Systems Analysis and Design 10th Edition By Shelly – Test Bank

$25.00

Description

INSTANT DOWNLOAD COMPLETE TEST BANK WITH ANSWERS

 

Systems Analysis and Design 10th Edition By Shelly – Test Bank

 

Sample  Questions

 

1. During the interviews in the user goal technique, the analyst should not try to influence the users in discussing their work methods.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p73

 

2. Before using the user goal technique the analyst must first identify and classify all the types of system users.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p73

 

3. One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p74

 

4. The event decomposition technique begins by identifying use cases.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p75

 

5. The end product of the event decomposition technique is a list of use cases at the right level of analysis.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p75-76

 

6. When describing an external event, there is no need to worry about the person or thing causing the event.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p76

 

7. Temporal events always occur on a fixed date or at a fixed time.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p77

 

8. A state event is a political or governmental activity.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p77

 

9. Another name for a state event is an internal event.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p77

 

10. When a customer buys an item of merchandise using his store credit account, a separate event is required to pay the store.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p78

 

11. During analysis the analyst should be sure to identify system control events such as the user logging in or out.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p79

 

12. One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p78

 

13. A state event is an event that occurs when something happens outside the system that triggers the need for processing.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p77-78

 

14. Real-time systems require the system to react immediately to things that are going on in the environment.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p76

 

15. The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p76

 

16. The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p77

 

17. One technique used to help decide which events apply to controls is to assume that technology is perfect.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p79

 

18. An actor is a person that plays a particular role within a business process.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p76

 

19. Each use case is used by only one actor.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p82-84

 

20. In a use case diagram, and actor must always be a person.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p81

 

21. Another name for the “includes” relationship is the “uses” relationship.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p87

 

22. Highly Agile methodologies favor detailed use case documentation over sketchy user stories.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p71

 

23. The beginning step in defining use cases is always to obtain a user story.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p71-73

 

24. The acceptance criteria can be used to generate test data.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p72

 

25. The acceptance criteria for a user story can be considered a contract between the developers and users.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p72

 

26. A customer wants to buy a new shirt can be considered an external event.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p78

 

27. The end of an event or a user case is when the system is at rest in a consistent state.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p78

 

28. The automation boundary is the same thing as the system boundary.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p81

 

29. One technique to identify use cases is to ask users what they want to achieve with a particular business procedure.  This technique is called the ______ technique.​

a. ​business procedure
b. ​event decomposition
c. ​workflow
d. ​user goal

 

ANSWER:   d
POINTS:   1
REFERENCES:   p73

 

30. The even decomposition technique begins by identifying all of the _______.​

a. ​operational users
b. ​system users
c. ​business events
d. ​internal events

 

ANSWER:   c
POINTS:   1
REFERENCES:   p74

 

31. Something that occurs at a specific time and place and should be remember by the system is called a(n) _______.​

a. ​use case
b. ​elementary business process
c. ​user goal
d. ​event

 

ANSWER:   d
POINTS:   1
REFERENCES:   p74

 

32. The user goal technique normally begins by identifying, listing, and classifying _______ .​

a. ​the system users
b. ​the business events
c. ​the business processes
d. ​the system stakeholders

 

ANSWER:   a
POINTS:   1
REFERENCES:   p73

 

33. The source of using the concept of events to define functional requirements was first emphasized with _______ systems.​

a. ​business
b. ​operating
c. ​real-time
d. ​batch

 

ANSWER:   c
POINTS:   1
REFERENCES:   p75-76

 

34. The type of event that occurs outside of the system is called a(n) _______.​

a. ​outside event
b. ​external event
c. ​business event
d. ​temporal event

 

ANSWER:   b
POINTS:   1
REFERENCES:   p76

 

35. An event that occurs by reaching a point in time is called a _______ event.​

a. ​internal
b. ​external
c. ​timed
d. ​temporal

 

ANSWER:   d
POINTS:   1
REFERENCES:   p77

 

36. An occurrence at a specific time and place, which can be described and is worth remember, is called a(n) _______.​

a. ​business process
b. ​event
c. ​requirement
d. ​business transaction

 

