Save
ADT
chapter6
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Dakalo
Visit profile
Cards (25)
What is the title of Chapter 6 in "Systems Analysis and Design in a Changing World"?
Systems Design
View source
How does systems design differ from systems analysis?
Systems analysis describes "what" is required, while design tells "how" the system will be
configured
and constructed.
View source
What are the inputs and outputs of systems design?
Documents
and
models
View source
What is the objective of design in systems development?
To define, organize, and structure the
components
of the final solution as a
blueprint
for construction.
View source
What role does analysis play in the design process?
Analysis provides the
starting
point
for design.
View source
What is the significance of documenting analysis and design results?
To coordinate the work involved in
systems development
.
View source
What is a key characteristic of design activities?
Design activities correspond to
components
of the new system.
View source
What are the two key elements in the environment of systems design?
Communications
with external systems and conforming to an existing
technology architecture
.
View source
What is an application component?
A well-defined unit of software that performs some
function(s)
.
View source
What issues are involved in packaging application components?
Scope and size,
programming language
, and
build or buy decisions
.
View source
Why is the user interface critical to users?
It has a large impact on user
productivity
and requires heavy user involvement.
View source
What type of database technology is frequently used in current systems?
Relational Database Management Systems
(
RDBMS
).
View source
What is the purpose of integrity controls?
To maintain the integrity of
inputs
,
outputs
, and
data and programs
.
View source
What are security controls designed to protect against?
Threats
, both internal and external.
View source
What is the objective of value limit controls?
To check the range of inputs for
reasonableness
.
View source
What is the purpose of backup and recovery controls?
To protect data and systems from
catastrophes
.
View source
What are the components of the fraud triangle?
Opportunity
, motive, and
rationalization
.
View source
What is the role of access controls in system security?
To limit a person's ability to access servers, files, data, and
applications
.
View source
What is encryption?
It is the
method
of altering data so it is unrecognizable.
View source
What is a digital signature?
A technique where a document is
encrypted
using a
private key
.
View source
What does SSL stand for?
Secure Sockets Layer
.
View source
What is the purpose of Transport Layer Security (TLS)?
It is an Internet standard equivalent to
SSL
for secure communications.
View source
What is the main focus of systems design activities?
To describe the
environment
, design
application components
, user interface,
database
, and
software classes and methods
.
View source
What are the main activities involved in systems design?
Describe the
environment
Design the
application components
Design the
User Interface
Design the
database
Design the
software classes
and
methods
View source
What are the types of controls in system security?
Integrity Controls
Input controls
Output controls
Backup and recovery
Fraud prevention
Security Controls
Access controls
Data encryption
Digital signatures and certificates
Secure transactions
View source