Computer Networking and Online Shopping Quiz
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary user actor involved in fulfilling all the listed use cases?

  • Product Manager
  • Customer (correct)
  • Customer Service Representative
  • Inventory Manager

Which of the following use cases represent customer requests made while shopping online?

  • Fill shopping cart
  • Checkout shopping cart
  • Empty shopping cart
  • All of the above (correct)

In the context provided, which domain class is related to inventory management?

  • CartItem
  • SaleTrans
  • InventoryItem (correct)
  • OnlineCart

Which event typically occurs after a sale is completed according to the use cases listed?

<p>Fill shopping cart (A)</p> Signup and view all the answers

What is a common reason for a customer to request to empty a shopping cart?

<p>Change their mind about the products (D)</p> Signup and view all the answers

What is the primary function of a server within a computing system?

<p>To manage shared resources and facilitate access (A)</p> Signup and view all the answers

Which statement correctly describes a Local Area Network (LAN)?

<p>A small network designed for a single site (B)</p> Signup and view all the answers

What does a Uniform Resource Locator (URL) represent in networking?

<p>An identifier used to locate a specific resource on the web (A)</p> Signup and view all the answers

Which type of software operates in the background and integrates system components?

<p>System software (C)</p> Signup and view all the answers

Which of the following best describes application software?

<p>Software utilized to perform work for users (B)</p> Signup and view all the answers

What characterizes the Internet backbone?

<p>High-capacity, high-bandwidth trunk lines with significant computing power (A)</p> Signup and view all the answers

What differentiates a custom app from a web-based application?

<p>Custom apps are designed specifically for certain hardware, while web apps run in browsers (D)</p> Signup and view all the answers

Which method is used to submit data to a server?

<p>POST (A)</p> Signup and view all the answers

What does HTTPS ensure during data transmission?

<p>Security via SSL/TLS encryption (D)</p> Signup and view all the answers

Which component is NOT part of technology architecture?

<p>APIs (A)</p> Signup and view all the answers

What is the focus of application architecture?

<p>Structuring and interacting components of an application (B)</p> Signup and view all the answers

What does the acronym CIA represent in the context of HTTPS?

<p>Confidentiality, Integrity, Authentication (B)</p> Signup and view all the answers

Which statement best describes the relationship between technology architecture and application architecture?

<p>Technology architecture complements application architecture. (D)</p> Signup and view all the answers

Which of the following methods would be used to remove a resource?

<p>DELETE (D)</p> Signup and view all the answers

Which of the following is most likely considered a non-functional requirement of an application?

<p>Performance and scalability (D)</p> Signup and view all the answers

What is the primary purpose of using SSL/TLS in HTTPS?

<p>To protect data confidentiality and integrity (D)</p> Signup and view all the answers

Which factor is NOT considered when describing the environment for application design?

<p>Budget constraints (D)</p> Signup and view all the answers

When grouping functions to build application components, which aspect is considered?

<p>Actors involved (A)</p> Signup and view all the answers

In the context of customer interactions, what is a primary purpose of tracking shipments?

<p>To fulfill customer requests about order status (A)</p> Signup and view all the answers

Which user group is NOT involved in the creation of a phone sale order?

<p>Store sales representative (C)</p> Signup and view all the answers

What is a common event that would trigger a request for creating or updating a customer account?

<p>Customer making a new purchase (B)</p> Signup and view all the answers

Which component is primarily involved in handling customer product comments and ratings?

<p>Customer (A)</p> Signup and view all the answers

What is the primary function of the 'Look up order status' event?

<p>To provide shipment details (C)</p> Signup and view all the answers

Which user is primarily associated with creating a store sale?

<p>Store sales representative (D)</p> Signup and view all the answers

Which of the following items would NOT typically share data in the context of the sale process?

<p>ShippingData (A)</p> Signup and view all the answers

What function does the 'Search for item' event primarily serve?

<p>To locate items for customers (A)</p> Signup and view all the answers

What is the primary role of the system in the context of data management?

<p>Interacting with databases for data handling (C)</p> Signup and view all the answers

Which aspect of interoperability focuses on the format and structure of data?

<p>Syntactic aspect (C)</p> Signup and view all the answers

Why is interoperability considered important in current development projects?

<p>It enables the reuse of existing software components. (C)</p> Signup and view all the answers

What type of questions should be asked to describe the environment for system analysis?