ANSWER:   b
POINTS:   1
REFERENCES:   p74

 

37. A(n) _______ event occurs when something happens inside the system that triggers the need for processing.​

a. ​logical
b. ​state
c. ​external
d. ​temporal

 

ANSWER:   b
POINTS:   1
REFERENCES:   p77

 

38. Which of the following is an example of a state event?​

a. ​A customer places an order
b. ​It is time to send a late notice
c. ​Management checks order status
d. ​Inventory reorder point is reached

 

ANSWER:   d
POINTS:   1
REFERENCES:   p77

 

39. Which of the following is an example of a temporal event?​

a. ​Month end billing is started
b. ​User logs into the system
c. ​Customer updates address
d. ​Inventory reorder occurs

 

ANSWER:   a
POINTS:   1
REFERENCES:   p77

 

40. State events are also sometimes called _______ events.​

a. ​external
b. ​trigger
c. ​system
d. ​internal

 

ANSWER:   d
POINTS:   1
REFERENCES:   p77

 

41. The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?​

a. ​Is the user finished with the task?
b. ​Is the system at rest?
c. ​Is all the data input?
d. ​Is all the printing completed?

 

ANSWER:   b
POINTS:   1
REFERENCES:   p78

 

42. ​“Customer decides to buy a shirt” is an example of what?

a. ​An external event
b. ​Activity prior to an event
c. ​A temporal event
d. ​Activity after an event.

 

ANSWER:   b
POINTS:   1
REFERENCES:   p78

 

43. Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.​

a. ​perfect technology assumption
b. ​risk control assumption
c. ​system controls
d. ​technology protection

 

ANSWER:   c
POINTS:   1
REFERENCES:   p79

 

44. The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.​

a. ​perfect technology assumption
b. ​ideal technology assumptions
c. ​perfect processing control
d. ​ideal processing control

 

ANSWER:   a
POINTS:   1
REFERENCES:   p79

 

45. In using the event decomposition technique, which of the following is NOT a type of event that is considered?​

a. ​Event initiated by an external agent
b. ​Event initiated by a point in time
c. Event initiated by a system change​
d. ​Event initiated by a user login

 

ANSWER:   d
POINTS:   1
REFERENCES:   p79

 

46. The system’s reaction to an event is called a(n) _______ .​

a. ​system process
b. ​use case
c. ​activity
d. ​system requirement

 

ANSWER:   b
POINTS:   1
REFERENCES:   p73
p80

 

47. A one sentence description of a use case is called a(n) _______.​

a. ​brief use case description
b. ​short use case description
c. ​intermediate use case description
d. ​use case description

 

ANSWER:   a
POINTS:   1
REFERENCES:   p81

 

48. The boundary between the automated portion of the system and the users of the system is called the _______.​

a. ​software boundary
b. ​application boundary
c. ​system boundary
d. ​automation boundary

 

ANSWER:   d
POINTS:   1
REFERENCES:   p81
p84

 

49. In UML notation, the guillemets character is used to show what kind of notation?​

a. ​classes
b. ​subordinates
c. ​relationships
d. ​stereotypes

 

ANSWER:   d
POINTS:   1
REFERENCES:   p87

 

50. The UML notation for the “includes” relationship is a(n) _______.​

a. ​a solid arrow
b. ​a dashed arrow
c. ​a straight line
d. ​a dashed line

 

ANSWER:   b
POINTS:   1
REFERENCES:   p85
p86

 

51. In UML notation the includes relationship connects two use cases.  The use case that is “included” use case is the one which _______ .​

a. ​is connected to the tail of an arrow
b. ​is connected to the head of an arrow
c. ​cannot be determined
d. ​is not connected to an actor

 

ANSWER:   b
POINTS:   1
REFERENCES:   p85-86

 

52. The technique used to identify use cases based on external, temporal, and state events is the _______.​

a. ​user goals technique
b. ​list of nouns technique
c. ​event decomposition technique
d. ​CRUD technique

 

ANSWER:   c
POINTS:   1
REFERENCES:   p77-78

 

