Filters
Question type

Study Flashcards

The encoding of a message with a private key is called ____________________.​

Correct Answer

verifed

verified

digital si...

View Answer

The output of the design activities is a set of diagrams and documents that describe the solution system.​

A) True
B) False

Correct Answer

verifed

verified

A well-defined unit of software built to perform some specific tasks is called a(n)_____________.​

Correct Answer

verifed

verified

applicatio...

View Answer

Which of the following can be classified as privileged users?​


A) System programmers, application programmers, and system administrators
B) Technical users and security personnel
C) ​System operators and clerks
D) ​Administrators and accountants

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Prototypes and mock-ups are most useful in doing the design of the software classes.​

A) True
B) False

Correct Answer

verifed

verified

What is a control that checks the value of a field to ensure that it is within the correct range?​


A) Answer control
B) Completeness control
C) ​Value limit control
D) ​High-low control

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A big part of describing the environment is identifying and defining all the types of computing devices that will be required.​

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not one of the design activities included in the Design System Components core process?​


A) Design the user interface
B) ​Design the security controls
C) ​Describe the environment
D) ​Design the software methods

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

In ____________________ encryption,the same key encrypts and decrypts the data.

Correct Answer

verifed

verified

The design activity key question,"How will this system interact with other systems..." is part of which design activity?​


A) Describe the environment
B) ​Design the application components
C) ​Design the interfaces
D) ​Design security controls

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The key question to answer with the design of the user interface activity is,"How will the users interact with the system?"​

A) True
B) False

Correct Answer

verifed

verified

Completeness control is an integrity control that identifies when a value in a field is too large or too small.​

A) True
B) False

Correct Answer

verifed

verified

Package diagrams are used primarily when designing the software classes.​

A) True
B) False

Correct Answer

verifed

verified

Database design often requires someone with analysis skills since many decisions must be made about the field sizes and characteristics.

A) True
B) False

Correct Answer

verifed

verified

A(n)______ control restricts which persons or programs can add,modify or view information.

Correct Answer

verifed

verified

The domain model is always used as an input to which design activity?​


A) User Interface Design
B) ​Security and controls design
C) ​Database design
D) ​Application Component Design

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

A control that checks the value of a field to ensure that it is within the correct range is a(n)_______ control.​

Correct Answer

verifed

verified

value limi...

View Answer

An application component can be thought of as a(n) __________.​


A) subsystem
B) ​purchased package
C) ​middleware software
D) ​unit of software

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

List four of the six primary design models that are used for systems design (used in this text).​

Correct Answer

verifed

verified

1.Package diagrams
2.Design cl...

View Answer

Which design activity that pervades all other design activities?​


A) Environment design
B) Database design
C) Security and controls design
D) ​Interface design

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 80

Related Exams

Show Answer