MCOA021 SAD Test 2 - Chpts 5-7
MCOA021 SAD Test 2 - Chpts 5-7
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 1. A unique set of internal activities within a use case which represents a unique path through the use case is
called a(n) _______.
a. workflow c. scenario
b. sequence of activities d. critical path
____ 2. Which of the following is the best model to use to document the inputs and the outputs to a system?
a. State chart diagram c. Activity diagram
b. Fully developed use case description d. System sequence diagram
____ 3. In UML terminology in a sequence diagram, a message refers to a(n) _______.
a. input data c. event
b. communication between actors d. action
____ 4. In a sequence diagram the message-name is usually given in what format?
a. verb-noun c. action-object
b. noun-verb d. object-action
____ 5. A message event causes what to happen?
a. An activity to finish. c. A guard condition to be evaluated.
b. A message to fire. d. A transition to fire.
____ 6. Which if the following is NOT considered part of designing the application architecture and software?
a. Multilayer design c. Detailed design
b. Subsystem definition d. Program security design
____ 7. Which of the following is NOT a form of system interface?
a. Turn-around document c. Function call
b. File transfer d. Transaction interchange
____ 8. Limiting user access to the system is considered what type of design?
a. User interface design c. System interface design
b. Security and controls design d. Application software design
____ 9. The hosting alternative that is most like a utility is what?
a. Virtual server c. Cloud computing
b. Managed services d. Colocation
____ 10. Software (such as typical tax preparation software) which in essence interviews the user is following which
user interface metaphor?
a. Collaboration metaphor c. Interview metaphor
b. Document metaphor d. Dialog metaphor
____ 11. What does XML stand for?
a. Extended Module Links c. Extensible Markup Language
b. External Machine Language d. Extensible Modern Language
____ 12. Reports that are not predefined by a programmer, but are designed as needed, are called ____ reports.
a. one-time c. business
b. quick and dirty d. ad hoc
____ 13. A report that is used primarily for strategic decision making is called a(n) ____ report.
a. executive c. exception
b. key item d. summary
____ 14. Electronic reports can provide a(n) ____ on the report to activate a lower-level report, which provides more
detailed information.
a. cursor link c. mouseover
b. activation key d. hot spot hyperlink
Problems
3. State and briefly describe the three potential problems of implementing an application through the Web.
(6)
4. When considering a hosting alternative, there are five areas that must be considered. Describe each.
(10)
Cases
1. Consider the figure below showing a set of use cases for the patient and physician actors and answer the
questions that follow.
a. Which use cases include which other use cases? Modify the diagram to incorporate those relationships.
(6)
b. Consider the use cases View/respond to alert and View history. Both actors share the latter, but
each has a different version of the former. Why do the actors have different versions of the
View/respond to alert use case? Would the diagram be incorrect if each actor had his own version of
the View history use case? Why or why not? (7)
c. Develop an SSD for the View history use case. Assume that the system will automatically display
the most recent glucose level, which is updated at five-minute intervals by default. Assume further
that the user can ask the system to view glucose levels during a user-specified time period and that
the levels can be displayed in tabular form or as a graph. (12)
2. Law enforcement agencies thrive on information. In previous eras, it was sufficient to receive
information through the police dispatch radio. Today, much more than voice based information is
required. Officers often need to check vehicle registrations, personal identities, outstanding warrants,
mug shots, maps, and the locations of other officers.
One major difficulty with meeting this need for more information is figuring out how to transmit the
data to remote and mobile locations. Local police agencies are sometimes able to restrict their
transmission needs to within the city limits. However, county sheriffs and state troopers often have
to travel to remote locations that aren’t within a metropolitan area’s boundaries.
Suppose a rural county sheriff’s department has received a grant to upgrade its existing voice-only
communication system. Among other requirements, the grant specifies that all communications must
be protected against eavesdropping and unintended information disclosure.
Your assignment: Recommend specific controls to be applied to radio, cellular, and satellite
transmissions. How will you ensure that only sheriffs and other authorized users can use the system?
(8)
3. A medium-sized engineering firm has three separate engineering offices. In each office, a local LAN
supports all the engineers in that office. Due to the requirement for collaboration among the offices,
all the computers should be able to view and update the data from any of the three offices. In other
words, the data storage server within each LAN should be accessible to all computers, no matter
where they are located. Draw a network diagram that will support this configuration.
(14)
SAD Test 2
Answer Section
MULTIPLE CHOICE
1. ANS: C PTS: 1
2. ANS: D PTS: 1
3. ANS: D PTS: 1
4. ANS: A PTS: 1
5. ANS: D PTS: 1
6. ANS: D PTS: 1
7. ANS: A PTS: 1
8. ANS: B PTS: 1
9. ANS: C PTS: 1
10. ANS: D PTS: 1
11. ANS: C PTS: 1
12. ANS: D PTS: 1
13. ANS: A PTS: 1
14. ANS: D PTS: 1
PROBLEM
1. ANS:
To ensure that every class has sufficient use cases to “cover” all the required actions. 1pt
Every object in a class in the new system must be instantiated, 1ptmust be able to be edited or
updated1pt, must be able to be access for reporting and processing1pt, and in most cases
should be deleted or archived1pt.
