Computer Networking and Online Shopping Quiz
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary user actor involved in fulfilling all the listed use cases?

  • Product Manager
  • Customer (correct)
  • Customer Service Representative
  • Inventory Manager
  • Which of the following use cases represent customer requests made while shopping online?

  • Fill shopping cart
  • Checkout shopping cart
  • Empty shopping cart
  • All of the above (correct)
  • In the context provided, which domain class is related to inventory management?

  • CartItem
  • SaleTrans
  • InventoryItem (correct)
  • OnlineCart
  • Which event typically occurs after a sale is completed according to the use cases listed?

    <p>Fill shopping cart</p> Signup and view all the answers

    What is a common reason for a customer to request to empty a shopping cart?

    <p>Change their mind about the products</p> Signup and view all the answers

    What is the primary function of a server within a computing system?

    <p>To manage shared resources and facilitate access</p> Signup and view all the answers

    Which statement correctly describes a Local Area Network (LAN)?

    <p>A small network designed for a single site</p> Signup and view all the answers

    What does a Uniform Resource Locator (URL) represent in networking?

    <p>An identifier used to locate a specific resource on the web</p> Signup and view all the answers

    Which type of software operates in the background and integrates system components?

    <p>System software</p> Signup and view all the answers

    Which of the following best describes application software?

    <p>Software utilized to perform work for users</p> Signup and view all the answers

    What characterizes the Internet backbone?

    <p>High-capacity, high-bandwidth trunk lines with significant computing power</p> Signup and view all the answers

    What differentiates a custom app from a web-based application?

    <p>Custom apps are designed specifically for certain hardware, while web apps run in browsers</p> Signup and view all the answers

    Which method is used to submit data to a server?

    <p>POST</p> Signup and view all the answers

    What does HTTPS ensure during data transmission?

    <p>Security via SSL/TLS encryption</p> Signup and view all the answers

    Which component is NOT part of technology architecture?

    <p>APIs</p> Signup and view all the answers

    What is the focus of application architecture?

    <p>Structuring and interacting components of an application</p> Signup and view all the answers

    What does the acronym CIA represent in the context of HTTPS?

    <p>Confidentiality, Integrity, Authentication</p> Signup and view all the answers

    Which statement best describes the relationship between technology architecture and application architecture?

    <p>Technology architecture complements application architecture.</p> Signup and view all the answers

    Which of the following methods would be used to remove a resource?

    <p>DELETE</p> Signup and view all the answers

    Which of the following is most likely considered a non-functional requirement of an application?

    <p>Performance and scalability</p> Signup and view all the answers

    What is the primary purpose of using SSL/TLS in HTTPS?

    <p>To protect data confidentiality and integrity</p> Signup and view all the answers

    Which factor is NOT considered when describing the environment for application design?

    <p>Budget constraints</p> Signup and view all the answers

    When grouping functions to build application components, which aspect is considered?

    <p>Actors involved</p> Signup and view all the answers

    In the context of customer interactions, what is a primary purpose of tracking shipments?

    <p>To fulfill customer requests about order status</p> Signup and view all the answers

    Which user group is NOT involved in the creation of a phone sale order?

    <p>Store sales representative</p> Signup and view all the answers

    What is a common event that would trigger a request for creating or updating a customer account?

    <p>Customer making a new purchase</p> Signup and view all the answers

    Which component is primarily involved in handling customer product comments and ratings?

    <p>Customer</p> Signup and view all the answers

    What is the primary function of the 'Look up order status' event?

    <p>To provide shipment details</p> Signup and view all the answers

    Which user is primarily associated with creating a store sale?

    <p>Store sales representative</p> Signup and view all the answers

    Which of the following items would NOT typically share data in the context of the sale process?

    <p>ShippingData</p> Signup and view all the answers

    What function does the 'Search for item' event primarily serve?

    <p>To locate items for customers</p> Signup and view all the answers

    What is the primary role of the system in the context of data management?

    <p>Interacting with databases for data handling</p> Signup and view all the answers

    Which aspect of interoperability focuses on the format and structure of data?

    <p>Syntactic aspect</p> Signup and view all the answers

    Why is interoperability considered important in current development projects?

    <p>It enables the reuse of existing software components.</p> Signup and view all the answers

    What type of questions should be asked to describe the environment for system analysis?

