File: ch08, Chapter 8: Moving Into Design Multiple Choice 1. Designing Designing an archite architectur cture e can be______ be___________ _________ ____.. a. Tedious and therefore younger members of of the team team are usually urged to take the lead. b. Easy and therefor therefore e more experienc experienced ed members members of the department department take take the lead. c. Dicult Dicult and therefor therefore e outside consulta consultants nts are often often sourced sourced to do the task. d. Dicult Dicult and therefor therefore e experienced experienced internal internal members members are sourced sourced to the task e. C and D Ans e !esponse "ntroduction Diculty #edium $. The ob%ecti&e ob%ecti&e of architectur architecture e design is to determin determine____ e________ ________ _______. ___. a. 'o( aestheti aestheticall cally y pleasing pleasing the the ser&er system system (ill (ill be b. )hat parts parts of the applicatio application n soft(are soft(are (ill (ill be assigned assigned to (hat hard(are c. 'o( the comput computers ers (ill (ill be arranged arranged to pro&id pro&ide e ample ample storage storage d. )here the mainf mainframe rame (ill be situat situated ed e. *one *one of the the a abo bo&e &e Ans b !esponse Elements of an Architecture Architecture Design Diculty #edium +. The ma%or ma%or architectur architectural al components components of any system system are the_____ the_________ ______. __. a. "T Depa Depart rtme ment nt b. 'ar 'ard(are are c. ,oft(are d. A and e. - and C Ans e !esponse Architectural Components Diculty #edium . ,oft(ar ,oft(are e systems can can be di&ided di&ided into into ho( many basic basic functio functions/ ns/ a. 1 b. $ c. + d. e. 0 Ans d !esponse Architectural Components Diculty #edium
0. There are _____ primary hard(are components of a system. a. 1 b. $ c. + d. e. 0 Ans c !esponse Architectural Components Diculty #edium . The primary hard(are components of a system consist of a. Client Computers b. ,er&ers c. *et(ork d. A and e. A2 - and C Ans e !esponse Architectural Components Diculty #edium 3. ,er&ers can take on (hat 45a&ors6/ a. #ainframes b. #inicomputers c. #icrocomputers d. A and e. A2 - and C Ans e !esponse Architectural Components Diculty #edium 7. 8orm9s: of net(ork connection9s: in a system include a. AT# b. T$ c. D,; d. A and C e. - and C Ans d !esponse Architectural Components Diculty #edium <. ,er&er=based architecture is a. )hen the clients capture keystrokes b. The &ery >rst architecture system c. ?utdated and ne&er used d. A and e. A2 - and C Ans d !esponse ,er&er -ased Architecture
Diculty #edium
[email protected]=based architectures are (here the a. Client computer is responsible for presentation logic b. Client computer is responsible for application logic c. Client computer is responsible for data access logic d. The ser&er stores the data e. All of the abo&e Ans e !esponse Client=-ased Architecture Diculty #edium 11.Client=ser&er architecture holds the client responsible for_____ and ser&er is only responsible for _____. a. Application ;ogic Bresentation ;ogic b. Bresentation ;ogic Data Access ;ogic and Data ,torage c. Data Access ;ogic and Bresentation ;ogic Data ,torage d. Application ;ogic Data ,torage e. Data ,torage Application ;ogic Ans b !esponse Client=,er&er Architecture Diculty 'ard 1$.Thick clients contain a. Enormous storage abilities b. Almost all or most of the application logic c. Almost none or less than half of the application logic d. Almost all of the data logic e. *one of the abo&e Ans b !esponse Client=,er&er Architecture Diculty #edium 1+.)hich of the follo(ing is an ad&antage of client=ser&er architectures/ a. They are scalable b. They can support dierent types of systems c. "t is easy to separate dierent logic functions d. !eliability e. All of the abo&e Ans e !esponse Client=,er&er Architecture Diculty #edium 1.'o( many ad&antages are client=ser&er based architectures kno(n for/ a. $ b. + c. d. 0 e. 3