<p>What are the key features of the existing environment? (C)</p> Signup and view all the answers

Which of the following is NOT a key aspect of interoperability?

<p>Technological aspect (A)</p> Signup and view all the answers

Which of the following is a critical consideration when describing the interaction with external systems?

<p>The protocols in use (D)</p> Signup and view all the answers

What is essential when combining components into a solution system?

<p>Focusing on interoperability (A)</p> Signup and view all the answers

What is a key question concerning external databases during systems analysis?

<p>What kind of interaction is needed? (A)</p> Signup and view all the answers

Which of the following best describes data integrity in relation to data management?

<p>Maintaining the accuracy and consistency of data (B)</p> Signup and view all the answers

In the context of systems analysis, what does the term 'environment' refer to?

<p>The set of external systems and components (A)</p> Signup and view all the answers

Flashcards

What is a server?

A computer system that provides resources to users or other computers.

What are client devices?

Computing devices used by individuals to access information and applications.

What is the internet backbone?

A high-capacity network backbone connecting various networks worldwide, owned by governments and telecom companies.

What is a LAN (Local Area Network)?

A small network connecting computers within a single location.

Signup and view all the flashcards

What is the World Wide Web (WWW)?

The entire collection of resources accessible through the internet, connected through hyperlinks.

Signup and view all the flashcards

What is a URL (Uniform Resource Locator)?

A unique identifier used to locate specific resources on the web.

Signup and view all the flashcards

What is a hyperlink?

A link embedded within another resource, leading to another resource on the web.

Signup and view all the flashcards

GET Request

A method used to retrieve data or a resource from a server.

Signup and view all the flashcards

POST Request

A method used to submit data to a server to create a new resource.

Signup and view all the flashcards

PUT Request

A method used to update or replace an existing resource on a server.

Signup and view all the flashcards

DELETE Request

A method used to delete a resource from a server.

Signup and view all the flashcards

HEAD Request

A method used to retrieve only the headers of a resource, without the actual content.

Signup and view all the flashcards

HTTPS

A secure version of the HTTP protocol that uses encryption to protect data during transmission.

Signup and view all the flashcards

Architectural Concepts

The framework that defines how applications are developed, managed, and interact with the underlying infrastructure.

Signup and view all the flashcards

Technology Architecture

The part of the architecture that focuses on the physical infrastructure, like servers, networks, and storage.

Signup and view all the flashcards

Application Architecture

The part of the architecture that focuses on the structure and components of an application.

Signup and view all the flashcards

Online Cart

A grouping of data that represents a customer's items available for sale, including information about the product, inventory, cart items, and online cart.

Signup and view all the flashcards

Empty Shopping Cart

A customer action to remove items from their online cart, reflecting their decision to no longer purchase those items.

Signup and view all the flashcards

Fill Shopping Cart

A customer action to add items to their online cart, indicating their interest in purchasing those items.

Signup and view all the flashcards

Check Out

A phase of the shopping process where a customer commits to buying the items in their online cart.

Signup and view all the flashcards

Fill Reserve Cart

A customer action to add items to a temporary holding space for potential future purchase.

Signup and view all the flashcards

Data Access Layer

A layer in a software architecture that interacts directly with databases or other forms of persistent storage to save, retrieve, and update data. It's responsible for data management, integrity, and storage.

Signup and view all the flashcards

Interoperability

The ability of an application to interact with other software systems seamlessly. This includes technical, semantic, syntactic, and organizational aspects.

Signup and view all the flashcards

Semantic Interoperability

The way data is exchanged between systems in a meaningful way, ensuring consistent understanding.

Signup and view all the flashcards

Syntactic Interoperability

The format and structure of data being consistent across different systems.

Signup and view all the flashcards

Organizational Interoperability

The policies, workflows, and agreements that govern how systems interact.

Signup and view all the flashcards

Describing the Environment

Understanding the existing environment before developing a new system.

Signup and view all the flashcards

Reusing Existing Software Components

Identifying and analyzing existing software components, both purchased and developed in-house, for potential reuse.

Signup and view all the flashcards

Build with Interoperability in Mind

Developing new software components with the ability to work with other systems, both current and future.

Signup and view all the flashcards

Combining Components into a Solution System

Combining different software components into a cohesive and functional system.

Signup and view all the flashcards

Three-Layer Architecture

A software architecture that separates the application into three distinct layers: presentation, business logic, and data access.

Signup and view all the flashcards

Application Component Design

The process of identifying and defining the components of an application, including their functions, interactions, and boundaries.

