Deck 6: Essentials of Design and the Design Activities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 6: Essentials of Design and the Design Activities
1
Since most newer Web applications use dynamic pages,content delivery networks are going out of use.
False
2
It is just as important to have heavy user involvement during analysis as it is during design.
False
3
Basically,design involves decomposition -- breaking a complex problem into smaller,more understandable components.
False
4
When building systems for Web deployment it is often necessary to build two separate user interface systems.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
It is usually important to distinguish when developers are doing architectural design and when they are doing detailed design.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
The key question to answer with the design of the user interface activity is,"Have we specified in detail how all users will interact with the system?"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
Which one of the six core process can be considered as a "bridge" process.
A)Identify the problem and obtain approval."
B)Discover and understand the details."
C)Design system components."
D)Build, test and integrate system components."
A)Identify the problem and obtain approval."
B)Discover and understand the details."
C)Design system components."
D)Build, test and integrate system components."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
One of the disadvantages of three-layer architecture is that is usually requires multiple computers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Environment design consists of the following:
A)specify the network and hardware linking the system together."
B)describe the computer programs."
C)Design the buildings and facilities such as air conditioning and environmental components."
D)Describe the interfaces that the user and other systems use."
A)specify the network and hardware linking the system together."
B)describe the computer programs."
C)Design the buildings and facilities such as air conditioning and environmental components."
D)Describe the interfaces that the user and other systems use."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
One of the benefits of three-layer architecture is its flexibility.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
A big part of designing the environment is identifying and defining all the types of computing devices that will be required.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
The objective of the design phase is to define,organize,and structure the components of the final solution system that will serve as a blue print for construction.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
The majority of new systems today must be integrated into existing networks without disrupting existing applications.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Designing the application architecture involves specifying in detail how some system activities will actually be carried out.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Cowboy coding is one of the newer techniques programming,often used with Agile techniques.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
The most serious problem with Web based deployment of applications is security.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
During analysis,analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
In user interface design the detailed screen layouts should be done after the communication protocols and devices have been decided.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
The output of the design activities is a set of diagrams and documents that describe the solution system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Architectural design includes the design of specific program details.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is NOT a form of system interface?
A)Turn-around document"
B)File transfer"
C)Function call"
D)Transaction interchange"
A)Turn-around document"
B)File transfer"
C)Function call"
D)Transaction interchange"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
Limiting user access to the system is considered what type of design?
A)User interface design"
B)Security and controls design"
C)System interface design"
D)Application software design"
A)User interface design"
B)Security and controls design"
C)System interface design"
D)Application software design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
The first step in doing software application design is to _______.
A)define the operating environment."
B)identify the approach -- structured or object-oriented."
C)define the programming language to be used."
D)identify the various subsystems and their relationship to each other."
A)define the operating environment."
B)identify the approach -- structured or object-oriented."
C)define the programming language to be used."
D)identify the various subsystems and their relationship to each other."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
The domain model is always used as an input to which design activity?
A)Report layout design"
B)Security and controls design"
C)Database design"
D)User interface design"
A)Report layout design"
B)Security and controls design"
C)Database design"
D)User interface design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is NOT considered a design model?
A)Package diagram"
B)Sequence diagram"
C)User interface screen layouts"
D)Activity diagram"
A)Package diagram"
B)Sequence diagram"
C)User interface screen layouts"
D)Activity diagram"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is NOT an important consideration in database design?
A)Performance issues"
B)Encryption issues"
C)Partitioning issues"
D)Data presentation issues"
A)Performance issues"
B)Encryption issues"
C)Partitioning issues"
D)Data presentation issues"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
What is the difference between a "client" computer and a "server" computer?
A)Location on the network"
B)Computing power that each has"
C)The services that each performs"
D)The connectivity to the Internet"
A)Location on the network"
B)Computing power that each has"
C)The services that each performs"
D)The connectivity to the Internet"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Identifying Extensible Markup Language (XML)tags is often used in what design activity?
