Exam 6: Foundations for Systems Design
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design72 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Identifying User Stories and Use Cases82 Questions
Exam 4: Domain Modeling90 Questions
Exam 5: Use Case Modeling80 Questions
Exam 6: Foundations for Systems Design80 Questions
Exam 7: Defining the System Architecture86 Questions
Exam 8: Designing the User Interface86 Questions
Exam 9: Designing the Database96 Questions
Exam 10: Approaches to System Development82 Questions
Exam 11: Project Planning and Project Management82 Questions
Exam 12: Object-Oriented Design: Fundamentals89 Questions
Exam 13: Object-Oriented Design: Use Case Realization93 Questions
Exam 14: Deploying the New System88 Questions
Exam 15: The Role of the Systems Analyst50 Questions
Exam 16: The Traditional Approach to Requirements50 Questions
Exam 17: Project Management Techniques56 Questions
Select questions type
Which user is known to the system and is authorized to access all or certain parts of it?
(Multiple Choice)
4.9/5
(44)
Which is not a model normally produced as part of application component design?
(Multiple Choice)
4.8/5
(39)
The majority of new systems today must be integrated into existing networks without disrupting existing applications.
(True/False)
4.8/5
(32)
Using digital signatures is primarily a technique to ____.
(Multiple Choice)
4.9/5
(37)
What is the name of a general control technique used to ensure that entered data is correct?
(Multiple Choice)
4.8/5
(33)
According to an Agile iterative development process in which iteration would design activities normally start?
(Multiple Choice)
4.9/5
(38)
An objective of security controls is to maintain a stable operating environment for users.
(True/False)
4.8/5
(36)
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
(Multiple Choice)
4.7/5
(33)
One of the first steps in designing the application components is to divide the software into subsystems.
(True/False)
5.0/5
(32)
Since the design activities all interact with each other,it really doesn't matter which activity occurs first.
(True/False)
4.9/5
(41)
It is just as important to have heavy user involvement during analysis as it is during design.
(True/False)
4.8/5
(39)
A deployment diagram is most useful for which design activity?
(Multiple Choice)
4.8/5
(41)
Three types of users that are considered in the design of a security system are ____.
(Multiple Choice)
4.8/5
(43)
Limiting user access to the system is considered what type of design activity?
(Multiple Choice)
4.8/5
(50)
A major comparison between analsys and design can be stated as:
(Multiple Choice)
4.8/5
(30)
Showing 41 - 60 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)