Save
ADT
chapter6
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Dakalo
Visit profile
Cards (25)
What is the title of Chapter 6 in "Systems Analysis and Design in a Changing World"?
Systems Design
How does systems design differ from systems analysis?
Systems analysis describes "what" is required, while design tells "how" the system will be
configured
and constructed.
What are the inputs and outputs of systems design?
Documents
and
models
What is the objective of design in systems development?
To define, organize, and structure the
components
of the final solution as a
blueprint
for construction.
What role does analysis play in the design process?
Analysis provides the
starting
point
for design.
What is the significance of documenting analysis and design results?
To coordinate the work involved in
systems development
.
What is a key characteristic of design activities?
Design activities correspond to
components
of the new system.
What are the two key elements in the environment of systems design?
Communications
with external systems and conforming to an existing
technology architecture
.
What is an application component?
A well-defined unit of software that performs some
function(s)
.
What issues are involved in packaging application components?
Scope and size,
programming language
, and
build or buy decisions
.
Why is the user interface critical to users?
It has a large impact on user
productivity
and requires heavy user involvement.
What type of database technology is frequently used in current systems?
Relational Database Management Systems
(
RDBMS
).
What is the purpose of integrity controls?
To maintain the integrity of
inputs
,
outputs
, and
data and programs
.
What are security controls designed to protect against?
Threats
, both internal and external.
What is the objective of value limit controls?
To check the range of inputs for
reasonableness
.
What is the purpose of backup and recovery controls?
To protect data and systems from
catastrophes
.
What are the components of the fraud triangle?
Opportunity
, motive, and
rationalization
.
What is the role of access controls in system security?
To limit a person's ability to access servers, files, data, and
applications
.
What is encryption?
It is the
method
of altering data so it is unrecognizable.
What is a digital signature?
A technique where a document is
encrypted
using a
private key
.
What does SSL stand for?
Secure Sockets Layer
.
What is the purpose of Transport Layer Security (TLS)?
It is an Internet standard equivalent to
SSL
for secure communications.
What is the main focus of systems design activities?
To describe the
environment
, design
application components
, user interface,
database
, and
software classes and methods
.
What are the main activities involved in systems design?
Describe the
environment
Design the
application components
Design the
User Interface
Design the
database
Design the
software classes
and
methods
What are the types of controls in system security?
Integrity Controls
Input controls
Output controls
Backup and recovery
Fraud prevention
Security Controls
Access controls
Data encryption
Digital signatures and certificates
Secure transactions