PTS: 1
2. ANS:
A system sequence diagram (SSD) is used to describe the flow of information into and out of the automated
system. Thus, an SSD documents the inputs and the outputs 2pt and identifies the interaction between actors
and the system.2pt
PTS: 1
3. ANS:
1. Security —Web servers are a well-defined target for security breaches because Web standards are open and
widely known. Wide-scale interconnection of networks and the use of Internet and Web standards make
servers accessible to a global pool of hackers. 2pt
2. Throughput —When high loads occur, throughput and response time can suffer significantly.2pt
3. Changing standards —Web standards change rapidly.2pt
PTS: 1
4. ANS:
2pts each (state and describing) = 10pts
1. Reliability —The hardware environment must be completely reliable because customers and other outside
parties usually have a very low tolerance for systems that aren’t available.
2. Security —The systems? —hardware and software? —must be secure.
3. Physical facilities —To ensure reliability and security, special rooms or even special buildings are often
required. In addition, Internet connectivity frequently requires multiple access routes to the Internet backbone.
Electrical power must be secure, which often means having backup generators on-site.
4. Staff —To ensure reliability and security, a well-qualified technical staff needs to be on-site 24/7.
5. Growth —External systems often grow dramatically as a business expands, increasing the number of
servers needed to respond to the traffic.
PTS: 1
CASE
1. ANS:
a. Which use cases include which other use cases? Modify the diagram to incorporate included
relationships.
- see the 3 pairs in the diagram below with <<includes>> relationships = 6pts
b. Consider the use cases View/respond to alert and View history. Both actors share the latter, but
each has a different version of the former. Why do the actors have different versions of the
View/respond to alert use case? Would the diagram be incorrect if each actor had his own version of
the View history use case? Why or why not?
View/respond to alert: Even though the names are the same, the detail steps might be very
different.1pt It would be possible to make them different scenarios of the same use case.1pt
But making them separate use cases also works since the actors are different,1pt the steps are
different,1pt and the system responses are different. 1pt
View history: View history does the same activities no matter who the actor is. 1pt In this
case it would not make sense to have separate use cases since the processing steps, the data,
the activities are both the same. 1pt
c. Develop an SSD for the View history use case. Assume that the system will automatically display
the most recent glucose level, which is updated at five-minute intervals by default. Assume further
that the user can ask the system to view glucose levels during a user-specified time period and that
the levels can be displayed in tabular form or as a graph.
3pts for actors, 2pts for each request from user(s) (6pts), 2pts or the response from system, 1pt for
the vertical lines indicating the system boundaries = 12pts
PTS: 1
2. ANS:
Law enforcement agencies thrive on information. In previous eras, it was sufficient to receive
information through the police dispatch radio. Today, much more than voice based information is
required. Officers often need to check vehicle registrations, personal identities, outstanding warrants,
mug shots, maps, and the locations of other officers.
One major difficulty with meeting this need for more information is figuring out how to
transmit the data to remote and mobile locations. Local police agencies are sometimes able to restrict
their transmission needs to within the city limits. However, county sheriffs and state troopers often
have to travel to remote locations that aren’t within a metropolitan area’s boundaries.
Suppose a rural county sheriff’s department has received a grant to upgrade its existing
voice-only communication system. Among other requirements, the grant specifies that all
communications must be protected against eavesdropping and unintended information disclosure.
Your assignment: Recommend specific controls to be applied to radio, cellular, and satellite
transmissions. How will you ensure that only sheriffs and other authorized users can use the system?
Answers will vary by student. The objective of this assignment is to get students
thinking about issues.
One of the problems with totally secure communication is that often communications must
occur between groups such as sheriff’s department, local police, state police, fire
departments, and possibly other emergency personnel. Consequently a law enforcement
agency such as the sheriff’s department may utilize both secure and open communication
channels.
Radio and satellite transmission utilize standard frequencies, and this is difficult to make it
secure.1pt However, there are digital and encrypted devices that can be purchased and
utilized. Data for these types of devices can be encrypted for transmission.1pt Laptop
computers inside police vehicles can be set up with digital certificates and SSL transmission.
1pt The data that is transmitted is encrypted and secure. Again for radio communications
eavesdropping can occur when the officer has his radio communication transmitted on a loud
open speaker.1pt Officers could be provided with earplug speakers for more secure
conversations.1pt
PTS: 1
3. ANS:
A medium-sized engineering firm has three separate engineering offices. In each office, a local
LAN supports all the engineers in that office. Due to the requirement for collaboration among
the offices, all the computers should be able to view and update the data from any of the three
offices. In other words, the data storage server within each LAN should be accessible to all
computers, no matter where they are located. Draw a network diagram that will support this
configuration.
2pts or each office server (6pts), 2pts for each switch connecting each office to the LAN (6pts), 2pts
or computers connection to switch = 14pts
PTS: 1