chapter6

Cards (25)

  • What is the title of Chapter 6 in "Systems Analysis and Design in a Changing World"?
    Systems Design
  • How does systems design differ from systems analysis?
    Systems analysis describes "what" is required, while design tells "how" the system will be configured and constructed.
  • What are the inputs and outputs of systems design?
    Documents and models
  • What is the objective of design in systems development?
    To define, organize, and structure the components of the final solution as a blueprint for construction.
  • What role does analysis play in the design process?
    Analysis provides the starting point for design.
  • What is the significance of documenting analysis and design results?
    To coordinate the work involved in systems development.
  • What is a key characteristic of design activities?
    Design activities correspond to components of the new system.
  • What are the two key elements in the environment of systems design?
    Communications with external systems and conforming to an existing technology architecture.
  • What is an application component?
    A well-defined unit of software that performs some function(s).
  • What issues are involved in packaging application components?
    Scope and size, programming language, and build or buy decisions.
  • Why is the user interface critical to users?
    It has a large impact on user productivity and requires heavy user involvement.
  • What type of database technology is frequently used in current systems?
    Relational Database Management Systems (RDBMS).
  • What is the purpose of integrity controls?
    To maintain the integrity of inputs, outputs, and data and programs.
  • What are security controls designed to protect against?
    Threats, both internal and external.
  • What is the objective of value limit controls?
    To check the range of inputs for reasonableness.
  • What is the purpose of backup and recovery controls?
    To protect data and systems from catastrophes.
  • What are the components of the fraud triangle?
    Opportunity, motive, and rationalization.
  • What is the role of access controls in system security?
    To limit a person's ability to access servers, files, data, and applications.
  • What is encryption?
    It is the method of altering data so it is unrecognizable.
  • What is a digital signature?
    A technique where a document is encrypted using a private key.
  • What does SSL stand for?
    Secure Sockets Layer.
  • What is the purpose of Transport Layer Security (TLS)?
    It is an Internet standard equivalent to SSL for secure communications.
  • What is the main focus of systems design activities?
    To describe the environment, design application components, user interface, database, and software classes and methods.
  • What are the main activities involved in systems design?
    • Describe the environment
    • Design the application components
    • Design the User Interface
    • Design the database
    • Design the software classes and methods
  • What are the types of controls in system security?
    • Integrity Controls
    • Input controls
    • Output controls
    • Backup and recovery
    • Fraud prevention
    • Security Controls
    • Access controls
    • Data encryption
    • Digital signatures and certificates
    • Secure transactions