53. The level of analysis to use when identifying user goals is the _______.​

a. ​external event level
b. ​elementary business process level
c. ​temporal event level
d. ​elementary activity level

 

ANSWER:   b
POINTS:   1
REFERENCES:   p73

 

54. “As a student, I want to register for a class in order to fulfill education requirements” is an example of a(n) _________________.​

a. ​use case
b. ​user story
c. ​external event
d. ​elementary business process

 

ANSWER:   b
POINTS:   1
REFERENCES:   p71

 

55. Acceptance criteria are usually associated with __________.​

a. ​system controls
b. ​use cases
c. ​user stories
d. ​elementary business events

 

ANSWER:   c
POINTS:   1
REFERENCES:   p72

 

56. User stories are different than use cases in what way?​

a. ​Different users identify them
b. ​Differ in identified functions required
c. ​Different focus
d. ​Differ in the amount of detail captured

 

ANSWER:   d
POINTS:   1
REFERENCES:   p71

 

57. Two primary techniques to identify use cases are _______ and _______. (Choose two)​

a. ​user goal technique
b. ​CRUD technique
c. ​system response technique
d. ​event decomposition technique
e. business function technique​
f. ​user procedure technique

 

ANSWER:   a, d
POINTS:   1
REFERENCES:   p73-74

 

58. An activity that the system performs in response to a user request is called a(n) _______.​

ANSWER:   use case​
POINTS:   2
REFERENCES:   p73

 

59. A(n) _______ is a task that is performed by one person in response to a business event, adds value, and leaves the system in a stable condition.​

ANSWER:   elementary business process

EBP

POINTS:   2
REFERENCES:   p74

 

60. A(n) _______  is something that occurs at a specific time and place and can be precisely measured.​

ANSWER:   event​
POINTS:   2
REFERENCES:   p74

 

61. An external agent or person that interacts with the system by supplying data is called a(n) _______.​

ANSWER:   actor​
POINTS:   2
REFERENCES:   p76

 

62. An event that occurs simply by reaching a point in time is called a(n) _______ ______.​

ANSWER:   temporal event​
POINTS:   2
REFERENCES:   p77

 

63. The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.​

ANSWER:   perfect technology assumption​
POINTS:   2
REFERENCES:   p79

 

64. Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ .​

ANSWER:   system controls​
POINTS:   2
REFERENCES:   p79

 

65. A UML model that is used to show use cases and their relationships to actors is called a(n) _______.​

ANSWER:   use case diagram​
POINTS:   2
REFERENCES:   p81

 

66. The _______ is the dividing line between the computerized portion of the system and the users who operate the system.​

ANSWER:   automation boundary​
POINTS:   2
REFERENCES:   p81

 

67. The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.​

ANSWER:   user goal

user goal technique

POINTS:   2
REFERENCES:   p73

 

68. The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.​

ANSWER:   event decomposition

event decomposition technique

POINTS:   2
REFERENCES:   p74

 

69. An event that occurs outside the system is called a(n) _______.​

ANSWER:   external event​
POINTS:   2
REFERENCES:   p76

 

70. An event that occurs when something inside the system triggers the need for processing, but usually as a consequence of external activity is called a _______ event.​

ANSWER:   state

state event

POINTS:   2
REFERENCES:   p77

 

71. A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________.​

ANSWER:   user story​
POINTS:   2
REFERENCES:   p71

 

72. Features of a particular user story that must be present in the final system are called _________.​

ANSWER:   acceptance criteria​
POINTS:   2
REFERENCES:   p72

 

73. The standard template for a user story is “As a <______ _____> I want to <goal> so that <reason>”.  Fill in the blank.​

ANSWER:   role

role played

POINTS:   2
REFERENCES:   p71

 

74. The final part of a user story is the ______ ______, which indicates the features that must be present.​

ANSWER:   acceptance criteria​
POINTS:   2
REFERENCES:   p72

 

75. Another name for a state event is a(n)  ______ _____.​

ANSWER:   internal event​
POINTS:   2
REFERENCES:   p77

 

