CH6 Flashcards

(82 cards)

1
Q

Analysis provides the starting point for _______

A

design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Design provides the starting point for __________

A

implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: Analysis and design results are documented to
coordinate the work.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Objective of (design/analysis/implentation) is to define, organize, and structure the components of the final solution to serve as a blue print for construction.

A

design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: Design is a graph building activity.

A

F, model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The _________ of the project will dictate the type, complexity, and depth of models.

A

formality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F: Agile/iteration projects typically build a lot of models.

A

F, they build fewer models, but models are still created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jumping to programming without ________ often causes less than optimum solutions and may require rework.

A

design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F: Design activities correspond to components of the new system.

A

T, such as describing the enviorment, designing the application components, the user interface, the database, and the software classes and method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the ‘Describe the enviorment’ design activity, there are two key elements in the enviroment: Communications with _________ systems, and conforming to an existing ______________.

A

External, Technology Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: Communications with the external system during the ‘Describe the enviroment’ design activity, include: message formats, web and networks, communication protocols, security methods, error detection and recovery.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the system design activities?

A

describing the enviroment
defining the application components
designing the user interface
designing the database
designing the software classes and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is a well-defined unit of software that performs some function(s).

A

Application component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the issues that involve how to package components?

A
  1. Scope and size,
  2. Programming language,
  3. Build or buy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Package diagram, Component Diagram, and Deployment diagram are all typical models for which design activity?

A

defining application components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F: To the system designer, the User Interface is the system.

A

F, the User Interface is the system for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: The user interface has large impact of user productivity.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T/F: Designing the User Interface includes both Analysis and Design tasks.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F: Designing the User Interface doesn’t require a lot of user involvement.

A

F, it requires heavy involvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

T/F: Current needs require multiple user interfaces.

A

T, as there are many different devices and enviroments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Storyboards, System Sequence diagrams, and small screen menu prototype are all typical models for?

A

User Interface design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

By definition, an Information System requires data – usually in a ______________.

A

database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F: Current technology frequently use Relational Database Management Systems (RDBMS)

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Designing the database, Requires converting the data model to a _______________.

A

relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Designing the database, Requires addressing of many other technical issues such as _______________, and ___________.
Throughput and response time, Security.
26
Which design activity is also known as Detailed Design?
Designing the software classes and methods
27
T/F: Designing the software classes and methods is a model building activity.
T
28
Design class diagram, sequence diagrams, and state-machine diagrams are all models for which design activity?
Designing software classes and methods
29
System controls and security include __________ controls and ________ controls.
Integrity, Security
30
____________ Controls are Controls that maintain integrity of inputs, outputs and data and programs.
Integrity
31
_________ Controls are Controls that protect the assets from threats, internal and external.
Security
32
Which design activity is integrated into application programs and DBMS?
Designing the system controls and security (integrity controls)
33
Ensuring that only appropriate and correct business transactions are accepted, is an objective of (security/integrity) controls.
integrity
34
Ensuring that transactions are recorded and processed correctly is an objective of (security/integrity) controls.
integrity
35
T/F: To protect and safeguard assets such as the database is an objective of integrity controls.
T
36
_________ Controls prevent invalid or erroneous data from entering the system.
Input
37
Value limit controls, Completeness Controls, Data validation controls, and Field Combination controls are all (Input/Output) Controls.
Input
38
Name the Input Control: Checks the range of inputs for reasonableness.
Value Limit Controls
39
Name the Input Control: Ensures all the data has been entered.
Completenesss Controls
40
Name the input control: Ensures that specific data values are correct.
Data Validation Controls
41
Name the input control: Ensurse data is correct based on relationships between fields.
Field Combination Control
42
_________ Controls ensure that output arrives at proper destination (for authorized eyes) and is accurate, current, and complete.
Output
43
Physical access to printers and display devices is an example of _________ controls.
Output
44
T/F: Labels on printed and electronic output to correctly identify source of data is an example of input controls.
F, Output Controls
45
T/F: Discarded data – protect from “dumpster diving” is an example on input controls.
F, Output controls.
46
_______________ Protect data and systems from catastrophes.
Redundancy, Backup and Recovery
47
T/F: Redundancy, Backup and Recovery is to have On-site versus off-site copies.
T
48
___________________ is critical to prevent internal fraud, embezzlement, or loss
Fraud Prevention | **important will come in test
49
The fraud triangle consists of: _________, __________, and _____________.
Opportunity, Motive, Rationalization | **important will come in test
50
T/F: Separation of duties is a technique for risk reduction.
F, it is a factor affecting fraud risk
51
Records and audit trails are factors affecting _________.
fraud risk
52
T/F: Monitoring, Asset control reconciliation, and security are all factors affecting fraud risk.
T
53
T/F: One of the objectives of security control design is to Protect information and transactions during transmission across networks and Internet.
T
54
T/F: One of the objectives of Security Control Design is to protect and maintain a stable, functioning operating environment 24/7 (equipment, operating systems, DBMSs)
T
55
_________ Controls limit a person’s ability to access servers, files, data, applications
Access
56
_______________ is for identifying users.
Authentication
57
______________ is a list of valid users.
Access Control List
58
______________ is an authenticated user’s list of permission level for each resource.
Authorization
59
___________ Users are those users with authorization
Registered
60
_____________ Users are anyone not registered.
Unauthorized
61
_________ Users are those that maintain lists and systems.
Privileged
62
Identify the type of user: Hackers and former employees are _______ users.
Unauthorized
63
Identify the type of user: Internet customers and employees are _______ users.
Registered
64
Identify the type of user: Managers and System administrators are _______ users.
privileged
65
Identify the type of user: Suppliers and System Developers are _______ users.
Registered
66
______________ is a method to secure data (stored or in transmission).
Data Encryption
67
______________ alters data so it is unrecognizable.
Encryption
68
______________ is the converted encrypted data back to readable format.
Decryption
69
_______________ is the mathematical transformation of the data.
Encryption Algorithm
70
______________ is a long data string that allows the same algorithm to produce unique encryptions.
Encryption Key
71
______________ Encryption is an encryption method that uses the same key to encrypt and decrypt.
Symmetric Key
72
_______________ Encryption is an encryption method that uses different keys to encrypt and decrypt.
Asymmetric Key
73
(Asymmertic/Symmertic) Key Encryption is also known as the Public Key Encryption.
Asymmetric
74
_____________________ is a technique where a document is encrypted using a private key.
Digital Signature
75
T/F: A Digital Signature Document is encrypted with private key, but then can only be decrypted with correct private key.
False, decrypted with the correct public not private key.
76
__________________ is an organizations name and public that is encrypted and certified by an authorized third party.
Digital Certificate
77
In a Digital Certificate, the _____________ is the authorized third party.
Certifying Authority
77
T/F: Digital Certificates are widely known and accepted and built into Web browsers.
T
78
_____________ is the standard set of protocols for authentication and authorization.
Secure Sockets Layer (SSL)
79
_________________ is an Internet standard equivalent to SSL.
Transport Layer Security (TLS)
80
___________________ is the internet security protocol at a low-level transmission.
IP Security (IPSec)
81
_____________ is the internet standard to transmit Web pages.
Hypertext Transfer Protocol Secure (HTTPS)