Podcast
Questions and Answers
What is the primary user actor involved in fulfilling all the listed use cases?
What is the primary user actor involved in fulfilling all the listed use cases?
Which of the following use cases represent customer requests made while shopping online?
Which of the following use cases represent customer requests made while shopping online?
In the context provided, which domain class is related to inventory management?
In the context provided, which domain class is related to inventory management?
Which event typically occurs after a sale is completed according to the use cases listed?
Which event typically occurs after a sale is completed according to the use cases listed?
Signup and view all the answers
What is a common reason for a customer to request to empty a shopping cart?
What is a common reason for a customer to request to empty a shopping cart?
Signup and view all the answers
What is the primary function of a server within a computing system?
What is the primary function of a server within a computing system?
Signup and view all the answers
Which statement correctly describes a Local Area Network (LAN)?
Which statement correctly describes a Local Area Network (LAN)?
Signup and view all the answers
What does a Uniform Resource Locator (URL) represent in networking?
What does a Uniform Resource Locator (URL) represent in networking?
Signup and view all the answers
Which type of software operates in the background and integrates system components?
Which type of software operates in the background and integrates system components?
Signup and view all the answers
Which of the following best describes application software?
Which of the following best describes application software?
Signup and view all the answers
What characterizes the Internet backbone?
What characterizes the Internet backbone?
Signup and view all the answers
What differentiates a custom app from a web-based application?
What differentiates a custom app from a web-based application?
Signup and view all the answers
Which method is used to submit data to a server?
Which method is used to submit data to a server?
Signup and view all the answers
What does HTTPS ensure during data transmission?
What does HTTPS ensure during data transmission?
Signup and view all the answers
Which component is NOT part of technology architecture?
Which component is NOT part of technology architecture?
Signup and view all the answers
What is the focus of application architecture?
What is the focus of application architecture?
Signup and view all the answers
What does the acronym CIA represent in the context of HTTPS?
What does the acronym CIA represent in the context of HTTPS?
Signup and view all the answers
Which statement best describes the relationship between technology architecture and application architecture?
Which statement best describes the relationship between technology architecture and application architecture?
Signup and view all the answers
Which of the following methods would be used to remove a resource?
Which of the following methods would be used to remove a resource?
Signup and view all the answers
Which of the following is most likely considered a non-functional requirement of an application?
Which of the following is most likely considered a non-functional requirement of an application?
Signup and view all the answers
What is the primary purpose of using SSL/TLS in HTTPS?
What is the primary purpose of using SSL/TLS in HTTPS?
Signup and view all the answers
Which factor is NOT considered when describing the environment for application design?
Which factor is NOT considered when describing the environment for application design?
Signup and view all the answers
When grouping functions to build application components, which aspect is considered?
When grouping functions to build application components, which aspect is considered?
Signup and view all the answers
In the context of customer interactions, what is a primary purpose of tracking shipments?
In the context of customer interactions, what is a primary purpose of tracking shipments?
Signup and view all the answers
Which user group is NOT involved in the creation of a phone sale order?
Which user group is NOT involved in the creation of a phone sale order?
Signup and view all the answers
What is a common event that would trigger a request for creating or updating a customer account?
What is a common event that would trigger a request for creating or updating a customer account?
Signup and view all the answers
Which component is primarily involved in handling customer product comments and ratings?
Which component is primarily involved in handling customer product comments and ratings?
Signup and view all the answers
What is the primary function of the 'Look up order status' event?
What is the primary function of the 'Look up order status' event?
Signup and view all the answers
Which user is primarily associated with creating a store sale?
Which user is primarily associated with creating a store sale?
Signup and view all the answers
Which of the following items would NOT typically share data in the context of the sale process?
Which of the following items would NOT typically share data in the context of the sale process?
Signup and view all the answers
What function does the 'Search for item' event primarily serve?
What function does the 'Search for item' event primarily serve?
Signup and view all the answers
What is the primary role of the system in the context of data management?
What is the primary role of the system in the context of data management?
Signup and view all the answers
Which aspect of interoperability focuses on the format and structure of data?
Which aspect of interoperability focuses on the format and structure of data?
Signup and view all the answers
Why is interoperability considered important in current development projects?
