Deck 6: Foundations for Systems Design
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
Play
Full screen (f)
Deck 6: Foundations for Systems Design
1
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.
True
2
The key question to answer with the design of the user interface activity is,"How will the users interact with the system?"
True
3
Model building is a unique to Systems Analysis.
False
4
A big part of describing the environment is identifying and defining all the types of computing devices that will be required.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Prototypes and mock-ups are most useful in doing the design of the software classes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Another name for the data model is the domain model.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
User interface design requires both analysis and design.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
It is just as important to have heavy user involvement during analysis as it is during design.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
In user interface design the detailed screen layouts should be done after the devices have been decided.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
One of the first steps in designing the application components is to divide the software into subsystems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Defining the technology architecture is part of the activity to Design the application components.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
During analysis,analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Package diagrams are used primarily when designing the software classes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
The majority of new systems today must be integrated into existing networks without disrupting existing applications.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Designing a single user interface is now the exception,not the norm.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Completeness control is an integrity control that identifies when a value in a field is too large or too small.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Cowboy coding is one of the newer techniques programming,often used with Agile techniques.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The primary purpose of integrity controls is to track external activity.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
The output of the design activities is a set of diagrams and documents that describe the solution system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Since the design activities all interact with each other,it really doesn't matter which activity occurs first.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Which is NOT an objective of integrity controls?
A)Allow only valid business transactions
B)Ensure that transactions are recorded completely
C)Protect the assets of the organization
D)Ensure a stable functioning operating environment
A)Allow only valid business transactions
B)Ensure that transactions are recorded completely
C)Protect the assets of the organization
D)Ensure a stable functioning operating environment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
An objective of security controls is to maintain a stable operating environment for users.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
What is the name of a general control technique used to ensure that entered data is correct?
A)Data validation contro
B)Data access control
C)Data acceptance control
D)Data completeness control
A)Data validation contro
B)Data access control
C)Data acceptance control
D)Data completeness control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Symmetric key encryption uses a public key and a private key.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
A design class diagram is also called a data model.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Security design and encryption issues are addressed during database design.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Which user is known to the system and is authorized to access all or certain parts of it?
A)Authorized user
B)Registered user
C)Valid user
D)Authenticated user
A)Authorized user
B)Registered user
C)Valid user
D)Authenticated user
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
A ____ is an institution's name and public key,which is encrypted and certified by a third party.
A)private key
B)digital certificate
C)certifying authority
D)digital key
A)private key
B)digital certificate
C)certifying authority
D)digital key
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
What is a control that checks the value of a field to ensure that it is within the correct range?
A)Answer control
B)Completeness control
C)Value limit control
D)High-low control
A)Answer control
B)Completeness control
C)Value limit control
D)High-low control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is NOT a factor that affects the risk of fraud?
A)Separation of dutie
B)Monitoring
C)Asset reconciliation
D)Authorization of users
A)Separation of dutie
B)Monitoring
C)Asset reconciliation
D)Authorization of users
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following can be classified as privileged users?
A)System programmers, application programmers, and system administrators
B)Technical users and security personnel
C)System operators and clerks
D)Administrators and accountants
A)System programmers, application programmers, and system administrators
B)Technical users and security personnel
C)System operators and clerks
D)Administrators and accountants
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
A user who has special security and access to a system,such as the right to assign passwords,is called a ____.
A)supervisor user
B)database administrator
C)privileged user
D)technical user
A)supervisor user
B)database administrator
C)privileged user
D)technical user
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
Three types of users that are considered in the design of a security system are ____.
A)manager user, technical user, and clerical user
B)technical user, authorized user, and privileged user
C)unauthorized user, registered user, and privileged user
D)supervisor user, administration user, and operational user
A)manager user, technical user, and clerical user
B)technical user, authorized user, and privileged user
C)unauthorized user, registered user, and privileged user
D)supervisor user, administration user, and operational user
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Using digital signatures is primarily a technique to ____.
