Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
610 views6 pages

Chapter 6 - Review Questions

Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 - Essentials of Design and Design Activities Solutions to End-of-Chapter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
610 views6 pages

Chapter 6 - Review Questions

Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 - Essentials of Design and Design Activities Solutions to End-of-Chapter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

CHARIS MARIE F.

URGEL BSA IV AUGUST 23, 2017

ISM 2 - ASSIGNMENT
Chapter 6 Essentials of Design and Design Activities

Review Questions

1. What is the primary objective of systems design?

The objective of systems design is to define, organize, and structure the components of the final

solution system that will serve as the blueprint for construction.

2. What is the difference between systems analysis and systems design?

The objective of systems analysis is to understand the needs and requirements, while the

objective of design is to figure out the solution to those needs and requirements. Analysis is to understand

the problem, design is to solve the problem. (and implementation is to build the solution.)

3. List the major elements that must be designed for a new software application.

From figure 6-1 the elements that must be designed include:

The application software

The database

The user interface

The network and environment

The security and controls

The system interface

4. List the models that are used for systems analysis.

Analysis models include

Class diagrams

Use case diagrams

System sequence diagrams

Use case descriptions


Activity diagrams

State machine diagrams

5. List the models that are used for systems design.

Design models include

Package diagrams

Nodes and locations diagrams

Design class diagrams

Sequence diagrams

Database schema

User-interface layouts

Security and controls documents

Communication diagrams

6. What is the difference between user-interface design and system-interface design?

User-interface design has to do with designing the screens (and reports) that the users see and

interact with. Those require substantial user input and consideration for ease of use. System-interface

design has to do with those automated interfaces with other systems and tends to consist of technical

specifications.

7. On a project that uses iterations to develop the system, in which iteration does systems design begin?

Explain why.

Adaptive projects that use iteration include analysis, design, and implementation in every

iteration. So, design will begin within the first iteration. Depending on the desire result of the first

iteration, the design activities may be primarily high-level structural design, but may also include low-

level detailed program design.

8. What is the difference between architectural design and detail design?


Architectural design is sometimes called high-level design. It has to do with the overall structure

and configuration of the solution system, including network, applications, databases, and how they all

work together. Detailed design focuses on the internal methods and logic of the classes or modules.

9. Designing the security and controls impacts the design of which other elements?

Security and controls affects all other elements of the design and of the system. For

example, security is required for the network. Security and controls are required to protect the

database. Security and controls are required for the application software to protect from attacks

as well as normal input errors.

10. Describe what is required for database design.

The database consists of identifying those classes that are persistent (must exist between

executions). It also includes defining attributes (fields), keys, indexes, and relationships between

those classes. Finally, storage and throughput requirements also impact the design.

11. What is a LAN? When would it be used in deploying a new system?

A LAN is a local area network and is used to refer to the network of computers that exists

within an organization at a localized site. Depending on the system, a LAN may be used to allow

work stations to access data on a central database server within the local site. Also, if the

employees that work together must communicate together and see each others work, then a

LAN configuration is required.

12. What is three-layer design?

Many systems are designed with a view layer, which consists of the user interface, a

program logic layer, which contains the business processing, and a data layer, which contains the

database and data storage routines.

13. Describe the contents of each layer in three-layer design.

View layeruser interface for inputs and outputsscreens and reports.


Logic layerprogram logic to process business rules and processes.

Data layerstored data in the database and the routines to retrieve and update it.

14. List the different types of client devices in a client/server architecture.

Client devices range from desktop workstations to laptops and notebooks to small digital

mobile devices such as smart phones. Client devices also would be printers that handle system

outputs.

15. What is the difference between HTTPS and HTTP?

HTTP is the Hypertext Transport Protocol to send and receive data over the Internet.

HTTPS stands for Hypertext Transport Protocol Secure and adds a layer of security by

encrypting the data being sent.

16. In the use of software over the Internet, what are the two main security issues that must be

considered?

One security issue is how to protect the data and the system residing on the server

computer. In other words, the server itself must be made secure. Another security issue is how to

protect the data when it is in transit across the Internet. In other words, the transmission of the

data must also be done in a secure manner.

17. Describe the primary factors that affect throughput for Internet systems.

Several factors affect throughput for Internet systems including:

Server computer power and capacity

Database capacityboth the computer and the database efficiency

The number of computers (e.g. server farms)

The location of the server computers (e.g. content delivery networks)

Internet connections and Internet capacity


18. List five issues that are important when considering an external hosting company.

Important issues include:

Reliability of the hardware environment

Security of both hardware and software

Physical facilities including buildings, connection points, etc.

Staff of the hosting company for expertise and ability to respond to problems

Growth of the hosted site and can the hosting company handle the growth

19. What is the difference between cloud computing and virtual servers?

A virtual server environment provides the ability to grow and add servers easily for a

client. However, the client is still involved in deciding the number and configuration of the

virtual servers. Cloud computing, on the other hand, attempts to provide computing power much

like a utility that the customer just uses as much computing capability only when he actually

needs it.

20. Why do companies use colocation facilities?

Colocation facilities provide several benefits to a company, which can be summarized by

cost savings and increase reliability and security. Colocation companies have specially

constructed sites to handle high volumes and which have highly reliable sites with backup

equipment. Since the cost of these sites are shared by multiple clients a high level of service and

reliability can be provided with less expense than if one company tried to do it all for itself.

21. Describe the issues to be considered when designing for multiple clients.

When designing for multiple clients is the wide range of client devices that must be

supported. This affects both software design and environment design.

22. What is a VPN? Why would a company use a VPN?


A VPN is a virtual private network which is a private network but which uses the public

Internet as the basic transport mechanism. It includes additional security levels to secure the

transmission and use of the Internet. A company would use a VPN if it has information that must

be very secure, but must be transmitted to remote locations where the company did not have its

own private network lines.

You might also like