Deck 11: Physical Architecture Layer Design

Full screen (f)
exit full mode
Question
Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.
A) 60
A) 70
A) 80

A) 90
B) 50
Use Space or
up arrow
down arrow
to flip the card.
Question
A server can be a(n) _____.
A) low-end personal computer
A) mainframe
A) mainframe, minicomputer, or microcomputer
A) microcomputer

A) minicomputer
Question
The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.
A) control and security, scalability, cost of programming
A) interface capabilities, control and security, cost of programming
A) interface capabilities, control and security, scalability
A) interface capabilities, control, and security

A) interface capabilities, scalability, cost of programming
Question
The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.
A) Infrastructure as a service (IaaS)

A) Software as a service (SaaS)
B) Platform as a service (PasS)
B) Utility as a service (UaaS)
C) Computing as a service (CaaS)
Question
Which one of the following type of operational requirements attempts to anticipate the future requirements?

A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements
Question
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.
A) client-based
A) client-network server
A) client-server
A) network-based

A) server-based
Question
What is one primary problem with server-based computing architectures?
A) As more users place heavier demands on the server, it is expensive to increase server capacity.
A) Client terminals are no longer made by hardware vendors.
A) It is difficult to maintain security in the server-based environment.
A) Servers are no longer made by hardware vendors.

A) Servers cannot be manufactured quickly by vendors.
Question
A server in the client-server architecture performs which of the following application functions?
A) application logic and data storage
A) application logic and presentation logic
A) data access logic and data storage
A) data access logic and presentation logic

A) data storage logic and presentation logic
Question
In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) any of the above can be spread across two or more sets of servers
Question
Scalability refers to the _____.
A) deployment of middleware in the system
A) ease of decreasing the cost of the infrastructure during economic downturn
A) easy increase or decrease of the storage and processing capabilities of the computer
A) fact that there is no central point of failure in the system

A) support of many different types of clients and servers
Question
The application function that allows data to be stored and retrieved is called _____.
A) application logic
A) data access logic
A) data storage
A) network logic

A) presentation logic
Question
A network model will depict _____.
A) all of the above
A) clients
A) external networks
A) network equipment

A) servers
Question
Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.
A) cultural
A) idiosyncratic
A) specialized

A) variable
B) unstated
Question
Elements of a deployment diagram include _____.
A) Client PCs, servers, and locations of application logic modules
A) Nodes, artifacts, and locations of middleware components
A) Primarily servers

A) Servers, external networks, and data access logic
E) Nodes, artifacts, and communication paths
Question
Which of the following is NOT one of the four basic functions of a computer application?
A) application logic
A) data access logic
A) data storage
A) networking logic

A) presentation logic
Question
Systems designed to handle multiple languages on the fly are ____ multilingual systems.
A) ad-hoc
A) concurrent
A) discrete

A) versatile
B) global
Question
The computing architecture in which the server performs practically all of the work is known as _____.
A) client connection based architecture
A) client-based architecture
A) client-server architecture
A) middleware architecture

A) server-based architecture
Question
Which one of the following is not part of the security requirements?

A) System value estimates
B) Capacity requirements
C) Access control requirements
D) Encryption and authentication requirements
E) Virus control requirements
Question
The public key infrastructure (PKI) is ______.
A) hardware
A) organizations
A) policies

A) software
B) all of the above
Question
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.
A) Access data, access information
A) Encrypt data, decrypt data
A) Password-protect data, retrieve password

A) Store data, restore data
B) Encrypt login id, encrypt password
Question
An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
Question
Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.
Question
Most systems are not built to use the existing infrastructure in the organization, so the current infrastructure rarely restricts the choice of architecture.
Question
Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
Question
A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
Question
Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.
A) Remote Method Invocation (RMI)
A) distributed computing
A) e-business

A) virtualization
B) networking
Question
In the server-based architecture, all data stored on one computer.
Question
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
Question
Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
Question
The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.
Question
Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
Question
The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
Question
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
Question
A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
Question
Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.
Question
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
Question
In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
Question
With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
Question
Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.
A) the cost of the cloud
A) the level of availability of the cloud
A) the safety of the cloud