Ans c !esponse Client=,er&er Architecture Diculty #edium 10.An n=tiered architecture is distinguished by a. The number of dri&es installed b. The number of logics on the local ser&er c. The number of terminals on the net(ork d. The number of specialied ser&er computers e. *one of the abo&e Ans d !esponse Client=,er&er Tiers Diculty #edium 1.)hat isare the disad&antage9s: associated (ith n=tiered architecture/ a. Freat load on the net(ork b. Dicult to program c. They are al(ays slo(er d. - and C e. A and Ans e !esponse Client=,er&er Tiers Diculty #edium 13.The cost of infrastructure associated (ith ,er&er=-ased systems is a. ;o( b. ;o(=#edium c. 'igh=medium d. 'igh e. Gery 'igh Ans e !esponse Comparing Architecture ?ptions Diculty #edium 17.The cost of de&elopment associated (ith Client=-ased systems is a. ;o( b. ;o(=#edium c. 'igh=medium d. 'igh e. Gery 'igh Ans a !esponse Comparing Architecture ?ptions Diculty #edium 1<.The scalability associated (ith Client=,er&er systems is a. ;o( b. ;o(=#edium c. 'igh=medium d. 'igh
e. Gery 'igh Ans d !esponse Comparing Architecture ?ptions Diculty #edium
[email protected]=ser&er architectures tend to be a. #ore expensi&e than client=based architectures b. ;ess expensi&e than client=based architectures c. #ore less secure than client=based architectures d. A and C e. *one of the abo&e Ans b !esponse Cost of "nfrastructure Diculty 'ard $1.#aintaining a client=ser&er architecture is a. Easy b. 8our to 8i&e times more expensi&e than ser&er=based applications c. Completely manageable (ith in=house expertise from the onset d. Easy since the maturity of the application is more de&eloped e. *one of the abo&e Ans b !esponse Cost of De&elopment Diculty #edium $$.The de&elopment tools used to create mainframe=based systems are a. Gery user friendly b. *ot &ery user friendly c. !eHuire no special skills to maintain d. Dicult at >rst2 but the skills are easy to acHuire e. *one of the abo&e Ans b !esponse Diculty of De&elopment Diculty #edium $+.Bro%ect teams often _________ the ________ associated (ith creating secure2 ecient client=ser&er applications. a. ?&erestimate Diculty b. ?&erestimate ,implicity c. Inderestimate Diculty d. Inderestimate ,implicity e. *one of the abo&e Ans c !esponse Diculty of De&elopment Diculty #edium $.,er&er=based applications typically utilie a _______2 character=based interface that can be Huite po(erful for the ________ user. a. Complex -asic
b. Blain ,killed c. Complex ,killed d. Blain -asic e. *one of the abo&e Ans b !esponse "nterface Capabilities Diculty #edium $0.The current generation of system users expect a9n:_________ to access the system. a. FI" b. )eb=based interface c. E!B d. A or e. *one of the abo&e Ans d !esponse Diculty of De&elopment Diculty #edium $.An example of a technical en&ironment reHuirement (ould be a. The system must be able to importexport spreadsheets b. The system needs to operate (ith a -lackberry c. *e( &ersions of the system (ill be released e&ery six months d. The system must be able to operate (ith a dierent operating systems e. The system (ill operate o&er the (eb en&ironment using "nternet Explorer Ans e !esponse ?perational !eHuirements Diculty 'ard $3.An example of a capacity reHuirement (ould be a. Transmissions reHuire $73J of data b. The systems uptime (ill be <
les but not delete them b. Data (ill be encrypted for secure ordering c. All uploaded >les (ill be checked for &iruses d. The system (ill cost M+72<@@ per minute of do(ntime in lost re&enues e. *one of the abo&e Ans a !esponse ,ecurity !eHuirements
Diculty #edium $<.DE, is an example of a. Asymmetric Encryption Algorithm b. ,ymmetric Encryption Algorithm c. -i=Ad%usted Encryption Algorithm d. Dynamic Encryption ,ystem e. Alternati&e ,ystems ,ecurity Algorithms Ans b !esponse ,ecurity !eHuirements N Encryption and Authentication Diculty hard [email protected] example of a multilingual reHuirement is a. The system (ill operate in English2 8rench and ,panish b. Country managers can de>ne custom >elds c. All date >elds (ill be presented in a uniform format d. Bersonal information about English customers cannot be sent to Chinese systems e. Country managers are able to change telephone number formats Ans a !esponse Cultural and Bolitical !eHuirements Diculty easy +1.An example of a standard (eb ser&er operating system in a hard(are speci>cation is a. )indo(s b. ;inux c. ?,O d. #ac ?, e. #oilla Ans b !esponse 'ard(are and ,oft(are ,peci>cations Diculty #edium +$.A standard database ser&er may utilie __________ as its special soft(are foundation. a. !eal *et(orks Applications b. Apache c. Pa&a d. )indo(s e. ?racle Ans e !esponse 'ard(are and ,oft(are ,peci>cations Diculty 'ard