76. A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n)  ____ ____ _____.​

ANSWER:   use case diagram

use-case diagram

POINTS:   2
REFERENCES:   p81

 

77. A relationship between use cases in which one use case is used by another use case is called the _________ _______.​

ANSWER:   includes relationship

<<includes>> relationship

POINTS:   2
REFERENCES:   p87

 

78. List the steps for using the event decomposition technique.​

ANSWER:   1. Identify external events

2. Name a use case for each external event

3. Identify temporal events

4. Name a use case for each temporal event

5. Identify state events

6 Name a use case for each state event

7. Remove and perfect technology assumption events

POINTS:   5
REFERENCES:   p80

 

79. List the steps required to develop a Use Case Diagram.​

ANSWER:   1. Identify all the stakeholders who need to see a use case diagram.

2. Determine what is important for each stakeholder.

3. Organize the use cases for each communication need. Draw the use case diagrams.

4. Carefully name each diagram as it pertains to each stakeholder and user.

POINTS:   5
REFERENCES:   p87

 

80. List three types of events and provide descriptions for each.​

ANSWER:   An external event is an event that occurs outside the system and is usually initiated by an external agent or actor.

A second type of event is the temporal, which occurs as a result of reaching a point in time.

A third type of even is a state event. This event occurs when something happens inside the system that triggers the need for processing.

POINTS:   5
REFERENCES:   p73-78

 

81. Describe two techniques for identifying use cases. Which is the most comprehensive approach?​

ANSWER:   Two techniques for identifying use cases are the user goal technique and the event decomposition technique. The user goal technique involves identifying all actors or users of the system and asking, “What are their goals in using the system?” Goals are identified at the elementary business process (EBP) level of analysis. The event decomposition technique involves asking, “What events does the system need to respond to?” External events, temporal events, and state events are identified. The use case is what the system does to react to or respond to each event. The event table is used to catalog information about each event and the resulting use case. The event decomposition technique is the most comprehensive technique. Both techniques involve the idea of an elementary business process (EBS) being a system process in response to a business event. A third technique discussed in chapter 7 is the CRUD technique, where the analyst identifies for each domain class the create, read or report, update, and delete use cases required. In practice, multiple approaches should be used to cross check each other to assure all use cases are identified.​
POINTS:   5
REFERENCES:   p69-74

 

82. List the eight steps to identify use cases using the user goal technique.​

ANSWER:   1. Identify users

2. Classify users by functional roles

3. Also classify by organizational level

4. Interview each type of user in each classification to identify goals

5. Build a preliminary list of use cases

6. Remove duplicates and inconsistencies

7. See where different users have the same needs (same use cases)

8. Review lists with each type of user

POINTS:   5
REFERENCES:   p73-74

 

1. Describing the environment is one of the detailed activities of core process 4: Design system components.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p187

 

2. Computing devices include all of the following: a server computer, a laptop, a smartphone, Kindle reader, and Apple Watch.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p188

 

3. The Internet and the WWW are synonyms.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p190

 

4. The Internet can be thought of as the network of networks.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p190

 

5. The Web is the highway over which messages and information travel from network to network.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p190

 

6. Although in common usage we refer to the Internet and the Web interchangeably, in reality they mean different things.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p190

 

7. Application software that usually executes with a browser is often just called an “app”.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p191

 

8. Computer users are the primary beneficiaries of Web services since they can find new functions and interesting applications by searching the Web for new Web services.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p197

 

9. The Amazon.com application can be considered a client/server architecture.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p199

 

10. In a client/server configuration the term “server” refers to the central computer equipment that houses the core resources.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p199

 

11. In a client/server configuration, it is possible for a single software component to be both client and server.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p199

 

12. In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p199

 

13. A three-layer architecture requires at least three computers to be implemented correctly.

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p200

 

14. A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p201

 

15. Another term for a network diagram is a deployment diagram.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p203

 

16. A network diagram is a useful model to show three/layer architecture.​

a. True
b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   p194
p202

 

17. The primary benefit of a network diagram, is to show the network cabling and the network routers.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p194
p202

