Design Activities-Written Assignment4 Benjamin Torrales Thomas Edison State College Abstract The purpose of this document is to further understand the different activities that are performed during the Design Phase of the Software Development Life Cycle. Design Activities are done in parallel and is composed of Network Integration, Application Architecture and Software, User Interfaces, System Interfaces, Database Integration, Design Details, and Integration of System Controls (Satzinger, Jackson, Burd 2008, pg. 330). One should take into consideration that some of the details utilize in Design Activities are output of the System Analysis Phase (Satzinger, Jackson, Burd 2008, pg. 330).
Logical models show not only what a system is or does, but also how the system is implemented. Answer: False Page: 316 LOD: Medium Rationale: Physical models show not only what a system is or does, but also how the system is implemented; therefore, they are implementation dependent. Logical models are implementation independent. 6. Process modeling is a technique for organizing and documenting the structure and flow of data through a system's processes and /or the logic, policies and procedures to be implemented by a system's processes.
The work breakdown structure helps to define and group together the elements of the project in a manner, which will help organize and better specify the total work of the project, assists in accurately predicting costs and generalizing timelines. The work breakdown structure creates the basis of which the network diagram is based. In the context of project planning, a network diagram is a sequence of steps, commonly represented by blocks, that are linked together in the logical sequence that need to be carried out. Network diagrams take the work breakdown structure and focus on the tasks that are needed to produce the end product. Generally the network diagram consists of parallel work flows, which are process that are independent of one another and can begin at the same time.
See Section 14.1. 14.2 Describe the main phases involved database design. Conceptual database design – to build the conceptual representation of the database, which includes identification of the important entities, relationships, and attributes. Logical database design – to translate the conceptual representation to the logical structure of the database, which includes designing the relations. Physical database design – to decide how the logical structure is to be physically implemented (as relations) in the target Database Management System (DBMS).
Question 1 What is the name of the computer you are working from? SEA-SVR1 Question 2 What is the default lease duration of a Wired subnet type? 6 long time Question 3 What are three recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault border by change integrity DHCP orbital cavitys.
Are the computers in the same network? Show your work. 14. List all the possible routes from Router B to Router D in the network shown in problem 13. a. Router B -> Router A -> Router E -> Router D b. Router B -> Router E -> Router D 16. List the subnets attached to Router C in Figure 6-21.
2 Show the SDLC Iterative Model 3.4 Requirement Gathering Requirement gathering is one of the crucial stages in Software Development Life Cycle. A well understanding of system requirement leads to delivering of a better functional system. Requirement gathering involves collection and understanding of user requirement of the desired system. We gathered requirements at the finance directorate offices of the University of Energy and Natural Resources (UENR). 3.5 Classification of Data Collected Many requirements gathering techniques and data classification exist to gather system specification and requirement.
Q1 Auditing in CIS Environment 1. An internal auditor noted the following points when conducting a preliminary survey in connection with the audit of an EDP department. Which of the following would be considered a safeguard in the control system on which the auditor might rely? a. Programmers and computer operators correct daily processing problems as they arise.
A. B. C. D. Transaction logs The job accounting log Before image copy After image copy Answer: C 3. A systems analyst should have access to each of the following EXCEPT A. B. C. D. source codes password identification tables checkpoint/restart procedures edit criteria Answer: B 4. A password is best described as a method of user A.