True/False ++.#ost information systems are comprised of one computer. Ans 8alse
!esponse "ntroduction Diculty easy +.The ob%ecti&e of architecture design is to determine (hat parts of the application soft(are (ill be assigned to (hat hard(are. Ans True !esponse Elements of an Architecture Design Diculty easy +0.The architectural components of any system are the net(ork and the hard(are. Ans 8alse !esponse Architectural Components Diculty #edium +.Data storage2 Data Access ;ogic2 Application ;ogic and Bresentation ;ogic are the four basic functions of soft(are systems. Ans True !esponse Architectural Components Diculty easy +3.The processing language reHuired to acti&ate data access logic is referred to as E!Ds. Ans 8alse !esponse Architectural Components Diculty hard +7.Client computers2 ,er&ers and *et(orks are the three primary hard(are components of a system. Ans True !esponse Architectural Components Diculty easy +<.Client computers are the input de&ices and are only desktop computers. Ans 8alse !esponse Architectural Components Diculty #edium @.An AT# dialing a net(ork pro&ides the "T department (ith a Huick cash (ithdra(al for emergency purposes. Ans 8alse !esponse Architectural Components Diculty #edium
1.The &ery >rst computing architectures (ere terminal based. Ans 8alse !esponse ,er&er=-ased Architecture Diculty #edium $.Client=based architecture is complex and there is minimal chance of net(ork circuits being o&erloaded due to gro(ing net(ork applications. Ans 8alse !esponse Client=-ased Architectures Diculty #edium +.Client=ser&er architecture attempts to balance the processing bet(een the client and the ser&er by allo(ing the client to host the presentation logic and the ser&er is responsible only for the data access logic and application logic. Ans 8alse !esponse Client=,er&er Architecture Diculty 'ard .There are three ad&antages associated (ith client=ser&er architecture. Ans 8alse !esponse Client=,er&er Architecture Diculty #edium 0.There are four ad&antages associated (ith client=ser&er architecture. Ans True !esponse Client=,er&er Architecture Diculty #edium .,er&er=based architecture is more secure than client=based architecture. Ans True !esponse Comparing Architecture ?ptions Diculty hard 3.,er&er=based architecture is not more secure than client=based architecture. Ans 8alse !esponse Comparing Architecture ?ptions Diculty hard 7.Client=based interface capabilities are greater than client=ser&er architectures. Ans 8alse !esponse Comparing Architecture ?ptions Diculty hard
<.Client=ser&er scalability is less than ser&er=based scalability. Ans 8alse !esponse Comparing Architecture ?ptions Diculty hard [email protected]=ser&er scalability is greater than ser&er=based scalability. Ans True !esponse Comparing Architecture ?ptions Diculty hard 01.The infrastructure cost of client=ser&er architectures is lo( due to the ad&ancement in processing po(er of todayQs personal computers. Ans True !esponse Cost of "nfrastructure Diculty easy 0$.The infrastructure cost of client=ser&er architectures is high due to the ad&ancement in processing po(er of todayQs personal computers. Ans 8alse !esponse Cost of "nfrastructure Diculty easy 0+.The cost dierential bet(een maintaining client=ser&er applications and ser&er=based applications (ill be oset (ith organiational experience. Ans True !esponse Cost of De&elopment Diculty easy 0.The cost dierential bet(een maintaining client=ser&er applications and ser&er=based applications cannot be oset (ith organiational experience. Ans 8alse !esponse Cost of De&elopment Diculty easy 00.DE, stands for Dynamic Encryption ,ystem. Ans 8alse !esponse ,ecurity !eHuirements N Encryption and Authentication Diculty hard 0.An example of an asymmetric encryption algorithm is public key encryption. Ans True !esponse ,ecurity !eHuirements N Encryption and Authentication Diculty #edium