 

18. A network diagram and a deployment diagram show basically the same information, just in a different format.

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p203

 

19. A network diagram and a location diagram show basically the same information but in a different format.

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p202

 

20. For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.​

a. True
b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   p207

 

21. Which of the following is NOT one of the activities of Core Process 4: Design system components?​

a. ​Describe the environment
b. ​Design the user interface
c. ​Design application components
d. ​Design security and integrity controls

 

ANSWER:   d
POINTS:   1
REFERENCES:   p187

 

22. What is a computer that manages shared resources for access across a network called?​

a. ​A hosted server
b. ​Software as a Service (SaaS)
c. ​A server computer
d. ​A mainframe computer

 

ANSWER:   c
POINTS:   1
REFERENCES:   p188

 

23. A personal computing device includes all of the following except ______.​

a. ​a laptop
b. ​a smartphone
c. ​a Kindle Reader
d. ​a router

 

ANSWER:   d
POINTS:   1
REFERENCES:   p189

 

24. When we use the term the Web what is the correct definition?​

a. ​The set of interconnected networks that cover the world
b. ​The set of world wide resources that are available over the Internet
c. ​The set of server computers that connect to the Internet
d. ​The set of networks and computers that support the Internet

 

ANSWER:   b
POINTS:   1
REFERENCES:   p190

 

25. Given the following URL, what is the correct description of the portion shown in bold?

http://www.barnesandnoble.com/u/books-best selling-books/379003057

a. ​The protocol
b. ​The resource name
c. ​The server name
d. ​The company name

 

ANSWER:   c
POINTS:   1
REFERENCES:   p190

 

26. When a URL of a Web resource is embedded within a Web page, it is called a(n) ________.​

a. ​hyperlink
b. ​hot spot
c. ​embedded URL
d. ​mouse over

 

ANSWER:   a
POINTS:   1
REFERENCES:   p191

 

27. System software usually refers to what kind of software?​

a. ​Software that runs on servers but not on personal devices
b. ​Operating systems and web servers
c. ​All the software in an information system
d. ​Software that runs on a specific system

 

ANSWER:   b
POINTS:   1
REFERENCES:   p191

 

28. Web-based application is software with the following characteristics:​

a. ​Executes only on a Web server
b. ​Is written with html
c. ​Is installed on a personal computing device
d. ​Uses a browser and web-server

 

ANSWER:   d
POINTS:   1
REFERENCES:   p191

 

29. A toolbar might be considered an example of what?​

a. ​An App
b. ​Browser Software
c. ​System Software
d. ​Embedded Software

 

ANSWER:   d
POINTS:   1
REFERENCES:   p192

 

30. A set of languages, rules and procedures to facilitate data exchange between among hardware and software components is called a(n) _______.​

a. ​uniform resource locator
b. ​hypertext markup language
c. ​protocol
d. ​standard

 

ANSWER:   c
POINTS:   1
REFERENCES:   p193

 

31. Which of the following is not a valid Web protocol?​

a. ​VPN
b. ​HTTPS
c. ​HTML
d. ​XML

 

ANSWER:   a
POINTS:   1
REFERENCES:   p194

 

32. What does XML stand for?​

a. ​Extra modified language
b. ​Extreme modeling links
c. ​Extended modeling language
d. ​Extensible markup language

 

ANSWER:   d
POINTS:   1
REFERENCES:   p194

 

33. What does HTTP stand for?​

a. ​Hypertext Timeline Process
b. ​Hypertext Translation Protocol
c. ​Hypertext Transfer Protocol
d. ​Hyperlink Text Transfer Process

 

ANSWER:   c
POINTS:   1
REFERENCES:   p194

 

34. What is the difference between HTTP and HTTPS?​

a. ​No difference, just different names.
b. ​HTTP is more secure than HTTPS
c. ​HTTP is old technology, while HTTPS is the new standard
d. ​Amazon uses HTTPS for credit card information

 

ANSWER:   d
POINTS:   1
REFERENCES:   p195

 

