Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 of 10 1.0 Points What are two key elements of describing the environment? A. Programming language and operating system environment B. Communication protocols

Question 1 of 10

1.0 Points

What are two key elements of describing the environment?

A. Programming language and operating system environment

B. Communication protocols and security methods

C. Hardware configuration and DBMSs

D. External systems and technology architecture

Reset Selection Mark for Review What's This?

Question 2 of 10

1.0 Points

A major comparison between analsys and design can be stated as:

A. analysis includes users, design does not

B. analysis builds models, design does not

C. analysis is complex, design is simpler

D. analysis is understanding, design is solution

Reset Selection Mark for Review What's This?

Question 3 of 10

1.0 Points

Which of the following is a type of model used in user interface design?

A. Communication diagram

B. Class diagram

C. Activity Diagram

D. System sequence diagram

Reset Selection Mark for Review What's This?

Question 4 of 10

1.0 Points

A deployment diagram is most useful for which design activity?

A. Describing the environment

B. Designing application components

C. Designing the user interface

D. Designing software classes

Reset Selection Mark for Review What's This?

Question 5 of 10

1.0 Points

When describing the interfaces to external systems, which is not one of the important issues?

A. Message formats

B. Error handling

C. Network addresses

D. Programming languages

Reset Selection Mark for Review What's This?

Question 6 of 10

1.0 Points

Which of the following is NOT considered a design model?

A. Package diagram

B. Sequence diagram

C. User interface screen layouts

D. Activity diagram

Reset Selection Mark for Review What's This?

Question 7 of 10

1.0 Points

An integrity control that verifies the data in one field against the data in other fields is called a ____ control.

A. completeness

B. field combination

C. value

D. data validation

Reset Selection Mark for Review What's This?

Question 8 of 10

1.0 Points

Which of the following really is both an analysis (discovery) and a design process (solution).

A. Environment design

B. System interface design

C. Database design

D. User interface design

Reset Selection Mark for Review What's This?

Question 9 of 10

1.0 Points

Which is NOT an objective of integrity controls?

A. Allow only valid business transactions

B. Protect the assets of the organization

C. Ensure that transactions are recorded completely

D. Ensure a stable functioning operating environment

Reset Selection Mark for Review What's This?

Question 10 of 10

1.0 Points

Using digital signatures is primarily a technique to ____.

A. verifying who sent a document

B. allow for remote signatures on official documents

C. electronically send a signature

D. digitize (scan) a signed document

Reset Selection

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Navigating The Supply Chain Maze A Comprehensive Guide To Optimize Operations And Drive Success

Authors: Michael E Kirshteyn Ph D

1st Edition

B0CPQ2RBYC, 979-8870727585

More Books

Students also viewed these Databases questions

Question

to encourage a drive for change by developing new ideas;

Answered: 1 week ago

Question

4 What are the alternatives to the competences approach?

Answered: 1 week ago