03.An example of a cultural reHuirement (ould be oering the system in English and ,panish. Ans True !esponse Cultural and Bolitical !eHuirements Diculty easy 07.An example of making an unstated norm explicit (ould be to make a >eld modi>able by a manager to represent the local format. Ans 8alse !esponse Cultural and Bolitical !eHuirements Diculty #edium 0<.An example of making an unstated norm explicit (ould be to make an input >eld explicitly de>ned2 such as a date (ill use month=day=year format. Ans True !esponse Cultural and Bolitical !eHuirements Diculty #edium
@."t is not uncommon for the cost of a po(er disruption to be hundreds or thousands of times the cost of failed components. Ans True !esponse Bo(er ?utage Costs A #illion Dollars Diculty #edium 1.Fenerally speaking2 information systems do not ha&e high performance reHuirements due to their stable and predictable nature. Ans 8alse !esponse Designing the Architecture Diculty hard $.The design phase is the time to select the speci>c soft(are that (ill operate the hard(are. Ans True !esponse 'ard(are and ,oft(are ,peci>cation Diculty easy +.?racle is a standard type of special soft(are for application ser&ers and (eb ser&ers. Ans 8alse !esponse 'ard(are and ,oft(are ,peci>cation Diculty easy
Short Answer/Essa
.There are three basic application architectures discussed in the chapter2 each one ha&ing its distincti&e attributes. "dentify the four types of architectures that emerge from these three application architectures and pro&ide a short explanation of each2 along (ith key ad&antages and disad&antages. a. The four general architectures commonly utilied are ser&er=based2 client=based2 client=ser&er2 and client=ser&er tier architectures. The ser&er=based architecture is the original and most basic of the four. "t allo(s a ser&er to handle all four functions of soft(are systems (hich are data storage2 data access logic2 application logic and presentation logic. The shortcoming of this architecture design is its lack of scalability and high net(ork demands on the central mainframe. The client=based architecture is another simple architecture that is Huite stable. This system handles the distribution of data access2 application2 and presentation logic by distributing the responsibilities amongst the client and ser&er computers. The client computer 9terminal: handles the presentation logic2 application logic and the data access logic. The ser&er is simply a storage unit (here data is dumped and accessed. The shortcoming (ith this system is as the net(ork demands gro(2 net(ork circuits can become Huite o&erburdened and slo(ed dramatically as the trac increases. The client=ser&er architecture is a step ahead of the pre&ious examples in that it distributes the processing responsibilities amongst the systems to minimie the resources each indi&idual process takes up. The client computer 9terminal: is responsible for managing the presentation logic and sometimes the application logic (hile the ser&er handles data access logic2 storage logic and occasionally 9(hen not handled by the terminal: the application logic. )hile these ser&er systems are ad&anced2 they are also complex and dicult to maintain. Client=ser&er architecture systems reHuire a &ast kno(ledge of both the terminal systems and the ser&er systems2 often times reHuiring outside resources to be utilied in the maintenance of the system. Client=ser&er tiers represent an extension of the client=ser&er architecture by further separating the responsibility for system functions amongst multiple2 specialied ser&ers. 8or instance2 many current generation (eb=based e=commerce solutions utilie a client to handle the presentation logic 9(eb bro(ser:2 a (eb ser&er to handle the (eb=related business logic2 an application ser&er to handle order processing logic2 and a database ser&er to handle database=related tasks. The primary ad&antage of such n=tiered architectures is the promise of better load balancing amongst the &arious system