35. What is the latest version of HTML?​

a. ​HTML4
b. ​HTML5
c. ​HTML6
d. ​HTMLS

 

ANSWER:   b
POINTS:   1
REFERENCES:   p194

 

36. The set of computing hardware, network hardware and system software used by an organization is called the _________.​

a. ​application architecture
b. ​technology architecture
c. ​system architecture
d. ​client/server architecture

 

ANSWER:   b
POINTS:   1
REFERENCES:   p195

 

37. An approach to implementing a software application where little or no software is installed and local computers, where the data is isolated between organizations a service computer is called _______.​

a. ​a software service
b. ​a Web service
c. ​a remote application
d. ​software as a service

 

ANSWER:   d
POINTS:   1
REFERENCES:   p196

 

38. A function or service that is called from a Web application to another Web application is called a(n) ________.​

a. ​hyperlink
b. ​Web service
c. ​remote procedure call
d. ​software as a service

 

ANSWER:   b
POINTS:   1
REFERENCES:   p197

 

39. A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user’s computing devices is called ________.​

a. ​application architecture
b. ​client/server architecture
c. ​technology architecture
d. ​three-layer architecture

 

ANSWER:   b
POINTS:   1
REFERENCES:   p198

 

40. Which of the following diagrams is correct?

a. ​A
b. ​B
c. ​C
d. ​D

 

ANSWER:   d
POINTS:   1
REFERENCES:   p199

 

41. A software architecture that divides an application into view, business logic, and data is called a(n) ________.​

a. ​distributed architecture
b. ​two-layer architecture
c. ​three-layer architecture
d. ​client/server architecture

 

ANSWER:   c
POINTS:   1
REFERENCES:   p199

 

42. In a three-layer architecture, what are the three layers?​

a. ​view layer, business logic layer, and data layer
b. ​view, service layer, domain layer
c. ​client layer, view layer, and data layer
d. ​client layer, domain layer, and server layer

 

ANSWER:   a
POINTS:   1
REFERENCES:   p199

 

43. In a three-layer architecture, the application server would be part of which layer?​

a. ​view layer
b. ​business logic layer
c. ​data layer
d. ​server layer

 

ANSWER:   b
POINTS:   1
REFERENCES:   p200

 

44. Amazon.com is a good example of what kind of architecture?​

a. ​Web based architecture
b. ​three-layer architecture
c. ​server based architecture
d. ​server farm architecture

 

ANSWER:   b
POINTS:   1
REFERENCES:   p194
p199

 

45. The model that best shows how software components are distributed across hardware components is the ________.​

a. ​client/server diagram
b. ​location diagram
c. ​network diagram
d. ​deployment diagram

 

ANSWER:   d
POINTS:   1
REFERENCES:   p203

 

46. The activity of Describing the Environment consists of what two key elements?​

a. ​Internal systems and application architecture
b. ​External systems and technology architecture
c. ​External systems and internal applications
d. ​Software applications and database technology

 

ANSWER:   b
POINTS:   1
REFERENCES:   p203

 

47. Which of the following are examples of distributed architectures?  (choose all that apply)​

a. ​technology architecture
b. ​three-layer architecture
c. ​application architecture
d. ​client/server architecture
e. ​browser based architecture
f. ​LAN architecture

 

ANSWER:   b, d
POINTS:   1
REFERENCES:   p198
p199

 

48. Which of the following activities are included in the core process of Design System Components? (choose all that apply)​

a. ​Describe the environment
b. ​Describe the network
c. ​Design the software classes
d. ​Design the database
e. ​Design the security elements
f. ​Design the graphics

 

ANSWER:   a, c, d
POINTS:   1
REFERENCES:   p187

 

49. ​Which of the following are examples of embedded software?  (choose all that apply)

a. ​Toolbars
b. ​POS systems
c. ​User interfaces
d. ​DBMSs
e. ​Operating systems
f. ​Widgets

 

ANSWER:   a, f
POINTS:   1
REFERENCES:   p192

 

50. What are the layers of a three-layer architecture? (choose all that apply)​

a. ​data layer
b. ​domain layer
c. ​client layer
d. ​server layer
e. ​application layer
f. ​user interface layer

