-layer architecture
A software architecture that divides an application into view, business logic, and data is called a(n) ________.
three-layer architecture
Amazon.com is a good example of what kind of architecture?
three-layer architecture
Which of the following really is both an analysis (discovery) and a design process (solution). -User interface design -System interface design -Environment design -Database design
user interface design
13. A control that checks the value of a field to ensure that it is within the correct range is a(n) _______ control.
value limit
What is a control that checks the value of a field to ensure that it is within the correct range? -Answer control -High-low control -Completeness control -Value limit control
value limit control
Using digital signatures is primarily a technique to ____. -verifying who sent a document -allow for remote signatures on official documents -digitize (scan) a signed document -electronically send a signature
verify who sent a doc
A class that is responsible for accessing both the Internet and a database has ____ cohesion
very low
In a three-layer architecture, what are the three layers?
view layer, business logic layer, and data layer
User interface objects in a sequence diagram often are labeled with the stereotype __________?
view or boundary
What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?
visibility
A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______
with the adapter pattern
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? -Completeness control -Total control -Secure control -Comprehensive control
Completeness control
Which of the following is not one of the design activities included in the Design System Components core process? -Describe the environment -Design the software methods - Design the security controls -Design the user interface
Design the security controls
What are two key elements of describing the environment? - Programming language and operating system environment -External systems and technology architecture -Communication protocols and security methods -Hardware configuration and DBMS's
External systems and technology architecture
What is a control that checks the value of a field to ensure that it is within the correct range? -Answer control -High-low control -Value limit control -Completeness control
Value limit control
Which of the following is NOT considered a design model?
activity diagram
The design activity key question, "How will this system interact with other systems..." is part of which design activity?
describe the environment
Which is not a model normally produced as part of application component design?
design class diagram
Build or buy questions are usually addressed during which design activity?
design the application components
A deployment diagram is most useful for which design activity?
designing application components
A knowledge of all the computing devices accessed by clients is required for which design activity?
designing the user interface
Which is NOT an objective of integrity controls?
ensure a stable functioning operating environment
Which user is known to the system and is authorized to access all or certain parts of it?
registered user
Which of the following is a type of model used in user interface design?
system sequence diagram
Three types of users that are considered in the design of a security system are ____.
unauthorized user, registered user, and privileged user