    <p>What are the key features of the existing environment?</p> Signup and view all the answers

    Which of the following is NOT a key aspect of interoperability?

    <p>Technological aspect</p> Signup and view all the answers

    Which of the following is a critical consideration when describing the interaction with external systems?

    <p>The protocols in use</p> Signup and view all the answers

    What is essential when combining components into a solution system?

    <p>Focusing on interoperability</p> Signup and view all the answers

    What is a key question concerning external databases during systems analysis?

    <p>What kind of interaction is needed?</p> Signup and view all the answers

    Which of the following best describes data integrity in relation to data management?

    <p>Maintaining the accuracy and consistency of data</p> Signup and view all the answers

    In the context of systems analysis, what does the term 'environment' refer to?

    <p>The set of external systems and components</p> Signup and view all the answers

    Study Notes

    Chapter 7: Systems Analysis and Design

    • Seventh edition of a textbook on systems analysis and design
    • Authors: John Satzinger, Robert Jackson, and Stephen Burd
    • Publication year: 2016
    • Publisher: Cengage Learning

    Defining the System Architecture

    • Discusses the critical component of choosing appropriate technologies for new system development
    • Defines and summarizes technology and architectural concepts
    • Explains the key aspects of describing a system's environment and the process to design application components

    Chapter 7: Outline

    • Anatomy of a Modern Information System
    • Architectural Concepts
    • Interoperability
    • Architectural Diagrams
    • Describing the Environment
    • Designing Application Components

    Learning Objectives

    • Understand architectural concepts, including ubiquitous computing, components, protocols, interoperability, and distributed architectures
    • Effectively describe location, network, and deployment diagrams
    • Analyze system environments and answer key questions through architectural diagrams
    • Create designs for larger application components based on use cases and analysis models

    Overview

    • Choosing appropriate technologies is crucial for new system development.
    • Key technologies and architectural concepts must be explained and summarized.
    • Activities related to describing the environment and designing application components need detailed consideration.

    Activities of "Design System Components"

    • Core processes of new system components design: -Identifying the problem and obtaining approval. -Planning and monitoring the project. -Discovering and understanding project details. -Designing system components. -Building, testing, and integrating system components. -Completing system tests and deploying the solution. -Several iterations of these processes are required for new system components design.

    Anatomy of a Modern System – Computing Devices

    • Servers: Manage shared resources, enabling access for other users and computers.
    • Personal computing devices (clients): Include desktops, laptops, tablets, and smartphones.

    Simplified architecture for application (Amazon.com)

    • Illustrates a simplified architecture for Amazon.com.
    • Key components shown: Payment processor, Shipper, Amazon server, and Internet connection.

    Anatomy - Networks (1 of 2)

    • Computer network: Includes hardware, software, and transmission media.
    • Internet backbone: High-capacity, high-bandwidth lines and computers, owned by governments and telecom companies.
    • Local area network (LAN): A small network for a single site.
    • World Wide Web (WWW): Interconnected resources via the Internet.

    Anatomy - Networks (2 of 2)

    • Uniform Resource Locator (URL): Used to locate a resource via web.
    • Hyperlink: A URL embedded within another resource.

    Anatomy - Software (1 of 3)

    • Application software: Programs that users employ to perform tasks.
    • Apps: Custom programs for laptops or smartphones.
    • System software: Manages fundamental operations to run the system.

    Anatomy - Software (2 of 3)

    • Diagram illustrating components of the software.
    • Operating system, Web server, Application programs, database management system, web, protocol types.
    • Components linked via network

    Anatomy - Software (3 of 3)

    • Web-Based Applications: Use web browsers, accessed via URLs, residing on web servers, using standard IP protocols.
    • Embedded Software: Software functions embedded within other applications. (Example: Toolbars, Plug-ins, Widgets)

    Anatomy - Protocols

    • Protocol: Set of languages and rules for hardware and software communication for exchanging data.
    • Virtual Private Network (VPN): Creates a private network using secure technologies and encryption on top of an internet connection

    Anatomy - Software and Protocols

    -Diagram illustrates relationships of software, hardware, and protocol components and network structure.

    Anatomy – Web Protocols

    • HTML: Hypertext markup language for web page structure and content.
    • XML: Extensible Markup Language, an extension of HTML to define the semantics of tags and data.
    • HTTP: Hypertext Transfer Protocol, defines format for web documents between clients and servers, and how resources are retrieved and delivered.

