Professional Documents
Culture Documents
Multiple Choice
1. Designing an architecture can be_______________.
a. Tedious and therefore younger members of the team are usually urged to take the lead.
b. Easy and therefore more experienced members of the department take the lead.
c. Difficult and therefore outside consultants are often sourced to do the task.
d. Difficult and therefore experienced internal members are sourced to the task
e. C and D
Ans: e
Response: Introduction
Difficulty: Medium
11. Client-server architecture holds the client responsible for_____ and server is only responsible
for _____.
a. Application Logic; Presentation Logic
b. Presentation Logic; Data Access Logic and Data Storage
c. Data Access Logic and Presentation Logic; Data Storage
d. Application Logic; Data Storage
e. Data Storage; Application Logic
Ans: b
Response: Client-Server Architecture
Difficulty: Hard
14. How many advantages are client-server based architectures known for?
a. 2
b. 3
c. 4
d. 5
e. 7
Ans: c
Response: Client-Server Architecture
Difficulty: Medium
23. Project teams often _________ the ________ associated with creating secure, efficient client-
server applications.
a. Overestimate; Difficulty
b. Overestimate; Simplicity
c. Underestimate; Difficulty
d. Underestimate; Simplicity
e. None of the above
Ans: c
Response: Difficulty of Development
Difficulty: Medium
24. Server-based applications typically utilize a _______, character-based interface that can be quite
powerful for the ________ user.
a. Complex; Basic
b. Plain; Skilled
c. Complex; Skilled
d. Plain; Basic
e. None of the above
Ans: b
Response: Interface Capabilities
Difficulty: Medium
25. The current generation of system users expect a(n)_________ to access the system.
a. GUI
b. Web-based interface
c. ERP
d. A or B
e. None of the above
Ans: d
Response: Difficulty of Development
Difficulty: Medium
31. An example of a standard web server operating system in a hardware specification is:
a. Windows
b. Linux
c. OSX
d. Mac OS
e. Mozilla
Ans: b
Response: Hardware and Software Specifications
Difficulty: Medium
32. A standard database server may utilize __________ as its special software foundation.
a. Real Networks Applications
b. Apache
c. Java
d. Windows
e. Oracle
Ans: e
Response: Hardware and Software Specifications
Difficulty: Hard
True/False
33. Most information systems are comprised of one computer.
Ans: False
Response: Introduction
Difficulty: easy
34. The objective of architecture design is to determine what parts of the application software will
be assigned to what hardware.
Ans: True
Response: Elements of an Architecture Design
Difficulty: easy
35. The architectural components of any system are the network and the hardware.
Ans: False
Response: Architectural Components
Difficulty: Medium
36. Data storage, Data Access Logic, Application Logic and Presentation Logic are the four basic
functions of software systems.
Ans: True
Response: Architectural Components
Difficulty: easy
37. The processing language required to activate data access logic is referred to as ERDs.
Ans: False
Response: Architectural Components
Difficulty: hard
38. Client computers, Servers and Networks are the three primary hardware components of a
system.
Ans: True
Response: Architectural Components
Difficulty: easy
39. Client computers are the input devices and are only desktop computers.
Ans: False
Response: Architectural Components
Difficulty: Medium
40. An ATM dialing a network provides the IT department with a quick cash withdrawal for
emergency purposes.
Ans: False
Response: Architectural Components
Difficulty: Medium
41. The very first computing architectures were terminal based.
Ans: False
Response: Server-Based Architecture
Difficulty: Medium
42. Client-based architecture is complex and there is minimal chance of network circuits being
overloaded due to growing network applications.
Ans: False
Response: Client-Based Architectures
Difficulty: Medium
43. Client-server architecture attempts to balance the processing between the client and the server
by allowing the client to host the presentation logic and the server is responsible only for the
data access logic and application logic.
Ans: False
Response: Client-Server Architecture
Difficulty: Hard
51. The infrastructure cost of client-server architectures is low due to the advancement in
processing power of today’s personal computers.
Ans: True
Response: Cost of Infrastructure
Difficulty: easy
52. The infrastructure cost of client-server architectures is high due to the advancement in
processing power of today’s personal computers.
Ans: False
Response: Cost of Infrastructure
Difficulty: easy
53. The cost differential between maintaining client-server applications and server-based
applications will be offset with organizational experience.
Ans: True
Response: Cost of Development
Difficulty: easy
54. The cost differential between maintaining client-server applications and server-based
applications cannot be offset with organizational experience.
Ans: False
Response: Cost of Development
Difficulty: easy
57. An example of a cultural requirement would be offering the system in English and Spanish.
Ans: True
Response: Cultural and Political Requirements
Difficulty: easy
58. An example of making an unstated norm explicit would be to make a field modifiable by a
manager to represent the local format.
Ans: False
Response: Cultural and Political Requirements
Difficulty: Medium
59. An example of making an unstated norm explicit would be to make an input field explicitly
defined, such as a date will use month-day-year format.
Ans: True
Response: Cultural and Political Requirements
Difficulty: Medium
60. It is not uncommon for the cost of a power disruption to be hundreds or thousands of times the
cost of failed components.
Ans: True
Response: Power Outage Costs A Million Dollars
Difficulty: Medium
61. Generally speaking, information systems do not have high performance requirements due to
their stable and predictable nature.
Ans: False
Response: Designing the Architecture
Difficulty: hard
62. The design phase is the time to select the specific software that will operate the hardware.
Ans: True
Response: Hardware and Software Specification
Difficulty: easy
63. Oracle is a standard type of special software for application servers and web servers.
Ans: False
Response: Hardware and Software Specification
Difficulty: easy
Short Answer/Essay
64. There are three basic application architectures discussed in the chapter, each one having its
distinctive attributes. Identify the four types of architectures that emerge from these three
application architectures and provide a short explanation of each, along with key advantages
and disadvantages.
a. The four general architectures commonly utilized are server-based, client-based, client-
server, and client-server tier architectures.
The server-based architecture is the original and most basic of the four. It allows a
server to handle all four functions of software systems which are data storage, data
access logic, application logic and presentation logic. The shortcoming of this
architecture design is its lack of scalability and high network demands on the central
mainframe.
The client-based architecture is another simple architecture that is quite stable. This
system handles the distribution of data access, application, and presentation logic by
distributing the responsibilities amongst the client and server computers. The client
computer (terminal) handles the presentation logic, application logic and the data
access logic. The server is simply a storage unit where data is dumped and accessed.
The shortcoming with this system is as the network demands grow, network circuits can
become quite overburdened and slowed dramatically as the traffic increases.
66. There is a fourth server architecture referred to as client-server tiers. What is their purpose and
how are they advantageous or disadvantageous as compared to the original three styles with
specific emphasis on n-tiered systems?
a. There are three flavors of client-server tier systems: two-tiered architecture, three-
tiered architecture and n-tiered architecture. This architecture design allows for
scalability and processing distribution while maintaining nominal transaction speed and
reliability.
The most notable advantage of the n-tiered client-server architecture is their balanced
processing systems. It is designed to spread the processing load amongst the different
computing units in order to provide an optimal transaction speed and minimize wear on
any one system at a time. Additionally, it is far more scalable than the alternative
systems while still maintaining its grand application nature.
Its drawbacks stem from two primary sources, its configuration and its
programming/maintenance. These systems are generally more interconnected and due
to the division of processing, the communications network is often times weighed down
by the immense amount of signaling the network has to transmit. Second, actually
programming and testing the configurations is a greater challenge than if one were to
focus on a two or three-tiered system due to the large amount of processed data being
sent and retrieved across the network.
67. Anthony is an entrepreneur of the e-commerce sort. He has asked Computers International, Inc.
to develop a functional and fundamental system that will enable him to conduct business within
the confines of the United States. He has asked CI, Inc. to develop a system where he wishes to:
avoid opening a bricks-and-mortar storefront (incidentally that means solely internet based), be
able to export files and data to Microsoft Excel spreadsheets where he can create presentations
for future investors, access his files from his PDA or Blackberry from the road and have a rather
stable maintenance record for minimal downtime and his avid anticipation for growth. What
operational requirements are needed and why?
a. Computers International should reply to Anthony by offering him a system that will
operate off of a client-server architecture which will allow the computing needs of his
whole firm to be run by both the client and the customer terminals. Additionally, his
technical requirements are such that his system can present the data to a multitude of
operating systems and web browsers. Anthony also has integration requirements with
Microsoft Excel where he will be able to offload data in the form of a comma-separated
values (CSV) document or the like to maintain compatiility with a multitude of bundled
software packages. His portability requirements specify that he will need to access his
data from the road via a portable web browser and his maintainability requirements
specify that he wishes to minimize downtime and allow for his anticipated growth not to
outpace his initial investment.
He should be concerned with the speed of his network due to the international order
fulfillment aspect of the firm. Also, due to the nature of the manufacturing system
(custom and unique parts), there will be a tremendous number of orders generated
which will further add to the bandwidth usage that will need to be handled by the
system. Additionally, Joe needs to take into account the number of order transmissions
made internally to the machining shop and automated machinery.
In so far as capacity, Joe should also be concerned with server space available to store
the individual orders for whatever specific period of time the company sees fit. In
addition, he needs to consider the total number of users needing to log in and access
the ERP system at any given moment. If he does not consider the number of individuals
and terminals logging into the system, he will end up with a bandwidth shortage as well
as interrupted usage due to server overuse.
Finally, availability and reliability will be determined by the service hours offered by the
sales team to the firm’s customers. However, there must also be a certain number of
hours allowed for maintenance and upgrades each month. Due to the international time
zones, most likely downtime will take place at odd hours of the morning on days that do
not normally incur tremendous call volume and order processing.
69. Shana is a security expert acting as a consultant to companies looking for new or upgraded
server systems. She has recently been contacted by a medium-sized company to orchestrate an
upgrade to their systems. She has expertise in the securities realm and has offered her initial
opinion to the company. What types of requirements should she be recommending to the firm
and why?
a. Security is one of the most necessary components of any computer system. No matter
what your business, no matter what your industry, there is always a chance that
somebody will target your system. In order to remain free from hacking and virus
uploading, it is vital to maintain a secure network in order to maintain downtime and
intrusion.
Shana should base her recommendations on the four types of security requirements:
system value estimates, access control, encryption and authentication, and virus
control. System value requirements allows the firm to know what it will be looking at for
a loss if the worst were to happen and what it might cost to replace it. Access control
requirements are in place to determine who should be allowed to access the system and
what privileges they should have. Encryption and authentication takes the access
requirements one step further and determine the security level of the encryption for
both the data and the user log-ins. Virus control, while almost always at the forefront of
peoples’ concerns, is terribly difficult to combat. There are new viral codes written every
day and therefore virus protection software needs to be updated as often as possible
with the most intensive libraries of known malicious code available at the cost
budgeted.
70. BioFoods International is concerned with providing low cost foods to nations that cannot afford
the wholesome and nutritional foods that are so common in more developed countries.
BioFoods International is adopting a new computer system that will enable our international
managers to place orders with us directly, ensuring accurate and fulfilling orders to each of our
constituents. What types of cultural requirements should be considered in acquiring this new
system?
a. BioFoods International should consider having a system that is multilingual,
customizable, and meets legal requirements in the countries where they operate.
Additionally, they should make unstated norms explicit within their system as to
maintain order and to remain within the acquisition ability of the firm to avoid
erroneous orders.