A)Web page design"
B)User interface design"
C)System interface design"
D)Application software design"
A)Web page design"
B)User interface design"
C)System interface design"
D)Application software design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
Which if the following is NOT considered part of designing the application architecture and software?
A)Multilayer design"
B)Subsystem definition"
C)Detailed design"
D)Program security design"
A)Multilayer design"
B)Subsystem definition"
C)Detailed design"
D)Program security design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
The key design question,"Have we specified in detail how the users will interact with the system to carry out all the use cases?" is associated with which design activity?
A)Design user interfaces"
B)Design system interfaces"
C)Design application software"
D)Design use cases"
A)Design user interfaces"
B)Design system interfaces"
C)Design application software"
D)Design use cases"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
What is the difference between a browser based system and a desktop application system?
A)Desktop system never uses a network and browser base always does."
B)Browser system always uses the Internet and desktop does not."
C)User interface is different between a desktop and browser based."
D)Browser based is always three-layer and desktop is not."
A)Desktop system never uses a network and browser base always does."
B)Browser system always uses the Internet and desktop does not."
C)User interface is different between a desktop and browser based."
D)Browser based is always three-layer and desktop is not."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Which is not one of the elements that is normally considered in systems design?
A)Application software"
B)System interface"
C)Security and controls"
D)Object class methods"
A)Application software"
B)System interface"
C)Security and controls"
D)Object class methods"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Which is NOT one of the primary advantages of deploying a system via a Web implementation.
A)Easy to program with HTML"
B)Wide availability of the Web"
C)Low-cost connectivity"
D)Standard development and deployment practices"
A)Easy to program with HTML"
B)Wide availability of the Web"
C)Low-cost connectivity"
D)Standard development and deployment practices"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Which design activity that pervades all other design activities?
A)Environment design"
B)Database design"
C)Security and controls design"
D)Interface design"
A)Environment design"
B)Database design"
C)Security and controls design"
D)Interface design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following terms describes computer software that implements communication protocols on the network and helps different systems communicate?
A)Nodes and locations diagram"
B)Virtual environment"
C)Distributed architecture"
D)Middleware"
A)Nodes and locations diagram"
B)Virtual environment"
C)Distributed architecture"
D)Middleware"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is NOT considered an analysis model?
A)Class diagram"
B)State machine diagram"
C)User interface screen layouts"
D)Activity diagram"
A)Class diagram"
B)State machine diagram"
C)User interface screen layouts"
D)Activity diagram"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
Which statement is NOT a correct term for the broad design of the overall system?
A)Architectural design"
B)Conceptual design"
C)General design"
D)Object-oriented design"
A)Architectural design"
B)Conceptual design"
C)General design"
D)Object-oriented design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following really is both an analysis (discovery)and a design process (solution).
A)Environment design"
B)System interface design"
C)Database design"
D)User interface design"
A)Environment design"
B)System interface design"
C)Database design"
D)User interface design"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Low-level design that includes the design of the program modules and algorithm logic is referred to as ____ design.
A)detail"
B)module"
C)functional"
D)component"
A)detail"
B)module"
C)functional"
D)component"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
The first step in defining a solution in the development of a new software system is to define what?
A)The application architecture"
B)The computing environment"
C)The programming language"
D)The details of the business problem"
A)The application architecture"
B)The computing environment"
C)The programming language"
D)The details of the business problem"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
Many Service level agreements now provide _____ availability
A)100%"
B)99%"
C)98%"
D)varies by provider"
A)100%"
B)99%"
C)98%"
D)varies by provider"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
What is the term that defines the foundation protocol of the Internet and is used to provide reliable deliver of messages between computers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
The hosting alternative that is most like a utility is what?
A)Virtual server"
B)Managed services"
C)Cloud computing"
D)Colocation"
A)Virtual server"
B)Managed services"
C)Cloud computing"
D)Colocation"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
When designing the ____________________,the first steps are to identify the general form and structure of the user dialog based on the major inputs and outputs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
What is the term used to describe the user interface in a three-layer architecture?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
Managed services refers to what?
