0% found this document useful (0 votes)
81 views9 pages

MCOA021 SAD Test 2 - Chpts 5-7

This document contains a multiple choice test with 14 questions about system analysis and design topics such as use cases, sequence diagrams, and reports. It also includes 4 problems and 3 case studies requiring written responses. The problems address the purpose of CRUD, system sequence diagrams, and challenges of web applications. The case studies involve use case diagrams, developing a sequence diagram, and designing a network diagram.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views9 pages

MCOA021 SAD Test 2 - Chpts 5-7

This document contains a multiple choice test with 14 questions about system analysis and design topics such as use cases, sequence diagrams, and reports. It also includes 4 problems and 3 case studies requiring written responses. The problems address the purpose of CRUD, system sequence diagrams, and challenges of web applications. The case studies involve use case diagrams, developing a sequence diagram, and designing a network diagram.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

MCOA021 SAD Test 2 Date: 23 May 2023

Multiple Choice
Identify the choice that best completes the statement or answers the question.

____ 1. A unique set of internal activities within a use case which represents a unique path through the use case is
called a(n) _______.
a. workflow c. scenario
b. sequence of activities d. critical path
____ 2. Which of the following is the best model to use to document the inputs and the outputs to a system?
a. State chart diagram c. Activity diagram
b. Fully developed use case description d. System sequence diagram
____ 3. In UML terminology in a sequence diagram, a message refers to a(n) _______.
a. input data c. event
b. communication between actors d. action
____ 4. In a sequence diagram the message-name is usually given in what format?
a. verb-noun c. action-object
b. noun-verb d. object-action
____ 5. A message event causes what to happen?
a. An activity to finish. c. A guard condition to be evaluated.
b. A message to fire. d. A transition to fire.
____ 6. Which if the following is NOT considered part of designing the application architecture and software?
a. Multilayer design c. Detailed design
b. Subsystem definition d. Program security design
____ 7. Which of the following is NOT a form of system interface?
a. Turn-around document c. Function call
b. File transfer d. Transaction interchange
____ 8. Limiting user access to the system is considered what type of design?
a. User interface design c. System interface design
b. Security and controls design d. Application software design
____ 9. The hosting alternative that is most like a utility is what?
a. Virtual server c. Cloud computing
b. Managed services d. Colocation
____ 10. Software (such as typical tax preparation software) which in essence interviews the user is following which
user interface metaphor?
a. Collaboration metaphor c. Interview metaphor
b. Document metaphor d. Dialog metaphor
____ 11. What does XML stand for?
a. Extended Module Links c. Extensible Markup Language
b. External Machine Language d. Extensible Modern Language
____ 12. Reports that are not predefined by a programmer, but are designed as needed, are called ____ reports.
a. one-time c. business
b. quick and dirty d. ad hoc
____ 13. A report that is used primarily for strategic decision making is called a(n) ____ report.
a. executive c. exception
b. key item d. summary
____ 14. Electronic reports can provide a(n) ____ on the report to activate a lower-level report, which provides more
detailed information.
a. cursor link c. mouseover
b. activation key d. hot spot hyperlink

Problems

1. What is the purpose of using the CRUD technique? (5)

2. Briefly describe the purpose of a system sequence diagram. (4)

3. State and briefly describe the three potential problems of implementing an application through the Web.
(6)

4. When considering a hosting alternative, there are five areas that must be considered. Describe each.
(10)
Cases

1. Consider the figure below showing a set of use cases for the patient and physician actors and answer the
questions that follow.

a. Which use cases include which other use cases? Modify the diagram to incorporate those relationships.
(6)
b. Consider the use cases View/respond to alert and View history. Both actors share the latter, but
each has a different version of the former. Why do the actors have different versions of the
View/respond to alert use case? Would the diagram be incorrect if each actor had his own version of
the View history use case? Why or why not? (7)

c. Develop an SSD for the View history use case. Assume that the system will automatically display
the most recent glucose level, which is updated at five-minute intervals by default. Assume further
that the user can ask the system to view glucose levels during a user-specified time period and that
the levels can be displayed in tabular form or as a graph. (12)

2. Law enforcement agencies thrive on information. In previous eras, it was sufficient to receive
information through the police dispatch radio. Today, much more than voice based information is
required. Officers often need to check vehicle registrations, personal identities, outstanding warrants,
mug shots, maps, and the locations of other officers.
One major difficulty with meeting this need for more information is figuring out how to transmit the
data to remote and mobile locations. Local police agencies are sometimes able to restrict their
transmission needs to within the city limits. However, county sheriffs and state troopers often have
to travel to remote locations that aren’t within a metropolitan area’s boundaries.
Suppose a rural county sheriff’s department has received a grant to upgrade its existing voice-only
communication system. Among other requirements, the grant specifies that all communications must
be protected against eavesdropping and unintended information disclosure.

Your assignment: Recommend specific controls to be applied to radio, cellular, and satellite
transmissions. How will you ensure that only sheriffs and other authorized users can use the system?
(8)

3. A medium-sized engineering firm has three separate engineering offices. In each office, a local LAN
supports all the engineers in that office. Due to the requirement for collaboration among the offices,
all the computers should be able to view and update the data from any of the three offices. In other
words, the data storage server within each LAN should be accessible to all computers, no matter
where they are located. Draw a network diagram that will support this configuration.
(14)
SAD Test 2
Answer Section

MULTIPLE CHOICE

1. ANS: C PTS: 1
2. ANS: D PTS: 1
3. ANS: D PTS: 1
4. ANS: A PTS: 1
5. ANS: D PTS: 1
6. ANS: D PTS: 1
7. ANS: A PTS: 1
8. ANS: B PTS: 1
9. ANS: C PTS: 1
10. ANS: D PTS: 1
11. ANS: C PTS: 1
12. ANS: D PTS: 1
13. ANS: A PTS: 1
14. ANS: D PTS: 1

PROBLEM

1. ANS:

To ensure that every class has sufficient use cases to “cover” all the required actions. 1pt
Every object in a class in the new system must be instantiated, 1ptmust be able to be edited or
updated1pt, must be able to be access for reporting and processing1pt, and in most cases
should be deleted or archived1pt.

