CHARIS MARIE F.
URGEL BSA IV AUGUST 23, 2017
ISM 2 - ASSIGNMENT
Chapter 6 Essentials of Design and Design Activities
Review Questions
1. What is the primary objective of systems design?
The objective of systems design is to define, organize, and structure the components of the final
solution system that will serve as the blueprint for construction.
2. What is the difference between systems analysis and systems design?
The objective of systems analysis is to understand the needs and requirements, while the
objective of design is to figure out the solution to those needs and requirements. Analysis is to understand
the problem, design is to solve the problem. (and implementation is to build the solution.)
3. List the major elements that must be designed for a new software application.
From figure 6-1 the elements that must be designed include:
The application software
The database
The user interface
The network and environment
The security and controls
The system interface
4. List the models that are used for systems analysis.
Analysis models include
Class diagrams
Use case diagrams
System sequence diagrams
Use case descriptions
Activity diagrams
State machine diagrams
5. List the models that are used for systems design.
Design models include
Package diagrams
Nodes and locations diagrams
Design class diagrams
Sequence diagrams
Database schema
User-interface layouts
Security and controls documents
Communication diagrams
6. What is the difference between user-interface design and system-interface design?
User-interface design has to do with designing the screens (and reports) that the users see and
interact with. Those require substantial user input and consideration for ease of use. System-interface
design has to do with those automated interfaces with other systems and tends to consist of technical
specifications.
7. On a project that uses iterations to develop the system, in which iteration does systems design begin?
Explain why.
Adaptive projects that use iteration include analysis, design, and implementation in every
iteration. So, design will begin within the first iteration. Depending on the desire result of the first
iteration, the design activities may be primarily high-level structural design, but may also include low-
level detailed program design.
8. What is the difference between architectural design and detail design?
Architectural design is sometimes called high-level design. It has to do with the overall structure
and configuration of the solution system, including network, applications, databases, and how they all
work together. Detailed design focuses on the internal methods and logic of the classes or modules.
9. Designing the security and controls impacts the design of which other elements?
Security and controls affects all other elements of the design and of the system. For
example, security is required for the network. Security and controls are required to protect the
database. Security and controls are required for the application software to protect from attacks
as well as normal input errors.
10. Describe what is required for database design.
The database consists of identifying those classes that are persistent (must exist between
executions). It also includes defining attributes (fields), keys, indexes, and relationships between
those classes. Finally, storage and throughput requirements also impact the design.
11. What is a LAN? When would it be used in deploying a new system?
A LAN is a local area network and is used to refer to the network of computers that exists
within an organization at a localized site. Depending on the system, a LAN may be used to allow
work stations to access data on a central database server within the local site. Also, if the
employees that work together must communicate together and see each others work, then a
LAN configuration is required.
12. What is three-layer design?
Many systems are designed with a view layer, which consists of the user interface, a
program logic layer, which contains the business processing, and a data layer, which contains the
database and data storage routines.
13. Describe the contents of each layer in three-layer design.
View layeruser interface for inputs and outputsscreens and reports.
Logic layerprogram logic to process business rules and processes.
Data layerstored data in the database and the routines to retrieve and update it.
14. List the different types of client devices in a client/server architecture.
Client devices range from desktop workstations to laptops and notebooks to small digital
mobile devices such as smart phones. Client devices also would be printers that handle system
outputs.
15. What is the difference between HTTPS and HTTP?
HTTP is the Hypertext Transport Protocol to send and receive data over the Internet.
HTTPS stands for Hypertext Transport Protocol Secure and adds a layer of security by
encrypting the data being sent.
16. In the use of software over the Internet, what are the two main security issues that must be
considered?
One security issue is how to protect the data and the system residing on the server
computer. In other words, the server itself must be made secure. Another security issue is how to
protect the data when it is in transit across the Internet. In other words, the transmission of the
data must also be done in a secure manner.
17. Describe the primary factors that affect throughput for Internet systems.
Several factors affect throughput for Internet systems including:
Server computer power and capacity
Database capacityboth the computer and the database efficiency
The number of computers (e.g. server farms)
The location of the server computers (e.g. content delivery networks)
Internet connections and Internet capacity
18. List five issues that are important when considering an external hosting company.
Important issues include:
Reliability of the hardware environment
Security of both hardware and software
Physical facilities including buildings, connection points, etc.
Staff of the hosting company for expertise and ability to respond to problems
Growth of the hosted site and can the hosting company handle the growth
19. What is the difference between cloud computing and virtual servers?
A virtual server environment provides the ability to grow and add servers easily for a
client. However, the client is still involved in deciding the number and configuration of the
virtual servers. Cloud computing, on the other hand, attempts to provide computing power much
like a utility that the customer just uses as much computing capability only when he actually
needs it.
20. Why do companies use colocation facilities?
Colocation facilities provide several benefits to a company, which can be summarized by
cost savings and increase reliability and security. Colocation companies have specially
constructed sites to handle high volumes and which have highly reliable sites with backup
equipment. Since the cost of these sites are shared by multiple clients a high level of service and
reliability can be provided with less expense than if one company tried to do it all for itself.
21. Describe the issues to be considered when designing for multiple clients.
When designing for multiple clients is the wide range of client devices that must be
supported. This affects both software design and environment design.
22. What is a VPN? Why would a company use a VPN?
A VPN is a virtual private network which is a private network but which uses the public
Internet as the basic transport mechanism. It includes additional security levels to secure the
transmission and use of the Internet. A company would use a VPN if it has information that must
be very secure, but must be transmitted to remote locations where the company did not have its
own private network lines.