components. 'o(e&er2 the n=tiered architecture places a greater load on the net(ork and is more dicult to program and test. 0.Describe the dierence bet(een a thick and a thin client. a. Thick and thin clients are found in client=ser&er applications and they are categoried as thick or thin based on the proportion of application logic stored on the client terminal. Thick2 or sometimes referred to as fat2 clients are those that house a ma%ority of the application logic. Thin clients are those (here the ma%ority of the systemsQ application logic is stored on the ser&er. .There is a fourth ser&er architecture referred to as client=ser&er tiers. )hat is their purpose and ho( are they ad&antageous or disad&antageous as compared to the original three styles (ith speci>c emphasis on n=tiered systems/ a. There are three 5a&ors of client=ser&er tier systems t(o=tiered architecture2 three=tiered architecture and n=tiered architecture. This architecture design allo(s for scalability and processing distribution (hile maintaining nominal transaction speed and reliability. The most notable ad&antage of the n=tiered client=ser&er architecture is their balanced processing systems. "t is designed to spread the processing load amongst the dierent computing units in order to pro&ide an optimal transaction speed and minimie (ear on any one system at a time. Additionally2 it is far more scalable than the alternati&e systems (hile still maintaining its grand application nature. "ts dra(backs stem from t(o primary sources2 its con>guration and its programmingmaintenance. These systems are generally more interconnected and due to the di&ision of processing2 the communications net(ork is often times (eighed do(n by the immense amount of signaling the net(ork has to transmit. ,econd2 actually programming and testing the con>gurations is a greater challenge than if one (ere to focus on a t(o or three=tiered system due to the large amount of processed data being sent and retrie&ed across the net(ork. 3.Anthony is an entrepreneur of the e=commerce sort. 'e has asked Computers "nternational2 "nc. to de&elop a functional and fundamental system that (ill enable him to conduct business (ithin the con>nes of the Inited ,tates. 'e has asked C"2 "nc. to de&elop a system (here he (ishes to a&oid opening a bricks=and=mortar storefront 9incidentally that means solely internet based:2 be able to export >les and data to #icrosoft Excel spreadsheets (here he can create presentations for future in&estors2 access his >les from his BDA or
-lackberry from the road and ha&e a rather stable maintenance record for minimal do(ntime and his a&id anticipation for gro(th. )hat operational reHuirements are needed and (hy/ a. Computers "nternational should reply to Anthony by oering him a system that (ill operate o of a client=ser&er architecture (hich (ill allo( the computing needs of his (hole >rm to be run by both the client and the customer terminals. Additionally2 his technical reHuirements are such that his system can present the data to a multitude of operating systems and (eb bro(sers. Anthony also has integration reHuirements (ith #icrosoft Excel (here he (ill be able to oRoad data in the form of a comma=separated &alues 9C,G: document or the like to maintain compatiility (ith a multitude of bundled soft(are packages. 'is portability reHuirements specify that he (ill need to access his data from the road &ia a portable (eb bro(ser and his maintainability reHuirements specify that he (ishes to minimie do(ntime and allo( for his anticipated gro(th not to outpace his initial in&estment. 7.Poseph is an "T director at a large multinational2 multibillion dollar=a=year corporation that is responsible for the distribution of highly specialied and often times custom parts. 