PTS: 1
2. ANS:
A system sequence diagram (SSD) is used to describe the flow of information into and out of the automated
system. Thus, an SSD documents the inputs and the outputs 2pt and identifies the interaction between actors
and the system.2pt

PTS: 1
3. ANS:
1. Security —Web servers are a well-defined target for security breaches because Web standards are open and
widely known. Wide-scale interconnection of networks and the use of Internet and Web standards make
servers accessible to a global pool of hackers. 2pt
2. Throughput —When high loads occur, throughput and response time can suffer significantly.2pt
3. Changing standards —Web standards change rapidly.2pt

PTS: 1
4. ANS:
2pts each (state and describing) = 10pts
1. Reliability —The hardware environment must be completely reliable because customers and other outside
parties usually have a very low tolerance for systems that aren’t available.
2. Security —The systems? —hardware and software? —must be secure.
3. Physical facilities —To ensure reliability and security, special rooms or even special buildings are often
required. In addition, Internet connectivity frequently requires multiple access routes to the Internet backbone.
Electrical power must be secure, which often means having backup generators on-site.
4. Staff —To ensure reliability and security, a well-qualified technical staff needs to be on-site 24/7.
5. Growth —External systems often grow dramatically as a business expands, increasing the number of
servers needed to respond to the traffic.

PTS: 1

CASE

1. ANS:
a. Which use cases include which other use cases? Modify the diagram to incorporate included
relationships.
- see the 3 pairs in the diagram below with <<includes>> relationships = 6pts

b. Consider the use cases View/respond to alert and View history. Both actors share the latter, but
each has a different version of the former. Why do the actors have different versions of the
View/respond to alert use case? Would the diagram be incorrect if each actor had his own version of
the View history use case? Why or why not?
View/respond to alert: Even though the names are the same, the detail steps might be very
different.1pt It would be possible to make them different scenarios of the same use case.1pt
But making them separate use cases also works since the actors are different,1pt the steps are
different,1pt and the system responses are different. 1pt
View history: View history does the same activities no matter who the actor is. 1pt In this
case it would not make sense to have separate use cases since the processing steps, the data,
the activities are both the same. 1pt
c. Develop an SSD for the View history use case. Assume that the system will automatically display
the most recent glucose level, which is updated at five-minute intervals by default. Assume further
that the user can ask the system to view glucose levels during a user-specified time period and that
the levels can be displayed in tabular form or as a graph.
3pts for actors, 2pts for each request from user(s) (6pts), 2pts or the response from system, 1pt for
the vertical lines indicating the system boundaries = 12pts

PTS: 1
2. ANS:
Law enforcement agencies thrive on information. In previous eras, it was sufficient to receive
information through the police dispatch radio. Today, much more than voice based information is
required. Officers often need to check vehicle registrations, personal identities, outstanding warrants,
mug shots, maps, and the locations of other officers.
One major difficulty with meeting this need for more information is figuring out how to
transmit the data to remote and mobile locations. Local police agencies are sometimes able to restrict
their transmission needs to within the city limits. However, county sheriffs and state troopers often
have to travel to remote locations that aren’t within a metropolitan area’s boundaries.
Suppose a rural county sheriff’s department has received a grant to upgrade its existing
voice-only communication system. Among other requirements, the grant specifies that all
communications must be protected against eavesdropping and unintended information disclosure.
Your assignment: Recommend specific controls to be applied to radio, cellular, and satellite
transmissions. How will you ensure that only sheriffs and other authorized users can use the system?
Answers will vary by student. The objective of this assignment is to get students
thinking about issues.
One of the problems with totally secure communication is that often communications must
occur between groups such as sheriff’s department, local police, state police, fire
departments, and possibly other emergency personnel. Consequently a law enforcement
agency such as the sheriff’s department may utilize both secure and open communication
channels.

Cellular transmission tends to be fairly secure simply because it is one-to-one


communications1pt. The voice communication is not of itself encrypted, so it can potentially
be monitored1pt. However, each phone connection has a unique configuration which
changes each time and consequently is difficult to eavesdrop. 1pt (Most eavesdropping
occurs on either end when other people overhear the conversation.)

Radio and satellite transmission utilize standard frequencies, and this is difficult to make it
secure.1pt However, there are digital and encrypted devices that can be purchased and
utilized. Data for these types of devices can be encrypted for transmission.1pt Laptop
computers inside police vehicles can be set up with digital certificates and SSL transmission.
1pt The data that is transmitted is encrypted and secure. Again for radio communications
eavesdropping can occur when the officer has his radio communication transmitted on a loud
open speaker.1pt Officers could be provided with earplug speakers for more secure
conversations.1pt

PTS: 1
3. ANS:
A medium-sized engineering firm has three separate engineering offices. In each office, a local
LAN supports all the engineers in that office. Due to the requirement for collaboration among
the offices, all the computers should be able to view and update the data from any of the three
offices. In other words, the data storage server within each LAN should be accessible to all
computers, no matter where they are located. Draw a network diagram that will support this
configuration.
2pts or each office server (6pts), 2pts for each switch connecting each office to the LAN (6pts), 2pts
or computers connection to switch = 14pts
PTS: 1

You might also like