Exam 6: Foundations for Systems Design
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design72 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Identifying User Stories and Use Cases82 Questions
Exam 4: Domain Modeling90 Questions
Exam 5: Use Case Modeling80 Questions
Exam 6: Foundations for Systems Design80 Questions
Exam 7: Defining the System Architecture86 Questions
Exam 8: Designing the User Interface86 Questions
Exam 9: Designing the Database96 Questions
Exam 10: Approaches to System Development82 Questions
Exam 11: Project Planning and Project Management82 Questions
Exam 12: Object-Oriented Design: Fundamentals89 Questions
Exam 13: Object-Oriented Design: Use Case Realization93 Questions
Exam 14: Deploying the New System88 Questions
Exam 15: The Role of the Systems Analyst50 Questions
Exam 16: The Traditional Approach to Requirements50 Questions
Exam 17: Project Management Techniques56 Questions
Select questions type
In user interface design the detailed screen layouts should be done after the devices have been decided.
(True/False)
4.9/5
(33)
List the five primary activities that are included as part of systems design.
(Essay)
4.8/5
(42)
During analysis,analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
(True/False)
4.8/5
(34)
Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.
(True/False)
4.9/5
(36)
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
(Multiple Choice)
4.9/5
(37)
According to an Agile iterative development process in which iteration would implementation activities normally start?
(Multiple Choice)
4.8/5
(32)
A ____ is an institution's name and public key,which is encrypted and certified by a third party.
(Multiple Choice)
4.9/5
(33)
When the data is encrypted with the public key in asymmetric encryption,it is decrypted with a(n)____ key.
(Multiple Choice)
4.9/5
(38)
Which of the following is NOT considered an analysis model?
(Multiple Choice)
4.8/5
(26)
When describing the interfaces to external systems,which is not one of the important issues?
(Multiple Choice)
4.9/5
(45)
List and describe the six primary analysis models (used in this text).
(Essay)
4.9/5
(37)
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.
(True/False)
4.9/5
(40)
Which of the following really is both an analysis (discovery)and a design process (solution).
(Multiple Choice)
4.9/5
(36)
A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.
(Short Answer)
4.8/5
(45)
____________________ is the process of identifying a user to verify that he or she can have access to the system.
(Short Answer)
4.8/5
(37)
A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.
(Short Answer)
4.7/5
(37)
Which of the following is NOT a factor that affects the risk of fraud?
(Multiple Choice)
4.8/5
(51)
Cowboy coding is one of the newer techniques programming,often used with Agile techniques.
(True/False)
4.8/5
(41)
Showing 61 - 80 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)