Exam 6: Foundations for Systems Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In user interface design the detailed screen layouts should be done after the devices have been decided.​

(True/False)
4.9/5
(33)

List the five primary activities that are included as part of systems design.​

(Essay)
4.8/5
(42)

During analysis,analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

(True/False)
4.8/5
(34)

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.​

(True/False)
4.9/5
(36)

Model building is a unique to Systems Analysis.​

(True/False)
4.8/5
(41)

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​

(Multiple Choice)
4.9/5
(37)

According to an Agile iterative development process in which iteration would implementation activities normally start?​

(Multiple Choice)
4.8/5
(32)

Another name for the data model is the domain model.​

(True/False)
4.8/5
(44)

A ____ is an institution's name and public key,which is encrypted and certified by a third party.​

(Multiple Choice)
4.9/5
(33)

When the data is encrypted with the public key in asymmetric encryption,it is decrypted with a(n)____ key.​

(Multiple Choice)
4.9/5
(38)

Which of the following is NOT considered an analysis model?​

(Multiple Choice)
4.8/5
(26)

When describing the interfaces to external systems,which is not one of the important issues?​

(Multiple Choice)
4.9/5
(45)

List and describe the six primary analysis models (used in this text).

(Essay)
4.9/5
(37)

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.​

(True/False)
4.9/5
(40)

Which of the following really is both an analysis (discovery)and a design process (solution).​

(Multiple Choice)
4.9/5
(36)

A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.​

(Short Answer)
4.8/5
(45)

____________________ is the process of identifying a user to verify that he or she can have access to the system.​

(Short Answer)
4.8/5
(37)

A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.​

(Short Answer)
4.7/5
(37)

Which of the following is NOT a factor that affects the risk of fraud?​

(Multiple Choice)
4.8/5
(51)

Cowboy coding is one of the newer techniques programming,often used with Agile techniques.​

(True/False)
4.8/5
(41)
Showing 61 - 80 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)