A) the security in the cloud
B) the usability of the cloud
Question
In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
Question
The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
Question
A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
Question
The languages in which the system needs to operate are documented as part of the customization requirements.
Question
In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
Question
Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
Question
Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.
Question
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
Question
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
Question
Encryption and authentication requirements address virus control measures.
Question
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
Question
Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
Question
Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.
Question
The function that provides the logic related to the problem domain layer is called application logic.
Question
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
Question
Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
Question
Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.
Question
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
Question
"The system should be operational on a 24 / 7 basis for the users." This is an example of the availability and reliability requirements.
Question
The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
Question
Client-based systems are ill equipped to meet operational, performance, security, and cultural / political requirements.
Question
Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
Question
Describe deployment diagrams. Discuss different components of a deployment diagram.
Question
Describe the fundamental types of computing architectures. Identify the four general functions of an application system and apply each to the corresponding computing architecture.
Question
Cost of cloud is one of the set of obstacles for adopting the cloud.
Question
Identify the characteristics used when selecting a computing architecture. Provide a description of characteristic.
Question
Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
Question
Virtualization is another term for cloud computing.
Question
Legacy databases and systems are one of seven factors in the hardware and software specification document
Question
Sara and Julian need to implement a system for the Johnson Space Flight Center. It is projected that the Center will grow 60% or more over the next two years. These drastic increases at the Center will be reflected in huge increases in personnel, the relocation of offices, and many software upgrades. All of the software to be used in this system is considered "non-secure". The software will be purchased, thus reducing the cost of development.
Using the six characteristics of a computing architecture, make an architecture selection recommendation to Sara and Julian.
Question
Discuss the factors that might encourage an organization to adopt a server-based architecture as opposed to a client-server-based architecture.
Question
Define performance requirements. Briefly describe three key areas of performance requirements.
Question
With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.
Question
Scott and Tim need to implement a very secure system for the Johnson Space Flight Center. The Center has an endless hardware budget, so infrastructure costs are not a consideration. The Center has a well trained IS staff that is available for the project. Only six people will be interacting with the new system and they are engineers with years of computer experience. Scott and Tim do not see changes to the system in the near future.
Using the six characteristics of a computing architecture, make an architecture selection recommendation to Scott and Tim.
Question
Describe network models. Discuss different components of a network model.
Question
Define operational requirements. Briefly describe four key operational requirement areas.
Question
Explain the distinction between two-tiered, three-tiered, and n-tiered client-server architectures. What is the chief advantage of a multi-tiered architecture as compared to a two-tiered architecture? What are the limitations?
Question
Assume an organization plans to launch a web-based order entry system that can be used directly by customers. Discuss four cultural and political requirements that need to be addressed when creating a system that will probably have users in multiple countries.
Question
Security concerns are one of the set of obstacles for adopting the cloud.
Question
The paperless office idea is becoming a reality thanks for widely using of tablet devices.
Question
Explain how the four fundamental computer application functions are handled in client-server computing architectures. Discuss what is meant by fat client and thin client configurations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Physical Architecture Layer Design
1
Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.
A) 60
A) 70
A) 80

A) 90
B) 50
A
2
A server can be a(n) _____.
A) low-end personal computer
A) mainframe
A) mainframe, minicomputer, or microcomputer
A) microcomputer

A) minicomputer
B
3
The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.
A) control and security, scalability, cost of programming
A) interface capabilities, control and security, cost of programming
A) interface capabilities, control and security, scalability
A) interface capabilities, control, and security

A) interface capabilities, scalability, cost of programming
C
4
The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.
A) Infrastructure as a service (IaaS)

A) Software as a service (SaaS)
B) Platform as a service (PasS)
B) Utility as a service (UaaS)
C) Computing as a service (CaaS)
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
Which one of the following type of operational requirements attempts to anticipate the future requirements?

A) Technical environment requirements
B) System integration requirements
C) Portability requirements
D) Maintainability requirements
E) Capacity requirements
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.
A) client-based
A) client-network server
A) client-server
A) network-based

A) server-based
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
What is one primary problem with server-based computing architectures?
A) As more users place heavier demands on the server, it is expensive to increase server capacity.
A) Client terminals are no longer made by hardware vendors.
A) It is difficult to maintain security in the server-based environment.
A) Servers are no longer made by hardware vendors.