 

ANSWER:   a, b, f
POINTS:   1
REFERENCES:   p199

 

51. What are the characteristics of a Web service? (choose all that apply)​

a. ​Does not execute on the calling applications computer
b. ​Input data is sent via an attachment
c. ​Has a charge or cost associated with it each time it is used
d. ​Returns results encoded as a Web page
e. ​Client data is stored on a central server
f. ​Is called via a URL

 

ANSWER:   a, d, f
POINTS:   1
REFERENCES:   p197

 

52. What are the characteristics of SAAS?  (Choose all that apply)​

a. ​Costs are calculated on a “use” basis
b. ​Software is installed remotely with no local involvement
c. ​User data is stored and isolated on central computers
d. ​Services are usually available during specified time periods
e. ​Little, if any, software is installed on the user’s computer
f. ​SAAS company often deploys an on sight employee to assist the client

 

ANSWER:   a, c, e
POINTS:   1
REFERENCES:   p196

 

53. Which of the following are key questions that may be used to describe the environment? (choose all that apply)​

a. ​Where will the users be located?
b. ​What data conversion techniques will be used?
c. ​What software applications need to be deployed?
d. ​Who are the key system engineers?
e. ​What operating systems are being used?
f. ​What are the data bases that will be used?

 

ANSWER:   a, e, f
POINTS:   1
REFERENCES:   p204

 

54. In the activity Designing Application Components which of the following tasks should be considered? (choose all that apply)​

a. ​Determine integration requirements between components
b. ​Determine which user interface technique will be used for the components
c. ​Determine which DBMS will be utilized
d. ​Determine the test cases for integrating the application components
e. ​Determine the classes and methods in each component
f. ​Determine the boundaries of the various application components

 

ANSWER:   a, f
POINTS:   1
REFERENCES:   p208-211

 

55. When Designing Application Components, which characteristics of use cases are helpful to define component boundaries? (choose all that apply)​

a. ​Must be installed concurrently
b. ​Require the same security level
c. ​Sharing common data
d. ​Similarities in actors
e. ​Have the same pre-conditions
f. ​Triggered by same events

 

ANSWER:   c, d, f
POINTS:   1
REFERENCES:   p208

 

56. A computer that manages shared resources and allows users to access those resources over a network is called a(n) ______.​

ANSWER:   server​
POINTS:   1
REFERENCES:   p188

 

57. A small computer network that is deployed in a single building or small office is called a(n) ______ ______ ______.​

ANSWER:   local area network
POINTS:   1
REFERENCES:   p190

 

58. What does LAN stand for?​

ANSWER:   local area network
POINTS:   1
REFERENCES:   p190

 

59. The high-speed, high capacity network that interconnects regions, countries, and continents is called the _____ _____ _____.​

ANSWER:   Internet backbone network​
POINTS:   1
REFERENCES:   p190

 

60. The set of resources that can be accessed over the Internet is referred to was the ______ _____ ______.​

ANSWER:   World Wide Web​
POINTS:   1
REFERENCES:   p190

 

61. What does URL stand for?​

ANSWER:   Uniform Resource Locator
POINTS:   1
REFERENCES:   p190

 

62. The identifier of a Web resource and which defines a protocol, a server or domain name, and a resource identifier is called a(n) ______ ______ ______.​

ANSWER:   Uniform Resource Locator
POINTS:   1
REFERENCES:   p190

 

63. When a URL of  Web resource is embedded within a Web page, it is called a(n) ______.​

ANSWER:   hyperlink
POINTS:   1
REFERENCES:   p190

 

64. Software that performs user- or business-specific tasks is called ______ ______.

ANSWER:   application software
POINTS:   1
REFERENCES:   p191

 

65. Software, such as Web server software, and works behind the scenes is called ______ ______.​

ANSWER:   system software
POINTS:   1
REFERENCES:   p191

 

66. An application that uses a browser for the user interface is usually called a(n) ______ ______.​

ANSWER:   Web-based application

Web based application

POINTS:   1
REFERENCES:   p191

 

