Question 1 of 10 1.0 Points A. Programming language and operating system environ
ID: 3729170 • Letter: Q
Question
Question 1 of 10
1.0 Points
A. Programming language and operating system environment
B. Communication protocols and security methods
C. Hardware configuration and DBMS’s
D. External systems and technology architecture
Question 2 of 10
1.0 Points
A. analysis includes users, design does not
B. analysis builds models, design does not
C. analysis is complex, design is simpler
D. analysis is understanding, design is solution
Question 3 of 10
1.0 Points
A. Communication diagram
B. Class diagram
C. Activity Diagram
D. System sequence diagram
Question 4 of 10
1.0 Points
A. Describing the environment
B. Designing application components
C. Designing the user interface
D. Designing software classes
Question 5 of 10
1.0 Points
A. Message formats
B. Error handling
C. Network addresses
D. Programming languages
Question 6 of 10
1.0 Points
A. Package diagram
B. Sequence diagram
C. User interface screen layouts
D. Activity diagram
Question 7 of 10
1.0 Points
A. completeness
B. field combination
C. value
D. data validation
Question 8 of 10
1.0 Points
A. Environment design
B. System interface design
C. Database design
D. User interface design
Question 9 of 10
1.0 Points
A. Allow only valid business transactions
B. Protect the assets of the organization
C. Ensure that transactions are recorded completely
D. Ensure a stable functioning operating environment
Question 10 of 10
1.0 Points
A. verifying who sent a document
B. allow for remote signatures on official documents
C. electronically send a signature
D. digitize (scan) a signed document
Question 1 of 10
1.0 Points
What are two key elements of describing the environment?A. Programming language and operating system environment
B. Communication protocols and security methods
C. Hardware configuration and DBMS’s
D. External systems and technology architecture
Reset SelectionMark for Review What's This?
Question 2 of 10
1.0 Points
A major comparison between analsys and design can be stated as:A. analysis includes users, design does not
B. analysis builds models, design does not
C. analysis is complex, design is simpler
D. analysis is understanding, design is solution
Reset SelectionMark for Review What's This?
Question 3 of 10
1.0 Points
Which of the following is a type of model used in user interface design?A. Communication diagram
B. Class diagram
C. Activity Diagram
D. System sequence diagram
Reset SelectionMark for Review What's This?
Question 4 of 10
1.0 Points
A deployment diagram is most useful for which design activity?A. Describing the environment
B. Designing application components
C. Designing the user interface
D. Designing software classes
Reset SelectionMark for Review What's This?
Question 5 of 10
1.0 Points
When describing the interfaces to external systems, which is not one of the important issues?A. Message formats
B. Error handling
C. Network addresses
D. Programming languages
Reset SelectionMark for Review What's This?
Question 6 of 10
1.0 Points
Which of the following is NOT considered a design model?A. Package diagram
B. Sequence diagram
C. User interface screen layouts
D. Activity diagram
Reset SelectionMark for Review What's This?
Question 7 of 10
1.0 Points
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.A. completeness
B. field combination
C. value
D. data validation
Reset SelectionMark for Review What's This?
Question 8 of 10
1.0 Points
Which of the following really is both an analysis (discovery) and a design process (solution).A. Environment design
B. System interface design
C. Database design
D. User interface design
Reset SelectionMark for Review What's This?
Question 9 of 10
1.0 Points
Which is NOT an objective of integrity controls?A. Allow only valid business transactions
B. Protect the assets of the organization
C. Ensure that transactions are recorded completely
D. Ensure a stable functioning operating environment
Reset SelectionMark for Review What's This?
Question 10 of 10
1.0 Points
Using digital signatures is primarily a technique to ____.A. verifying who sent a document
B. allow for remote signatures on official documents
C. electronically send a signature
D. digitize (scan) a signed document
Reset SelectionExplanation / Answer
Question 1)
What are two key elements of describing the environment
Ans) Answer is option D, ; i.e, External systems and technology architecture
Question 2) A major comparison between analsys and design can be stated as:
Ans) Answer is option D, ; i.e, analysis is understanding, design is solution
Question 3) Which of the following is a type of model used in user interface design?
Ans) Answer is option B, ; i.e, Class diagram
Question 4) A deployment diagram is most useful for which design activity
Ans)Answer is option B, ; i.e, Designing application components
Question 5) When describing the interfaces to external systems, which is not one of the important issues
Ans) Answer is option D, ; i.e,Programming languages
Question 6)Which of the following is NOT considered a design model
Ans) Answer is option D, ; i.e, Activity diagram
Question 7 )An integrity control that verifies the data in one field against the data in other fields is called a ____ control
Ans) Answer is option B, ; i.e, field combination
Question 8) Which of the following really is both an analysis (discovery) and a design process (solution).
Ans) Answer is option D, ; i.e, User interface design
Question 9) Which is NOT an objective of integrity controls
Ans)Answer is option D, ; i.e, Ensure a stable functioning operating environment
Question 10) Using digital signatures is primarily a technique to _
Ans) Answer is option A, ; i.e,verifying who sent a document
Hope This Helps, if you have any doubts Please comment i will get back to you, thank you and please thumbs up
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.