A) Servers cannot be manufactured quickly by vendors.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
A server in the client-server architecture performs which of the following application functions?
A) application logic and data storage
A) application logic and presentation logic
A) data access logic and data storage
A) data access logic and presentation logic

A) data storage logic and presentation logic
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

A) presentation logic
B) application logic
C) data access logic
D) data storage
E) any of the above can be spread across two or more sets of servers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
Scalability refers to the _____.
A) deployment of middleware in the system
A) ease of decreasing the cost of the infrastructure during economic downturn
A) easy increase or decrease of the storage and processing capabilities of the computer
A) fact that there is no central point of failure in the system

A) support of many different types of clients and servers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
The application function that allows data to be stored and retrieved is called _____.
A) application logic
A) data access logic
A) data storage
A) network logic

A) presentation logic
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
A network model will depict _____.
A) all of the above
A) clients
A) external networks
A) network equipment

A) servers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.
A) cultural
A) idiosyncratic
A) specialized

A) variable
B) unstated
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
Elements of a deployment diagram include _____.
A) Client PCs, servers, and locations of application logic modules
A) Nodes, artifacts, and locations of middleware components
A) Primarily servers

A) Servers, external networks, and data access logic
E) Nodes, artifacts, and communication paths
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT one of the four basic functions of a computer application?
A) application logic
A) data access logic
A) data storage
A) networking logic

A) presentation logic
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
Systems designed to handle multiple languages on the fly are ____ multilingual systems.
A) ad-hoc
A) concurrent
A) discrete

A) versatile
B) global
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
The computing architecture in which the server performs practically all of the work is known as _____.
A) client connection based architecture
A) client-based architecture
A) client-server architecture
A) middleware architecture

A) server-based architecture
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
Which one of the following is not part of the security requirements?

A) System value estimates
B) Capacity requirements
C) Access control requirements
D) Encryption and authentication requirements
E) Virus control requirements
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
The public key infrastructure (PKI) is ______.
A) hardware
A) organizations
A) policies

A) software
B) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.
A) Access data, access information
A) Encrypt data, decrypt data
A) Password-protect data, retrieve password

A) Store data, restore data
B) Encrypt login id, encrypt password
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
Most systems are not built to use the existing infrastructure in the organization, so the current infrastructure rarely restricts the choice of architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.
A) Remote Method Invocation (RMI)
A) distributed computing
A) e-business

A) virtualization
B) networking
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
In the server-based architecture, all data stored on one computer.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.
A) the cost of the cloud
A) the level of availability of the cloud
A) the safety of the cloud

A) the security in the cloud
B) the usability of the cloud
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
The languages in which the system needs to operate are documented as part of the customization requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
Encryption and authentication requirements address virus control measures.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
The function that provides the logic related to the problem domain layer is called application logic.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
"The system should be operational on a 24 / 7 basis for the users." This is an example of the availability and reliability requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
Client-based systems are ill equipped to meet operational, performance, security, and cultural / political requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
Describe deployment diagrams. Discuss different components of a deployment diagram.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
Describe the fundamental types of computing architectures. Identify the four general functions of an application system and apply each to the corresponding computing architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
Cost of cloud is one of the set of obstacles for adopting the cloud.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
Identify the characteristics used when selecting a computing architecture. Provide a description of characteristic.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
Virtualization is another term for cloud computing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
Legacy databases and systems are one of seven factors in the hardware and software specification document
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
Sara and Julian need to implement a system for the Johnson Space Flight Center. It is projected that the Center will grow 60% or more over the next two years. These drastic increases at the Center will be reflected in huge increases in personnel, the relocation of offices, and many software upgrades. All of the software to be used in this system is considered "non-secure". The software will be purchased, thus reducing the cost of development.
Using the six characteristics of a computing architecture, make an architecture selection recommendation to Sara and Julian.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
Discuss the factors that might encourage an organization to adopt a server-based architecture as opposed to a client-server-based architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
Define performance requirements. Briefly describe three key areas of performance requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
Scott and Tim need to implement a very secure system for the Johnson Space Flight Center. The Center has an endless hardware budget, so infrastructure costs are not a consideration. The Center has a well trained IS staff that is available for the project. Only six people will be interacting with the new system and they are engineers with years of computer experience. Scott and Tim do not see changes to the system in the near future.
Using the six characteristics of a computing architecture, make an architecture selection recommendation to Scott and Tim.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
Describe network models. Discuss different components of a network model.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
Define operational requirements. Briefly describe four key operational requirement areas.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
Explain the distinction between two-tiered, three-tiered, and n-tiered client-server architectures. What is the chief advantage of a multi-tiered architecture as compared to a two-tiered architecture? What are the limitations?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
Assume an organization plans to launch a web-based order entry system that can be used directly by customers. Discuss four cultural and political requirements that need to be addressed when creating a system that will probably have users in multiple countries.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
Security concerns are one of the set of obstacles for adopting the cloud.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
The paperless office idea is becoming a reality thanks for widely using of tablet devices.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
Explain how the four fundamental computer application functions are handled in client-server computing architectures. Discuss what is meant by fat client and thin client configurations.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.