Exam 12: Physical Architecture Layer Design
Exam 1: Introduction to Systems Analysis and Design103 Questions
Exam 2: Project Management157 Questions
Exam 3: Requirements Determination79 Questions
Exam 4: Business Process and Functional Modeling85 Questions
Exam 5: Structural Modeling94 Questions
Exam 6: Behavioral Modeling85 Questions
Exam 7: Moving on to Design99 Questions
Exam 8: Class and Method Design97 Questions
Exam 9: Data Management Layer Design93 Questions
Exam 10: Human Computer Interaction Layer Design80 Questions
Exam 12: Physical Architecture Layer Design74 Questions
Exam 12: Construction79 Questions
Exam 13: Installation and Operations94 Questions
Select questions type
Encryption and authentication requirements address virus control measures.
Free
(True/False)
4.9/5
(43)
Correct Answer:
False
In the server-based architecture, all data stored on one computer.
Free
(True/False)
4.9/5
(33)
Correct Answer:
True
Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
The computing architecture in which the server performs practically all of the work is known as _____.
(Multiple Choice)
4.8/5
(42)
The hardware and software specification is a document that describes what hardware and software are needed to support the application.
(True/False)
4.9/5
(33)
Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.
(True/False)
4.8/5
(40)
Security concerns are one of the set of obstacles for adopting the cloud.
(True/False)
4.8/5
(34)
System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.
(True/False)
4.8/5
(28)
Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.
(Multiple Choice)
4.8/5
(39)
Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
(True/False)
4.7/5
(33)
The function that provides the logic related to the problem domain layer is called application logic.
(True/False)
4.9/5
(35)
Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.
(True/False)
5.0/5
(42)
In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
(True/False)
4.9/5
(32)
A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
(True/False)
4.8/5
(32)
The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
(True/False)
4.9/5
(29)
The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.
(Multiple Choice)
4.8/5
(33)
Cost of cloud is one of the set of obstacles for adopting the cloud.
(True/False)
4.9/5
(37)
In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.
(Multiple Choice)
4.7/5
(34)
Which one of the following type of operational requirements attempts to anticipate the future requirements?
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)