    HTTP Methods

    • GET: Retrieves data from a resource
    • POST: Submits data to a server
    • PUT: Updates or replaces a resource
    • DELETE: Removes a resource
    • HEAD: Retrieves only the headers of a resource

    HTTPS (hypertext transfer protocol secure)

    • Encrypted and secure transfers of data using SSL/TLS encryption; ensuring confidentiality, integrity, and authentication.

    Architectural Concepts

    • Frameworks, Tools, Principles, and Patterns for Application: Design patterns are used for development and management of applications, ensuring scalability, security, maintainability according to business needs.
    • Technology architecture focuses on underlying infrastructure. Hardware, software, networks, and integration systems are considered.
    • Physical servers, cloud platforms, storage systems, virtualization, networking, and security are included.

    Architectural Concepts – Application Architecture

    • Defines structure, components, and interactions; assuring functional and non-functional requirements
    • Key elements include front-end, back-end, APIs, and relational/NoSQL databases.
    • Technology and application architecture complement each other. Technology architecture provides infrastructure and tools, while application architecture defines the structure and interactions with the infrastructure.

    Software as a Service (SaaS)

    • Software not installed on user devices.
    • Application services accessed remotely.
    • User data stored on common servers.

    Web Services

    • Software function executed with Web standards.
    • Accessed via URLs.
    • Inputs sent via URLs, executes remotely and responses returned in web pages.

    Distributed Architectures

    • Client/Server architecture: part of the application resides on a server, and another part resides on the client.
    • Three-tier architecture: pattern in software engineering for distributed systems and web applications; each layer has a specific role—view, logic, and data.

    Distributed Architecture: Key Components

    • View layer: Presents user interface and handles user interactions. Presenting data in a way users can understand and interact with the system. Also handling inputs.
    • Logic layer: Contains business logic, processes user requests, performs calculations and applying rules. Manages the flow of data.
    • Data layer: Manages and stores data in databases; interacts with other data sources.

    Three Layer Architecture

    • Diagram illustrates relationships among software layers.

    Interoperability

    • Application ability to interact with other software. Key aspects include technical (data exchange consistently), semantic (data structure), and organizational (policies and workflow). Essential characteristic of current development projects.
    • Component descriptions must consider interoperability.

    Describing the Environment (1 of 2)

    • Critical questions to accurately describe environments:
      • Key features of existing or new environment (O/S, systems software, networks, tools).
      • External systems or DBMSs; type of interaction.
      • Data characteristics (types, structure).
      • Protocols and security requirements

    Describing the Environment (2 of 2)

    • Key questions (continued): -Required devices and protocols. -Security requirements. -User interface technology, user characteristics (skills, location). -Hardware and device types, and client O/S. -Necessary APIs

    Designing Application Components

    • Application component boundaries; function division among components.
    • Grouping functions to build components.
    • Actor (user) functions within the system.
    • Shared data components for common data access.
    • Event processing and sequence of actions within the environment.

    RMO CSMS Application Architecture (1 of 3), (2 of 3), (3 of 3)

    • Detailed example of use cases, user roles, domain classes, events, and grouped assignments based on these criteria.

    RMO CSMS Deployment Diagram

    • Graphical representation of the three-layer architecture.

    RMO CSMS Component Integration

    • System interactions and data flow within the system components.
    • Integration of different components and data flows are critically presented.

    RMO CSMS Data Ownership

    • System responsible for data maintenance. (Data source and update methods are shown).

    Summary (1 of 3)

    • Anatomy of a Modern Information System; Components (computing devices, networks, software, and protocols) and deployment characteristics.
    • Architectural concepts (software-as-a-service and Web services).
    • Distributed architecture(Client/server and three tier architectures).

    Summary (2 of 3)

    • Interoperability and architecture diagrams (location, network, and deployment).

    Summary (3 of 3)

    • Describing the environment (e.g., external systems, key questions).
    • Designing application components (components, functions, and system of record ownership).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on fundamental concepts of computer networking and online shopping use cases. This quiz covers topics such as inventory management, networking components, and the functions of application software. Challenge yourself and see how well you understand these essential aspects of technology!

    More Like This

    Use Quizgecko on...
    Browser
    Browser