Why is interoperability considered important in current development projects?
Signup and view all the answers
What type of questions should be asked to describe the environment for system analysis?
What type of questions should be asked to describe the environment for system analysis?
Signup and view all the answers
Which of the following is NOT a key aspect of interoperability?
Which of the following is NOT a key aspect of interoperability?
Signup and view all the answers
Which of the following is a critical consideration when describing the interaction with external systems?
Which of the following is a critical consideration when describing the interaction with external systems?
Signup and view all the answers
What is essential when combining components into a solution system?
What is essential when combining components into a solution system?
Signup and view all the answers
What is a key question concerning external databases during systems analysis?
What is a key question concerning external databases during systems analysis?
Signup and view all the answers
Which of the following best describes data integrity in relation to data management?
Which of the following best describes data integrity in relation to data management?
Signup and view all the answers
In the context of systems analysis, what does the term 'environment' refer to?
In the context of systems analysis, what does the term 'environment' refer to?
Signup and view all the answers
Study Notes
Chapter 7: Systems Analysis and Design
- Seventh edition of a textbook on systems analysis and design
- Authors: John Satzinger, Robert Jackson, and Stephen Burd
- Publication year: 2016
- Publisher: Cengage Learning
Defining the System Architecture
- Discusses the critical component of choosing appropriate technologies for new system development
- Defines and summarizes technology and architectural concepts
- Explains the key aspects of describing a system's environment and the process to design application components
Chapter 7: Outline
- Anatomy of a Modern Information System
- Architectural Concepts
- Interoperability
- Architectural Diagrams
- Describing the Environment
- Designing Application Components
Learning Objectives
- Understand architectural concepts, including ubiquitous computing, components, protocols, interoperability, and distributed architectures
- Effectively describe location, network, and deployment diagrams
- Analyze system environments and answer key questions through architectural diagrams
- Create designs for larger application components based on use cases and analysis models
Overview
- Choosing appropriate technologies is crucial for new system development.
- Key technologies and architectural concepts must be explained and summarized.
- Activities related to describing the environment and designing application components need detailed consideration.
Activities of "Design System Components"
- Core processes of new system components design: -Identifying the problem and obtaining approval. -Planning and monitoring the project. -Discovering and understanding project details. -Designing system components. -Building, testing, and integrating system components. -Completing system tests and deploying the solution. -Several iterations of these processes are required for new system components design.
Anatomy of a Modern System – Computing Devices
- Servers: Manage shared resources, enabling access for other users and computers.
- Personal computing devices (clients): Include desktops, laptops, tablets, and smartphones.
Simplified architecture for application (Amazon.com)
- Illustrates a simplified architecture for Amazon.com.
- Key components shown: Payment processor, Shipper, Amazon server, and Internet connection.
Anatomy - Networks (1 of 2)
- Computer network: Includes hardware, software, and transmission media.
- Internet backbone: High-capacity, high-bandwidth lines and computers, owned by governments and telecom companies.
- Local area network (LAN): A small network for a single site.
- World Wide Web (WWW): Interconnected resources via the Internet.
Anatomy - Networks (2 of 2)
- Uniform Resource Locator (URL): Used to locate a resource via web.
- Hyperlink: A URL embedded within another resource.
Anatomy - Software (1 of 3)
- Application software: Programs that users employ to perform tasks.
- Apps: Custom programs for laptops or smartphones.
- System software: Manages fundamental operations to run the system.
Anatomy - Software (2 of 3)
- Diagram illustrating components of the software.
- Operating system, Web server, Application programs, database management system, web, protocol types.
- Components linked via network
Anatomy - Software (3 of 3)
- Web-Based Applications: Use web browsers, accessed via URLs, residing on web servers, using standard IP protocols.
- Embedded Software: Software functions embedded within other applications. (Example: Toolbars, Plug-ins, Widgets)
Anatomy - Protocols
- Protocol: Set of languages and rules for hardware and software communication for exchanging data.
- Virtual Private Network (VPN): Creates a private network using secure technologies and encryption on top of an internet connection
Anatomy - Software and Protocols
-Diagram illustrates relationships of software, hardware, and protocol components and network structure.
Anatomy – Web Protocols
- HTML: Hypertext markup language for web page structure and content.
