KEMBAR78
UML & System Design Essentials | PDF | Use Case | Software Engineering
0% found this document useful (0 votes)
31 views4 pages

UML & System Design Essentials

Uploaded by

nathanpillinger1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

UML & System Design Essentials

Uploaded by

nathanpillinger1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Which of the following is NOT a step in the development of a state

machine diagram?
A: Expand the name of each state to identify concurrent activities.
The symbol that is used to initiate concurrent paths in a state
machine diagram is what?
A: Synchronization bar.
Inheritance describes a condition between classes where _______.
A: Classes share some attributes.
An association class is frequently required for what kind of
relationship?
A: Many to many.
A class that represents a many-to-many association between two
other classes is called a _______ class.
A: Association.
A _______ is a naturally occurring association among specific things.
A: Relationship.
In the traditional approach to system development, the system
stores information about _______.
A: Data entities.
In a generalization/specialization relationship, it would not make
sense for a class at the bottom of the hierarchy to be a _______ class.
A: Abstract.
An attribute whose value uniquely identifies an object is called a
_______.
A: Key attribute.
A synonym for cardinality (used with UML class diagrams) is _______.
A: Multiplicity.
_______ is based on the idea that people classify things in terms of
similarities and differences.
A: Generalization/Specialization.
What is the multiplicity for the Team to Player association below?
A: Zero or more.
What would be the multiplicity for the association from the
FacultyMember class to the CourseSection class as per statement
below: "Each course section must have at least one faculty member
teaching it, but sometimes, faculty teams teach course sections"?
A: Zero or more.
From the domain class diagram below, if an existing customer
places a telephone order for one item, how many new objects are
created overall for this transaction?
A: Three.
What would be the multiplicity for the association from the
FacultyMember class to the Course class as per statement below:
"One faculty member is assigned as course coordinator to oversee
the course, and each faculty member can be the coordinator of
many courses"?
A: Zero or more.
What would be the multiplicity for the association from the
CourseSection class to the FacultyMember class as per statement
below: "Each course section must have at least one faculty member
teaching it, but sometimes, faculty teams teach course sections"?
A: One or more.
What type of class is PlayerInGame?
A: Association.
Software methods are usually identified in which design model?
A: Design class diagram.
Which of the following is NOT considered an analysis model?
A: User interface screen layouts.
Two methods to show a return value are: (Choose two)
A: value := and Dashed arrow with value.
According to an Agile iterative development process in which
iteration would implementation activities normally start?
A: First iteration.
A Design Class Diagram is a primary model used in which of the
following?
A: Software design.
In UML terminology in a sequence diagram, a message refers to a
_______.
A: Action.
Which user is known to the system and is authorized to access all or
certain parts of it?
A: Registered user.
In a sequence diagram, the message-name is usually given in what
format?
A: Verb-noun.
When the data is encrypted with the public key in asymmetric
encryption, it is decrypted with a _______ key.
A: Private.
Three types of users that are considered in the design of a security
system are _______.
A: Unauthorized user, registered user, and privileged user.
Which of the following is the best model to use to document the
inputs and the outputs to a system?
A: System sequence diagram.
Which of the following really is both an analysis (discovery) and a
design process (solution)?
A: User interface design.
A deployment diagram is most useful for which design activity?
A: Designing application components.
Which of the following is not one of the design activities included in
the Design System Components core process?
A: Design the security controls.
Which of the following is NOT a factor that affects the risk of fraud?
A: Authorization of users.
When developing a SSD based on an activity diagram, what happens
at each location that the workflow crosses the automation
boundary?
A: A message is needed.
In a fully developed use case description, normally the
preconditions describe what?
A: What objects must exist prior to the use case execution.
Using digital signatures is primarily a technique to _______.
A: Verify who sent a document.
On a systems sequence diagram, _______ indicate(s) a true/false
condition.
A: [ ].
Which is correct?
A: B.
On an SSD, a dashed arrow usually represents what?
A: Return value(s).
Which is an objective of integrity controls?
A: Protect the assets of the organization.
Which design activity pervades all other design activities?
A: Security and controls design.
Which model is most useful in developing a State Machine Diagram?
A: Class diagram.
Numbering exception conditions in a fully developed use case
description is helpful to _______.
A: Tie the exception condition to a processing step.
A user who has special security and access to a system, such as the
right to assign passwords, is called a _______.
A: Privileged user.
A good way to ensure that all the use cases have been identified is
through _______.
A: The CRUD technique.
A unique set of internal activities within a use case which
represents a unique path through the use case is called a _______.
A: Scenario.
When building a SSD, the important principle for identifying data
parameters is to base it on the _______.
A: Class diagram.
On a project that uses iterations to develop the system, in which
iteration does systems design begin? Explain why.
A: Systems design begins in the first iteration to align with incremental
delivery.
What are the key elements of the environment described during
design activities?
A: Hardware, software, network setup, and physical constraints.
What are the models that describe use cases in more detail?
A: Activity diagrams and sequence diagrams.
What are the two UML diagrams used to model domain classes?
A: Class diagrams and object diagrams.
Which part of a use case description can also be modeled by using
an activity diagram?
A: Flow of activities.
Explain the difference between a use case and a scenario.
A: A use case outlines overall functionality; a scenario details specific use
case paths.
List the parts of a fully developed use case description.
A: Name, description, actors, preconditions, flow, postconditions, and
exceptions.
Explain HTTPS vs HTTP.
A: HTTPS encrypts data, ensuring secure transmission, while HTTP transmits
in plain text.

You might also like