A)Hosting company provides all the server equipment."
B)Hosting service that provides backup and recovery services."
C)Hosting company manages the cloud."
D)Hosting service with maintenance of the server and system software."
A)Hosting company provides all the server equipment."
B)Hosting service that provides backup and recovery services."
C)Hosting company manages the cloud."
D)Hosting service with maintenance of the server and system software."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
What kind of model is used to show how the application is deployed across networks and computers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
What de we call the predominant language used for constructing web pages?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Which is NOT a characteristic of a VPN?
A)It uses the Internet."
B)Only certain computers can access it."
C)It uses HTTPS for security"
D)It always uses encryption"
A)It uses the Internet."
B)Only certain computers can access it."
C)It uses HTTPS for security"
D)It always uses encryption"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Which is NOT one of the problematic areas of Web based applications?
A)Security of applications"
B)Complexity of Internet servers and Web development"
C)Configuration to handle high peak loads"
D)Rapid change of Web standards and functionality"
A)Security of applications"
B)Complexity of Internet servers and Web development"
C)Configuration to handle high peak loads"
D)Rapid change of Web standards and functionality"
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
What do we call the combination of Hypertext Transfer Protocol and Transport Layer Security?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Low-level design that includes the design of the specific program details is called ______.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following are NOT critical issues in considering a hosting alternative. (choose two)
A)Reliability"
B)Cost"
C)Security"
D)Staff"
E)Growth"
F)Computing equipment
A)Reliability"
B)Cost"
C)Security"
D)Staff"
E)Growth"
F)Computing equipment
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Which is a characteristic of a peer-to-peer connection.
A)Connected computers must have the same operating system."
B)Connected computers do not use a server."
C)Connected computers require special software."
D)Connected computers must have over 99% availability."
A)Connected computers must have the same operating system."
B)Connected computers do not use a server."
C)Connected computers require special software."
D)Connected computers must have over 99% availability."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Load balancing refers to what?
A)Spreading the service requests across multiple hours in the day."
B)Balancing the amount of work fairly between project team members."
C)Configuring the network to provide multiple access paths to the servers."
D)Distributing service requests across multiple application servers."
A)Spreading the service requests across multiple hours in the day."
B)Balancing the amount of work fairly between project team members."
C)Configuring the network to provide multiple access paths to the servers."
D)Distributing service requests across multiple application servers."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
What is the term used to describe the programs that implement the rules and processing of the software solution?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
An advanced version of Secure Sockets Layer protocol which is used to transmit information over the Internet securely is called ______.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
The process of design which is the broad design of the overall system structure is called _______.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
A computer network in which the cabling and hardware are confined to a single location is called what _____?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
What term do we use to describe a computer network architecture with central computers and users' computers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
What is the term used to define a set of server computers that are used to deliver static content such as videos,but that are not part of the primary application servers?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
What is the term used to describe a virtual environment for servers in which the resources include computing,storage,and Internet access and appear to have unlimited availability.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
When considering a hosting alternative,there are five areas that must be considered.Describe each.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
A service which provides a secure physical location for servers but where the computers are usually owned by the client businesses is called _______ .
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
The part of a contract between a business and a hosting company that guarantees a specific level of availability is called the _______.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
The process of providing physical servers at a secure location and selling those services is called _______.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
List and describe the components in three-layer architecture.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
What kind of a connection is it when independent computers communicate but without the need for a centralized server?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
What do we call a method to partition the services of a physical Web server so it appears as multiple,independent Internet servers?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
List and describe the six primary analysis models (used in this text).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
List six of the eight primary design models that are used for systems design (used in this text).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
List the six activities of Design system components.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
What is the term used to describe a closed network with security and closed access but which is built on top of a public network like the Internet?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
List the six primary areas that must be designed as part of systems design.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Describe the three potential problems of implementing an application through the Web.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck