Professional Documents
Culture Documents
File: ch08, Chapter 8: Moving Into Design: Multiple Choice
File: ch08, Chapter 8: Moving Into Design: Multiple Choice
Multiple Choice
1. Designing an architecture can be_______________.
a. Tedious and therefore younger members of the team are usually urged to take
the lead.
b. Easy and therefore more experienced members of the department take the lead.
c. Difficult and therefore outside consultants are often sourced to do the task.
d. Difficult and therefore experienced internal members are sourced to the task
e. C and D
Ans: e
Response: Introduction
Difficulty: Medium
11. Client-server architecture holds the client responsible for_____ and server is only
responsible for _____.
a. Application Logic; Presentation Logic
b. Presentation Logic; Data Access Logic and Data Storage
c. Data Access Logic and Presentation Logic; Data Storage
d. Application Logic; Data Storage
e. Data Storage; Application Logic
Ans: b
Response: Client-Server Architecture
Difficulty: Hard
14. How many advantages are client-server based architectures known for?
a. 2
b. 3
c. 4
d. 5
e. 7
Ans: c
Response: Client-Server Architecture
Difficulty: Medium
23. Project teams often _________ the ________ associated with creating secure, efficient
client-server applications.
a. Overestimate; Difficulty
b. Overestimate; Simplicity
c. Underestimate; Difficulty
d. Underestimate; Simplicity
e. None of the above
Ans: c
Response: Difficulty of Development
Difficulty: Medium
24. Server-based applications typically utilize a _______, character-based interface that can
be quite powerful for the ________ user.
a. Complex; Basic
b. Plain; Skilled
c. Complex; Skilled
d. Plain; Basic
e. None of the above
Ans: b
Response: Interface Capabilities
Difficulty: Medium
25. The current generation of system users expect a(n)_________ to access the system.
a. GUI
b. Web-based interface
c. ERP
d. A or B
e. None of the above
Ans: d
Response: Difficulty of Development
Difficulty: Medium
31. An example of a standard web server operating system in a hardware specification is:
a. Windows
b. Linux
c. OSX
d. Mac OS
e. Mozilla
Ans: b
Response: Hardware and Software Specifications
Difficulty: Medium
32. A standard database server may utilize __________ as its special software foundation.
a. Real Networks Applications
b. Apache
c. Java
d. Windows
e. Oracle
Ans: e
Response: Hardware and Software Specifications
Difficulty: Hard
True/False
33. Most information systems are comprised of one computer.
Ans: False
Response: Introduction
Difficulty: easy
34. The objective of architecture design is to determine what parts of the application
software will be assigned to what hardware.
Ans: True
Response: Elements of an Architecture Design
Difficulty: easy
35. The architectural components of any system are the network and the hardware.
Ans: False
Response: Architectural Components
Difficulty: Medium
36. Data storage, Data Access Logic, Application Logic and Presentation Logic are the four
basic functions of software systems.
Ans: True
Response: Architectural Components
Difficulty: easy
37. The processing language required to activate data access logic is referred to as ERDs.
Ans: False
Response: Architectural Components
Difficulty: hard
38. Client computers, Servers and Networks are the three primary hardware components of
a system.
Ans: True
Response: Architectural Components
Difficulty: easy
39. Client computers are the input devices and are only desktop computers.
Ans: False
Response: Architectural Components
Difficulty: Medium
40. An ATM dialing a network provides the IT department with a quick cash withdrawal for
emergency purposes.
Ans: False
Response: Architectural Components
Difficulty: Medium
42. Client-based architecture is complex and there is minimal chance of network circuits
being overloaded due to growing network applications.
Ans: False
Response: Client-Based Architectures
Difficulty: Medium
43. Client-server architecture attempts to balance the processing between the client and the
server by allowing the client to host the presentation logic and the server is responsible only for
the data access logic and application logic.
Ans: False
Response: Client-Server Architecture
Difficulty: Hard
51. The infrastructure cost of client-server architectures is low due to the advancement in
processing power of today’s personal computers.
Ans: True
Response: Cost of Infrastructure
Difficulty: easy
52. The infrastructure cost of client-server architectures is high due to the advancement in
processing power of today’s personal computers.
Ans: False
Response: Cost of Infrastructure
Difficulty: easy
53. The cost differential between maintaining client-server applications and server-based
applications will be offset with organizational experience.
Ans: True
Response: Cost of Development
Difficulty: easy
54. The cost differential between maintaining client-server applications and server-based
applications cannot be offset with organizational experience.
Ans: False
Response: Cost of Development
Difficulty: easy
57. An example of a cultural requirement would be offering the system in English and
Spanish.
Ans: True
Response: Cultural and Political Requirements
Difficulty: easy
58. An example of making an unstated norm explicit would be to make a field modifiable by
a manager to represent the local format.
Ans: False
Response: Cultural and Political Requirements
Difficulty: Medium
59. An example of making an unstated norm explicit would be to make an input field
explicitly defined, such as a date will use month-day-year format.
Ans: True
Response: Cultural and Political Requirements
Difficulty: Medium
60. It is not uncommon for the cost of a power disruption to be hundreds or thousands of
times the cost of failed components.
Ans: True
Response: Power Outage Costs A Million Dollars
Difficulty: Medium
61. Generally speaking, information systems do not have high performance requirements
due to their stable and predictable nature.
Ans: False
Response: Designing the Architecture
Difficulty: hard
62. The design phase is the time to select the specific software that will operate the
hardware.
Ans: True
Response: Hardware and Software Specification
Difficulty: easy
63. Oracle is a standard type of special software for application servers and web servers.
Ans: False
Response: Hardware and Software Specification
Difficulty: easy
Short Answer/Essay
64. There are three basic application architectures discussed in the chapter, each one having
its distinctive attributes. Identify the four types of architectures that emerge from these three
application architectures and provide a short explanation of each, along with key advantages and
disadvantages.
a. The four general architectures commonly utilized are server-based, client-based,
client-server, and client-server tier architectures.
The server-based architecture is the original and most basic of the four. It allows a server
to handle all four functions of software systems which are data storage, data access
logic, application logic and presentation logic. The shortcoming of this architecture
design is its lack of scalability and high network demands on the central mainframe.
The client-based architecture is another simple architecture that is quite stable. This
system handles the distribution of data access, application, and presentation logic by
distributing the responsibilities amongst the client and server computers. The client
computer (terminal) handles the presentation logic, application logic and the data access
logic. The server is simply a storage unit where data is dumped and accessed. The
shortcoming with this system is as the network demands grow, network circuits can
become quite overburdened and slowed dramatically as the traffic increases.
66. There is a fourth server architecture referred to as client-server tiers. What is their
purpose and how are they advantageous or disadvantageous as compared to the original three
styles with specific emphasis on n-tiered systems?
a. There are three flavors of client-server tier systems: two-tiered architecture,
three-tiered architecture and n-tiered architecture. This architecture design allows for
scalability and processing distribution while maintaining nominal transaction speed and
reliability.
The most notable advantage of the n-tiered client-server architecture is their balanced
processing systems. It is designed to spread the processing load amongst the different
computing units in order to provide an optimal transaction speed and minimize wear on
any one system at a time. Additionally, it is far more scalable than the alternative
systems while still maintaining its grand application nature.
Its drawbacks stem from two primary sources, its configuration and its
programming/maintenance. These systems are generally more interconnected and due
to the division of processing, the communications network is often times weighed down
by the immense amount of signaling the network has to transmit. Second, actually
programming and testing the configurations is a greater challenge than if one were to
focus on a two or three-tiered system due to the large amount of processed data being
sent and retrieved across the network.
He should be concerned with the speed of his network due to the international order
fulfillment aspect of the firm. Also, due to the nature of the manufacturing system
(custom and unique parts), there will be a tremendous number of orders generated
which will further add to the bandwidth usage that will need to be handled by the
system. Additionally, Joe needs to take into account the number of order transmissions
made internally to the machining shop and automated machinery.
In so far as capacity, Joe should also be concerned with server space available to store
the individual orders for whatever specific period of time the company sees fit. In
addition, he needs to consider the total number of users needing to log in and access
the ERP system at any given moment. If he does not consider the number of individuals
and terminals logging into the system, he will end up with a bandwidth shortage as well
as interrupted usage due to server overuse.
Finally, availability and reliability will be determined by the service hours offered by the
sales team to the firm’s customers. However, there must also be a certain number of
hours allowed for maintenance and upgrades each month. Due to the international time
zones, most likely downtime will take place at odd hours of the morning on days that do
not normally incur tremendous call volume and order processing.
69. Shana is a security expert acting as a consultant to companies looking for new or
upgraded server systems. She has recently been contacted by a medium-sized company to
orchestrate an upgrade to their systems. She has expertise in the securities realm and has
offered her initial opinion to the company. What types of requirements should she be
recommending to the firm and why?
a. Security is one of the most necessary components of any computer system. No
matter what your business, no matter what your industry, there is always a chance that
somebody will target your system. In order to remain free from hacking and virus
uploading, it is vital to maintain a secure network in order to maintain downtime and
intrusion.
Shana should base her recommendations on the four types of security requirements:
system value estimates, access control, encryption and authentication, and virus control.
System value requirements allows the firm to know what it will be looking at for a loss if
the worst were to happen and what it might cost to replace it. Access control
requirements are in place to determine who should be allowed to access the system and
what privileges they should have. Encryption and authentication takes the access
requirements one step further and determine the security level of the encryption for
both the data and the user log-ins. Virus control, while almost always at the forefront of
peoples’ concerns, is terribly difficult to combat. There are new viral codes written every
day and therefore virus protection software needs to be updated as often as possible
with the most intensive libraries of known malicious code available at the cost budgeted.
70. BioFoods International is concerned with providing low cost foods to nations that cannot
afford the wholesome and nutritional foods that are so common in more developed countries.
BioFoods International is adopting a new computer system that will enable our international
managers to place orders with us directly, ensuring accurate and fulfilling orders to each of our
constituents. What types of cultural requirements should be considered in acquiring this new
system?
a. BioFoods International should consider having a system that is multilingual,
customizable, and meets legal requirements in the countries where they operate.
Additionally, they should make unstated norms explicit within their system as to
maintain order and to remain within the acquisition ability of the firm to avoid
erroneous orders.