A)verifying who sent a document
B)allow for remote signatures on official documents
C)electronically send a signature
D)digitize (scan) a signed document
A)verifying who sent a document
B)allow for remote signatures on official documents
C)electronically send a signature
D)digitize (scan) a signed document
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
A)completenes
B)field combination
C)value
D)data validation
A)completenes
B)field combination
C)value
D)data validation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
A)Secure control
B)Total control
C)Comprehensive control
D)Completeness control
A)Secure control
B)Total control
C)Comprehensive control
D)Completeness control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Database design often requires someone with analysis skills since many decisions must be made about the field sizes and characteristics.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is NOT considered a design model?
A)Package diagram
B)Sequence diagram
C)User interface screen layouts
D)Activity diagram
A)Package diagram
B)Sequence diagram
C)User interface screen layouts
D)Activity diagram
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
When the data is encrypted with the public key in asymmetric encryption,it is decrypted with a(n)____ key.
A)asymmetric
B)private
C)public
D)symmetric
A)asymmetric
B)private
C)public
D)symmetric
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
The domain model is always used as an input to which design activity?
A)User Interface Design
B)Security and controls design
C)Database design
D)Application Component Design
A)User Interface Design
B)Security and controls design
C)Database design
D)Application Component Design
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
Which is not a model normally produced as part of application component design?
A)package diagram
B)component diagram
C)deployment diagram
D)design class diagram
A)package diagram
B)component diagram
C)deployment diagram
D)design class diagram
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following really is both an analysis (discovery)and a design process (solution).
A)Environment design
B)System interface design
C)Database design
D)User interface design
A)Environment design
B)System interface design
C)Database design
D)User interface design
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
A storyboard is useful for what?
A)Requirements definition
B)Design of the user interface
C)Design of the software classes
D)Describing the user environment
A)Requirements definition
B)Design of the user interface
C)Design of the software classes
D)Describing the user environment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
The design activity key question,"How will this system interact with other systems..." is part of which design activity?
A)Describe the environment
B)Design the application components
C)Design the interfaces
D)Design security controls
A)Describe the environment
B)Design the application components
C)Design the interfaces
D)Design security controls
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Limiting user access to the system is considered what type of design activity?
A)User interface design
B)Security and controls design
C)Describing the environment
D)Application components design
A)User interface design
B)Security and controls design
C)Describing the environment
D)Application components design
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
The design activity key question,"What internal structure for each application component will ensure efficient construction..." is part of which design activity?
A)Describe the environment
B)Design the application components
C)Design the user interface
D)Design the software classes
A)Describe the environment
B)Design the application components
C)Design the user interface
D)Design the software classes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
A deployment diagram is most useful for which design activity?
A)Describing the environment
B)Designing application components
C)Designing the user interface
D)Designing software classes
A)Describing the environment
B)Designing application components
C)Designing the user interface
D)Designing software classes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is a type of model used in user interface design?
A)Communication diagram
B)Class diagram
C)Activity Diagram
D)System sequence diagram
A)Communication diagram
B)Class diagram
C)Activity Diagram
D)System sequence diagram
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Build or buy questions are usually addressed during which design activity?
A)Describe the environment
B)Design the application components
C)Design the software classes
D)Design the database
A)Describe the environment
B)Design the application components
C)Design the software classes
D)Design the database
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
What are two key elements of describing the environment?
A)Programming language and operating system environment
B)Communication protocols and security methods
C)Hardware configuration and DBMS's
D)External systems and technology architecture
A)Programming language and operating system environment
B)Communication protocols and security methods
C)Hardware configuration and DBMS's
D)External systems and technology architecture
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
An application component can be thought of as a(n)__________.
A)subsystem
B)purchased package
C)middleware software
D)unit of software
A)subsystem
B)purchased package
C)middleware software
D)unit of software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
According to an Agile iterative development process in which iteration would implementation activities normally start?
