Filters
Question type

Study Flashcards

Which of the following really is both an analysis (discovery) and a design process (solution) .​


A) Environment design
B) ​System interface design
C) ​Database design
D) ​User interface design

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.​

Correct Answer

verifed

verified

Which of the following is NOT considered an analysis model?​


A) Class diagram
B) State machine diagram
C) ​User interface screen layouts
D) ​Activity diagram

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.​

Correct Answer

verifed

verified

When the data is encrypted with the public key in asymmetric encryption,it is decrypted with a(n) ____ key.​


A) asymmetric
B) ​private
C) ​public
D) ​symmetric

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

List and describe the six primary analysis models (used in this text).

Correct Answer

verifed

verified

1.Class diagrams -- the classes in the p...

View Answer

The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.​

A) True
B) False

Correct Answer

verifed

verified

A ____ is an institution's name and public key,which is encrypted and certified by a third party.​


A) private key
B) ​digital certificate
C) ​certifying authority
D) ​digital key

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?​


A) Secure control
B) ​Total control
C) ​Comprehensive control
D) Completeness control

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Cowboy coding is one of the newer techniques programming,often used with Agile techniques.​

A) True
B) False

Correct Answer

verifed

verified

List the five primary activities that are included as part of systems design.​

Correct Answer

verifed

verified

1.Describe the environment
2.D...

View Answer

According to an Agile iterative development process in which iteration would implementation activities normally start?​


A) Pre-project activities
B) ​First iteration
C) ​Second iteration
D) Sometime after the first iteration

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

During analysis,analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.​

A) True
B) False

Correct Answer

verifed

verified

In user interface design the detailed screen layouts should be done after the devices have been decided.​

A) True
B) False

Correct Answer

verifed

verified

____________________ is the process of identifying a user to verify that he or she can have access to the system.​

Correct Answer

verifed

verified

Another name for the data model is the domain model.​

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT a factor that affects the risk of fraud?​


A) Separation of dutie 
B) ​Monitoring
C) ​Asset reconciliation
D) ​Authorization of users

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

When describing the interfaces to external systems,which is not one of the important issues?​


A) Message formats
B) ​Error handling
C) ​Network addresses
D) ​Programming languages

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Model building is a unique to Systems Analysis.​

A) True
B) False

Correct Answer

verifed

verified

Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.​

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 80

Related Exams

Show Answer