67. A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.​

ANSWER:   protocol
POINTS:   1
REFERENCES:   p193

 

68. A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called a(n) _____ _____ _____.​

ANSWER:   virtual private network
POINTS:   1
REFERENCES:   p194

 

69. What does HTML stand for?​

ANSWER:   Hypertext Markup Language
POINTS:   1
REFERENCES:   p194

 

70. What does XML stand for?​

ANSWER:   Extensible Markup Language
POINTS:   1
REFERENCES:   p194

 

71. What does HTTP stand for?​

ANSWER:   Hypertext Transfer Protocol
POINTS:   1
REFERENCES:   p195

 

72. What does HTTPS stand for?​

ANSWER:   Hypertext Transfer Protocol Secure
POINTS:   1
REFERENCES:   p195

 

73. A protocol that defines the structure and content of a web page is called _____ _____ _____.

ANSWER:   Hypertext Markup Language
POINTS:   1
REFERENCES:   p194

 

74. A language that is an extension of HTML that allows the user to define new tags is called ______ ______ ______.   ​

ANSWER:   Extensible Markup Language​
POINTS:   1
REFERENCES:   p194

 

75. A protocol that defines the format and content of Web requests and data communication is called _____ _____ _____.​

ANSWER:   Hypertext Transfer Protocol
POINTS:   1
REFERENCES:   p195

 

76. The set of computing hardware, network hardware and system software in an organization is usually referred to as the ______ ______.​

ANSWER:   technology architecture
POINTS:   1
REFERENCES:   p195

 

77. The set of information systems the organization needs to support its operations is often called the ______ ______.

ANSWER:   application architecture
POINTS:   1
REFERENCES:   p195

 

78. What does SaaS stand for?

ANSWER:   Software as a Service
POINTS:   1
REFERENCES:   p196

 

79. A software function or set of functions or services that can be executed via Web protocols is called a(n) ______ ______.​

ANSWER:   Web service
POINTS:   1
REFERENCES:   p197

 

80. A client/server architecture that divides an application into view, business logic and data layers is called _____ _____ ______.​

ANSWER:   three-layer architecture

three layer architecture

POINTS:   1
REFERENCES:   p199

 

81. A method of configuring a distributed software application into components that manage the resources and components that use the resources is called ______ ______.​

ANSWER:   client/server architecture

client server architecture

client-server architecture

POINTS:   1
REFERENCES:   p198

 

82. In a three-layer architecture, another name for the business logic layer is the ______ ______.​

ANSWER:   domain layer
POINTS:   1
REFERENCES:   p199

 

83. The ability of a component or system to interact with other components or systems is referred to as ______.​

ANSWER:   interoperability
POINTS:   1
REFERENCES:   p201

 

84. A diagram that shows how hardware components are interconnected with devices and cabling is called a(n) ______ ______.​

ANSWER:   network diagram
POINTS:   1
REFERENCES:   p202

 

85. In a complex, integrated software system there is usually one group or application component that has responsibility for maintaining the master copy of data items.  This entity is called the _____ _____​

ANSWER:   system of record
POINTS:   1
REFERENCES:   p212

 

86. One of the best methods to understand and describe the deployment environment is to ask questions.  There are many categories and types of questions that will help in this activity.  This chapter lists four major categories of questions that are important.  List and briefly describe each of these four question categories.​

ANSWER:   1. What are the key features of the deployment environment?  These questions have to do with the operating systems, the existing software systems including the DBMSs, security issues, and APIs of existing systems.

2. What are the external systems and external databases must the new system interface with? These questions consider the protocols to be used, the format and content of the external data, the frequency and method of interactions, and what security issues are important.

3. What kind of devices will be used, primarily for automated interactions?  These questions have to do with format and encoding of automated data, what protocols, what security, and what APIs will be used.

4. What user-interface technology will be used?  These questions consider the hardware and middle-ware software that will support the user interfaces. Included are questions about user devices and system software as well as security, protocols and APIs.

POINTS:   1
REFERENCES:   p204-205