Exam 12: Physical Architecture Layer Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Encryption and authentication requirements address virus control measures.

Free
(True/False)
4.9/5
(43)
Correct Answer:
Verified

False

In the server-based architecture, all data stored on one computer.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

True

Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

The computing architecture in which the server performs practically all of the work is known as _____.

(Multiple Choice)
4.8/5
(42)

The hardware and software specification is a document that describes what hardware and software are needed to support the application.

(True/False)
4.9/5
(33)

Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.

(True/False)
4.8/5
(40)

Security concerns are one of the set of obstacles for adopting the cloud.

(True/False)
4.8/5
(34)

System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.

(True/False)
4.8/5
(28)

Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.

(Multiple Choice)
4.8/5
(39)

Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.

(True/False)
4.7/5
(33)

The function that provides the logic related to the problem domain layer is called application logic.

(True/False)
4.9/5
(35)

Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.

(True/False)
5.0/5
(42)

In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.

(True/False)
4.9/5
(32)

A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.

(True/False)
4.8/5
(32)

The major problem with a server-based architecture is that all data on the server must travel to the client for processing.

(True/False)
4.9/5
(29)

The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.

(Multiple Choice)
4.8/5
(33)

Cost of cloud is one of the set of obstacles for adopting the cloud.

(True/False)
4.9/5
(37)

In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.

(Multiple Choice)
4.7/5
(34)

Which one of the following type of operational requirements attempts to anticipate the future requirements?

(Multiple Choice)
4.9/5
(41)

Scalability refers to the _____.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)