Exam 6: Foundations for Systems Design
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design72 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Identifying User Stories and Use Cases82 Questions
Exam 4: Domain Modeling90 Questions
Exam 5: Use Case Modeling80 Questions
Exam 6: Foundations for Systems Design80 Questions
Exam 7: Defining the System Architecture86 Questions
Exam 8: Designing the User Interface86 Questions
Exam 9: Designing the Database96 Questions
Exam 10: Approaches to System Development82 Questions
Exam 11: Project Planning and Project Management82 Questions
Exam 12: Object-Oriented Design: Fundamentals89 Questions
Exam 13: Object-Oriented Design: Use Case Realization93 Questions
Exam 14: Deploying the New System88 Questions
Exam 15: The Role of the Systems Analyst50 Questions
Exam 16: The Traditional Approach to Requirements50 Questions
Exam 17: Project Management Techniques56 Questions
Select questions type
The primary purpose of integrity controls is to track external activity.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
Which of the following is NOT considered a design model?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
Designing a single user interface is now the exception,not the norm.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
_______ is the process of allowing or restricting a specific user's access to specific resources.
(Short Answer)
4.8/5
(35)
Security design and encryption issues are addressed during database design.
(True/False)
4.8/5
(41)
A user who has special security and access to a system,such as the right to assign passwords,is called a ____.
(Multiple Choice)
4.8/5
(35)
Build or buy questions are usually addressed during which design activity?
(Multiple Choice)
4.8/5
(44)
Which of the following is a type of model used in user interface design?
(Multiple Choice)
4.8/5
(30)
A(n)____________________ is the list of users who have rights to access the system and data.
(Short Answer)
4.8/5
(39)
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
(Multiple Choice)
4.9/5
(39)
Defining the technology architecture is part of the activity to Design the application components.
(True/False)
4.8/5
(38)
A knowledge of all the computing devices accessed by clients is required for which design activity?
(Multiple Choice)
4.8/5
(38)
A primary model used in software design is which of the following?
(Multiple Choice)
4.9/5
(35)
A control that protects the assets of an organization against all threats,primarily external threats is called ______ control.
(Short Answer)
4.8/5
(30)
The design activity key question,"What internal structure for each application component will ensure efficient construction..." is part of which design activity?
(Multiple Choice)
4.8/5
(43)
Software methods are usually identified in which design model?
(Multiple Choice)
4.7/5
(33)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)