Signup and view all the flashcards

Component Grouping

Grouping application functions based on shared data, events, or actors, creating logical units within the system.

Signup and view all the flashcards

Actors in Component Design

The entities that interact with an application, such as users or external systems.

Signup and view all the flashcards

Shared Data in Component Design

Information elements shared by multiple components or functions, influencing how they are grouped.

Signup and view all the flashcards

Events in Component Design

Key occurrences or actions within the application that trigger specific functions and component interactions.

Signup and view all the flashcards

Component Functions

The specific responsibilities or tasks assigned to each component within the application.

Signup and view all the flashcards

Application Component Boundaries

The clear separation and boundaries between components, defining their scope and responsibilities.

Signup and view all the flashcards

User-Interface Technology Choice

The technology used to create the user interface, considering factors like target audience, accessibility, and platform compatibility.

Signup and view all the flashcards

User Profile Considerations

The characteristics of users, including their technical skills, location, and access needs, influencing application design.

Signup and view all the flashcards

Technical Environment Analysis

Determining the specific hardware, software, and networking infrastructure required for the application to function correctly.

Signup and view all the flashcards

Study Notes

Chapter 7: Systems Analysis and Design

  • Seventh edition of a textbook on systems analysis and design
  • Authors: John Satzinger, Robert Jackson, and Stephen Burd
  • Publication year: 2016
  • Publisher: Cengage Learning

Defining the System Architecture

  • Discusses the critical component of choosing appropriate technologies for new system development
  • Defines and summarizes technology and architectural concepts
  • Explains the key aspects of describing a system's environment and the process to design application components

Chapter 7: Outline

  • Anatomy of a Modern Information System
  • Architectural Concepts
  • Interoperability
  • Architectural Diagrams
  • Describing the Environment
  • Designing Application Components

Learning Objectives

  • Understand architectural concepts, including ubiquitous computing, components, protocols, interoperability, and distributed architectures
  • Effectively describe location, network, and deployment diagrams
  • Analyze system environments and answer key questions through architectural diagrams
  • Create designs for larger application components based on use cases and analysis models

Overview

  • Choosing appropriate technologies is crucial for new system development.
  • Key technologies and architectural concepts must be explained and summarized.
  • Activities related to describing the environment and designing application components need detailed consideration.

Activities of "Design System Components"

  • Core processes of new system components design: -Identifying the problem and obtaining approval. -Planning and monitoring the project. -Discovering and understanding project details. -Designing system components. -Building, testing, and integrating system components. -Completing system tests and deploying the solution. -Several iterations of these processes are required for new system components design.

Anatomy of a Modern System – Computing Devices

  • Servers: Manage shared resources, enabling access for other users and computers.
  • Personal computing devices (clients): Include desktops, laptops, tablets, and smartphones.

Simplified architecture for application (Amazon.com)

  • Illustrates a simplified architecture for Amazon.com.
  • Key components shown: Payment processor, Shipper, Amazon server, and Internet connection.

Anatomy - Networks (1 of 2)

  • Computer network: Includes hardware, software, and transmission media.
  • Internet backbone: High-capacity, high-bandwidth lines and computers, owned by governments and telecom companies.
  • Local area network (LAN): A small network for a single site.
  • World Wide Web (WWW): Interconnected resources via the Internet.

Anatomy - Networks (2 of 2)

  • Uniform Resource Locator (URL): Used to locate a resource via web.
  • Hyperlink: A URL embedded within another resource.

Anatomy - Software (1 of 3)

  • Application software: Programs that users employ to perform tasks.
  • Apps: Custom programs for laptops or smartphones.
  • System software: Manages fundamental operations to run the system.

Anatomy - Software (2 of 3)

  • Diagram illustrating components of the software.
  • Operating system, Web server, Application programs, database management system, web, protocol types.
  • Components linked via network

Anatomy - Software (3 of 3)

  • Web-Based Applications: Use web browsers, accessed via URLs, residing on web servers, using standard IP protocols.
  • Embedded Software: Software functions embedded within other applications. (Example: Toolbars, Plug-ins, Widgets)

Anatomy - Protocols

  • Protocol: Set of languages and rules for hardware and software communication for exchanging data.
  • Virtual Private Network (VPN): Creates a private network using secure technologies and encryption on top of an internet connection

Anatomy - Software and Protocols

-Diagram illustrates relationships of software, hardware, and protocol components and network structure.