- XML: Extensible Markup Language, an extension of HTML to define the semantics of tags and data.
- HTTP: Hypertext Transfer Protocol, defines format for web documents between clients and servers, and how resources are retrieved and delivered.
HTTP Methods
- GET: Retrieves data from a resource
- POST: Submits data to a server
- PUT: Updates or replaces a resource
- DELETE: Removes a resource
- HEAD: Retrieves only the headers of a resource
HTTPS (hypertext transfer protocol secure)
- Encrypted and secure transfers of data using SSL/TLS encryption; ensuring confidentiality, integrity, and authentication.
Architectural Concepts
- Frameworks, Tools, Principles, and Patterns for Application: Design patterns are used for development and management of applications, ensuring scalability, security, maintainability according to business needs.
- Technology architecture focuses on underlying infrastructure. Hardware, software, networks, and integration systems are considered.
- Physical servers, cloud platforms, storage systems, virtualization, networking, and security are included.
Architectural Concepts – Application Architecture
- Defines structure, components, and interactions; assuring functional and non-functional requirements
- Key elements include front-end, back-end, APIs, and relational/NoSQL databases.
- Technology and application architecture complement each other. Technology architecture provides infrastructure and tools, while application architecture defines the structure and interactions with the infrastructure.
Software as a Service (SaaS)
- Software not installed on user devices.
- Application services accessed remotely.
- User data stored on common servers.
Web Services
- Software function executed with Web standards.
- Accessed via URLs.
- Inputs sent via URLs, executes remotely and responses returned in web pages.
Distributed Architectures
- Client/Server architecture: part of the application resides on a server, and another part resides on the client.
- Three-tier architecture: pattern in software engineering for distributed systems and web applications; each layer has a specific role—view, logic, and data.
Distributed Architecture: Key Components
- View layer: Presents user interface and handles user interactions. Presenting data in a way users can understand and interact with the system. Also handling inputs.
- Logic layer: Contains business logic, processes user requests, performs calculations and applying rules. Manages the flow of data.
- Data layer: Manages and stores data in databases; interacts with other data sources.
Three Layer Architecture
- Diagram illustrates relationships among software layers.
Interoperability
- Application ability to interact with other software. Key aspects include technical (data exchange consistently), semantic (data structure), and organizational (policies and workflow). Essential characteristic of current development projects.
- Component descriptions must consider interoperability.
Describing the Environment (1 of 2)
- Critical questions to accurately describe environments:
- Key features of existing or new environment (O/S, systems software, networks, tools).
- External systems or DBMSs; type of interaction.
- Data characteristics (types, structure).
- Protocols and security requirements
Describing the Environment (2 of 2)
- Key questions (continued): -Required devices and protocols. -Security requirements. -User interface technology, user characteristics (skills, location). -Hardware and device types, and client O/S. -Necessary APIs
Designing Application Components
- Application component boundaries; function division among components.
- Grouping functions to build components.
- Actor (user) functions within the system.
- Shared data components for common data access.
- Event processing and sequence of actions within the environment.
RMO CSMS Application Architecture (1 of 3), (2 of 3), (3 of 3)
- Detailed example of use cases, user roles, domain classes, events, and grouped assignments based on these criteria.
RMO CSMS Deployment Diagram
- Graphical representation of the three-layer architecture.
RMO CSMS Component Integration
- System interactions and data flow within the system components.
- Integration of different components and data flows are critically presented.
RMO CSMS Data Ownership
- System responsible for data maintenance. (Data source and update methods are shown).
Summary (1 of 3)
- Anatomy of a Modern Information System; Components (computing devices, networks, software, and protocols) and deployment characteristics.
- Architectural concepts (software-as-a-service and Web services).
- Distributed architecture(Client/server and three tier architectures).
Summary (2 of 3)
- Interoperability and architecture diagrams (location, network, and deployment).
Summary (3 of 3)
- Describing the environment (e.g., external systems, key questions).
- Designing application components (components, functions, and system of record ownership).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on fundamental concepts of computer networking and online shopping use cases. This quiz covers topics such as inventory management, networking components, and the functions of application software. Challenge yourself and see how well you understand these essential aspects of technology!