Exam 6: Foundations for Systems Design
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design72 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Identifying User Stories and Use Cases82 Questions
Exam 4: Domain Modeling90 Questions
Exam 5: Use Case Modeling80 Questions
Exam 6: Foundations for Systems Design80 Questions
Exam 7: Defining the System Architecture86 Questions
Exam 8: Designing the User Interface86 Questions
Exam 9: Designing the Database96 Questions
Exam 10: Approaches to System Development82 Questions
Exam 11: Project Planning and Project Management82 Questions
Exam 12: Object-Oriented Design: Fundamentals89 Questions
Exam 13: Object-Oriented Design: Use Case Realization93 Questions
Exam 14: Deploying the New System88 Questions
Exam 15: The Role of the Systems Analyst50 Questions
Exam 16: The Traditional Approach to Requirements50 Questions
Exam 17: Project Management Techniques56 Questions
Select questions type
Prototypes and mock-ups are most useful in doing the design of the software classes.
(True/False)
4.8/5
(43)
What is a control that checks the value of a field to ensure that it is within the correct range?
(Multiple Choice)
4.9/5
(29)
The encoding of a message with a private key is called ____________________.
(Short Answer)
4.8/5
(42)
A(n)______ control restricts which persons or programs can add,modify or view information.
(Short Answer)
4.8/5
(37)
The key question to answer with the design of the user interface activity is,"How will the users interact with the system?"
(True/False)
4.8/5
(37)
Package diagrams are used primarily when designing the software classes.
(True/False)
4.9/5
(28)
An application component can be thought of as a(n)__________.
(Multiple Choice)
4.9/5
(41)
Which design activity that pervades all other design activities?
(Multiple Choice)
4.9/5
(42)
List four of the six primary design models that are used for systems design (used in this text).
(Essay)
4.8/5
(39)
The domain model is always used as an input to which design activity?
(Multiple Choice)
4.9/5
(32)
Which of the following is not one of the design activities included in the Design System Components core process?
(Multiple Choice)
5.0/5
(30)
A well-defined unit of software built to perform some specific tasks is called a(n)_____________.
(Short Answer)
4.9/5
(38)
In ____________________ encryption,the same key encrypts and decrypts the data.
(Short Answer)
4.9/5
(43)
Which of the following can be classified as privileged users?
(Multiple Choice)
4.9/5
(39)
Database design often requires someone with analysis skills since many decisions must be made about the field sizes and characteristics.
(True/False)
4.8/5
(35)
A control that checks the value of a field to ensure that it is within the correct range is a(n)_______ control.
(Short Answer)
4.8/5
(35)
Completeness control is an integrity control that identifies when a value in a field is too large or too small.
(True/False)
5.0/5
(36)
The design activity key question,"How will this system interact with other systems..." is part of which design activity?
(Multiple Choice)
4.9/5
(38)
The output of the design activities is a set of diagrams and documents that describe the solution system.
(True/False)
4.7/5
(40)
A big part of describing the environment is identifying and defining all the types of computing devices that will be required.
(True/False)
4.9/5
(32)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)