'e has been charged (ith creating a hard(are pro>le to dictate the performance reHuirements of the companyQs next mainframe system. Acting as a consultant to Poe2 (hat kinds of performance reHuirements are important to de&elop an appropriate hard(are pro>le/ )hat are the key issues for each of these reHuirements that could be recommended to the corporationsQs CT?. a. Poe should primarily be concerned (ith speed2 capacity2 a&ailability and reliability reHuirements. 'e should be concerned (ith the speed of his net(ork due to the international order ful>llment aspect of the >rm. Also2 due to the nature of the manufacturing system 9custom and uniHue parts:2 there (ill be a tremendous number of orders generated (hich (ill further add to the band(idth usage that (ill need to be handled by the system. Additionally2 Poe needs to take into account the number of order transmissions made internally to the machining shop and automated machinery. "n so far as capacity2 Poe should also be concerned (ith ser&er space a&ailable to store the indi&idual orders for (hate&er speci>c period of time the company sees >t. "n addition2 he needs to consider the total number of users needing to log in and access the E!B system at any gi&en moment. "f he does not consider the number of indi&iduals and terminals logging into the system2 he (ill end up (ith a band(idth
shortage as (ell as interrupted usage due to ser&er o&eruse. 8inally2 a&ailability and reliability (ill be determined by the ser&ice hours oered by the sales team to the >rmQs customers. 'o(e&er2 there must also be a certain number of hours allo(ed for maintenance and upgrades each month. Due to the international time ones2 most likely do(ntime (ill take place at odd hours of the morning on days that do not normally incur tremendous call &olume and order processing. <.,hana is a security expert acting as a consultant to companies looking for ne( or upgraded ser&er systems. ,he has recently been contacted by a medium=sied company to orchestrate an upgrade to their systems. ,he has expertise in the securities realm and has oered her initial opinion to the company. )hat types of reHuirements should she be recommending to the >rm and (hy/ a. ,ecurity is one of the most necessary components of any computer system. *o matter (hat your business2 no matter (hat your industry2 there is al(ays a chance that somebody (ill target your system. "n order to remain free from hacking and &irus uploading2 it is &ital to maintain a secure net(ork in order to maintain do(ntime and intrusion. ,hana should base her recommendations on the four types of security reHuirements system &alue estimates2 access control2 encryption and authentication2 and &irus control. ,ystem &alue reHuirements allo(s the >rm to kno( (hat it (ill be looking at for a loss if the (orst (ere to happen and (hat it might cost to replace it. Access control reHuirements are in place to determine (ho should be allo(ed to access the system and (hat pri&ileges they should ha&e. Encryption and authentication takes the access reHuirements one step further and determine the security le&el of the encryption for both the data and the user log=ins. Girus control2 (hile almost al(ays at the forefront of peoplesQ concerns2 is terribly dicult to combat. There are ne( &iral codes (ritten e&ery day and therefore &irus protection soft(are needs to be updated as often as possible (ith the most intensi&e libraries of kno(n malicious code a&ailable at the cost budgeted. [email protected] "nternational is concerned (ith pro&iding lo( cost foods to nations that cannot aord the (holesome and nutritional foods that are so common in more de&eloped countries. -io8oods "nternational is adopting a n e( computer system that (ill enable our international managers to place orders (ith us directly2 ensuring accurate and ful>lling orders to each of our
constituents. )hat types of cultural reHuirements should be considered in acHuiring this ne( system/ a. -io8oods "nternational should consider ha&ing a system that is multilingual2 customiable2 and meets legal reHuirements in the countries (here they operate. Additionally2 they should make unstated norms explicit (ithin their system as to maintain order and to remain (ithin the acHuisition ability of the >rm to a&oid erroneous orders.