Anatomy – Web Protocols

  • HTML: Hypertext markup language for web page structure and content.
  • XML: Extensible Markup Language, an extension of HTML to define the semantics of tags and data.
  • HTTP: Hypertext Transfer Protocol, defines format for web documents between clients and servers, and how resources are retrieved and delivered.

HTTP Methods

  • GET: Retrieves data from a resource
  • POST: Submits data to a server
  • PUT: Updates or replaces a resource
  • DELETE: Removes a resource
  • HEAD: Retrieves only the headers of a resource

HTTPS (hypertext transfer protocol secure)

  • Encrypted and secure transfers of data using SSL/TLS encryption; ensuring confidentiality, integrity, and authentication.

Architectural Concepts

  • Frameworks, Tools, Principles, and Patterns for Application: Design patterns are used for development and management of applications, ensuring scalability, security, maintainability according to business needs.
  • Technology architecture focuses on underlying infrastructure. Hardware, software, networks, and integration systems are considered.
  • Physical servers, cloud platforms, storage systems, virtualization, networking, and security are included.

Architectural Concepts – Application Architecture

  • Defines structure, components, and interactions; assuring functional and non-functional requirements
  • Key elements include front-end, back-end, APIs, and relational/NoSQL databases.
  • Technology and application architecture complement each other. Technology architecture provides infrastructure and tools, while application architecture defines the structure and interactions with the infrastructure.

Software as a Service (SaaS)

  • Software not installed on user devices.
  • Application services accessed remotely.
  • User data stored on common servers.

Web Services

  • Software function executed with Web standards.
  • Accessed via URLs.
  • Inputs sent via URLs, executes remotely and responses returned in web pages.

Distributed Architectures

  • Client/Server architecture: part of the application resides on a server, and another part resides on the client.
  • Three-tier architecture: pattern in software engineering for distributed systems and web applications; each layer has a specific role—view, logic, and data.

Distributed Architecture: Key Components

  • View layer: Presents user interface and handles user interactions. Presenting data in a way users can understand and interact with the system. Also handling inputs.
  • Logic layer: Contains business logic, processes user requests, performs calculations and applying rules. Manages the flow of data.
  • Data layer: Manages and stores data in databases; interacts with other data sources.

Three Layer Architecture

  • Diagram illustrates relationships among software layers.

Interoperability

  • Application ability to interact with other software. Key aspects include technical (data exchange consistently), semantic (data structure), and organizational (policies and workflow). Essential characteristic of current development projects.
  • Component descriptions must consider interoperability.

Describing the Environment (1 of 2)

  • Critical questions to accurately describe environments:
    • Key features of existing or new environment (O/S, systems software, networks, tools).
    • External systems or DBMSs; type of interaction.
    • Data characteristics (types, structure).
    • Protocols and security requirements

Describing the Environment (2 of 2)

  • Key questions (continued): -Required devices and protocols. -Security requirements. -User interface technology, user characteristics (skills, location). -Hardware and device types, and client O/S. -Necessary APIs

Designing Application Components

  • Application component boundaries; function division among components.
  • Grouping functions to build components.
  • Actor (user) functions within the system.
  • Shared data components for common data access.
  • Event processing and sequence of actions within the environment.

RMO CSMS Application Architecture (1 of 3), (2 of 3), (3 of 3)

  • Detailed example of use cases, user roles, domain classes, events, and grouped assignments based on these criteria.

RMO CSMS Deployment Diagram

  • Graphical representation of the three-layer architecture.

RMO CSMS Component Integration

  • System interactions and data flow within the system components.
  • Integration of different components and data flows are critically presented.

RMO CSMS Data Ownership

  • System responsible for data maintenance. (Data source and update methods are shown).

Summary (1 of 3)

  • Anatomy of a Modern Information System; Components (computing devices, networks, software, and protocols) and deployment characteristics.
  • Architectural concepts (software-as-a-service and Web services).
  • Distributed architecture(Client/server and three tier architectures).

Summary (2 of 3)

  • Interoperability and architecture diagrams (location, network, and deployment).

Summary (3 of 3)

  • Describing the environment (e.g., external systems, key questions).
  • Designing application components (components, functions, and system of record ownership).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on fundamental concepts of computer networking and online shopping use cases. This quiz covers topics such as inventory management, networking components, and the functions of application software. Challenge yourself and see how well you understand these essential aspects of technology!

More Like This

Use Quizgecko on...
Browser
Browser