A)Pre-project activities
B)First iteration
C)Second iteration
D)Sometime after the first iteration
A)Pre-project activities
B)First iteration
C)Second iteration
D)Sometime after the first iteration
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Which design activity that pervades all other design activities?
A)Environment design
B)Database design
C)Security and controls design
D)Interface design
A)Environment design
B)Database design
C)Security and controls design
D)Interface design
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
When describing the interfaces to external systems,which is not one of the important issues?
A)Message formats
B)Error handling
C)Network addresses
D)Programming languages
A)Message formats
B)Error handling
C)Network addresses
D)Programming languages
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is not one of the design activities included in the Design System Components core process?
A)Design the user interface
B)Design the security controls
C)Describe the environment
D)Design the software methods
A)Design the user interface
B)Design the security controls
C)Describe the environment
D)Design the software methods
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
According to an Agile iterative development process in which iteration would design activities normally start?
A)Pre-project activities
B)First iteration
C)Second iteration
D)Sometime after the first iteration
A)Pre-project activities
B)First iteration
C)Second iteration
D)Sometime after the first iteration
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is NOT considered an analysis model?
A)Class diagram
B)State machine diagram
C)User interface screen layouts
D)Activity diagram
A)Class diagram
B)State machine diagram
C)User interface screen layouts
D)Activity diagram
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The objective of Implementation is to
A)complete the specifications
B)integrate the application components
C)install a new system
Dbuild a new system
A)complete the specifications
B)integrate the application components
C)install a new system
Dbuild a new system
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
A major comparison between analsys and design can be stated as:
A)analysis includes users, design does not
B)analysis builds models, design does not
C)analysis is complex, design is simpler
D)analysis is understanding, design is solution
A)analysis includes users, design does not
B)analysis builds models, design does not
C)analysis is complex, design is simpler
D)analysis is understanding, design is solution
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Explain how a digital certificate works.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
In ____________________ encryption,the same key encrypts and decrypts the data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)____________________ is the list of users who have rights to access the system and data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
List and describe the six primary analysis models (used in this text).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A control that protects the assets of an organization against all threats,primarily external threats is called ______ control.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
A control that checks the value of a field to ensure that it is within the correct range is a(n)_______ control.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ is the process of identifying a user to verify that he or she can have access to the system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
A knowledge of all the computing devices accessed by clients is required for which design activity?
A)Describing the environment
B)Designing the application components
C)Designing the user interface
D)Designing the software classes
A)Describing the environment
B)Designing the application components
C)Designing the user interface
D)Designing the software classes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
A(n)______ control restricts which persons or programs can add,modify or view information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
List four of the six primary design models that are used for systems design (used in this text).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
The encoding of a message with a private key is called ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
List the five primary activities that are included as part of systems design.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Which is NOT an objective of integrity controls?
A)Allow only valid business transactions
B)Protect the assets of the organization
C)Ensure that transactions are recorded completely
D)Ensure a stable functioning operating environment
A)Allow only valid business transactions
B)Protect the assets of the organization
C)Ensure that transactions are recorded completely
D)Ensure a stable functioning operating environment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
A well-defined unit of software built to perform some specific tasks is called a(n)_____________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
A)completeness
B)field combination
C)value
D)data validation
A)completeness
B)field combination
C)value
D)data validation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
Software methods are usually identified in which design model?
A)Deployment diagram
B)State-machine diagram
C)System sequence diagram
D)Design class diagram
A)Deployment diagram
B)State-machine diagram
C)System sequence diagram
D)Design class diagram
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
_______ is the process of allowing or restricting a specific user's access to specific resources.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
A primary model used in software design is which of the following?
A)Component model
B)Deployment model
C)System sequence diagram
D)Design class diagram
A)Component model
B)Deployment model
C)System sequence diagram
D)Design class diagram
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck