(FINAL)ITEC3010

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:56 AM on 4/12/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

54 Terms

1
New cards

Use Case Realization

Process of elaborating the detailed design with interaction diagrams for a particular use case

2
New cards

Interaction Diagram 

Shows how objects work together to carry out a use case.
Includes Sequence Diagrams and Communication Diagrams.

3
New cards

Sequence Diagram 

An interaction diagram that focuses on the order of messages over time between objects.

4
New cards

Communication Diagram 

Structure-focused diagram showing which objects communicate and what messages are sent

5
New cards

Use Case Controller 

A designer-created class that links UI to business logic, coordinates tasks, and handles user actions.

6
New cards

Message Flow 

The typical path of interaction: Actor → Boundary (UI) → Controller → Entities (data).

7
New cards

Purpose of Controller 

To reduce coupling, increase cohesion, and make the system more reusable and easier to modify.

8
New cards

Actor

Represents an external role of the person or thing that initiates the use case by sending the initial message

9
New cards

Object

instantiated class objects that perform actions to help carry out the use case

10
New cards

Link

connectors that illustrate the flow of messages

11
New cards

Messages

primary element of a communication diagram

12
New cards

True/false condition (optional)

if true the message is sent, if false the message is not sent

Sequence number - identifies the order of messages

13
New cards

Sequence number

identifies the order of messages

14
New cards

Return-value

the type of value that the message returns after the completion of the service requested in a forward message. Basically the method return value.

15
New cards

Message-name

usually camelCase. Should be named informatively.

16
New cards

Parameter list

 items of data that are passed to the destination object via the message. Basically the arguments of the method.

17
New cards

Activation lifelines

show the period during which a method of an object is alive and executing

18
New cards

Lifelines

Show the passage of time

19
New cards

Synchronous Message (Synchronous Call)

-       Filled arrow head

-       Message is sent from source lifeline to target lifeline

20
New cards

Asynchronous Message (Asynchronous Call)

Open or Flat Arrowhead

21
New cards

External Systems (Analysis) 

Identify all systems your system must connect to or exchange data with.

22
New cards

Technology Architecture (Design) 

Specifies message formats, web/network addresses, communication protocols, security, and error handling.

23
New cards

User Interface (UI) 

Part of the system users interact with, involving mockups, tools, models, storyboards, and prototypes.

24
New cards

User Experience (UX) 

The broader scope of UI design, focusing on how users feel and interact with the system overall.

25
New cards

Centralized vs Distributed 

Centralized systems run from one location, while distributed systems operate across multiple locations or servers.

26
New cards

Normalization

Organizing a relational database using normal forms to minimize redundancy and ensure data integrity.

27
New cards

Controls

mechanisms and procedures built into a system to safeguard the system and the information within

28
New cards

Integrity controls

controls that reject invalid data inputs, prevent unauthorized data outputs, protect data and programs against tampering

29
New cards

Input Controls

controls that prevent invalid or erroneous data from entering the system

30
New cards

Value limit controls

controls that check numeric data input to ensure that that value is reasonable, e.g. must be greater than zero

31
New cards

Completeness controls

controls that ensure that all required data values describing an object are present

32
New cards

Data validation controls

controls that ensure that numeric fields that contain codes or identifiers are correct

33
New cards

Field combination controls

controls that review combinations of data inputs to ensure that the correct data are entered

34
New cards

Output controls

controls that ensure that output arrives at the proper destination, which are “Accurate, current and complete”.

35
New cards

Security controls

controls that protect the assets of an organization from all threats

36
New cards

Access controls

control that limits a users ability to access resourses.

37
New cards

Authentication

process of identifying users who request access to access controlled resources

38
New cards

Authorization

process of allowing or restricting a specific authenticated users access to a specific resource based on access controls

39
New cards

CRUD

Create, Read (or Report), Update, and Delete — the 4 basic operations on data. Step 1: Identify all domain classes in the system. Step 2: For each class, ensure there are use cases to Create, Read/Report, Update, and Delete or archive instances. Step 3: Add any missing use cases and identify the stakeholders responsible for them. Step 4: Assign each action to the application or system responsible for carrying it out (e.g., which app handles "create").

40
New cards

Encryption

cryptographically altering data to be undecipherable to those without the key (Requires an algorithm; Requires a key (or multiple keys))

41
New cards

Decryption

convert encrypted data back to its original state

42
New cards

Symmetric key encryption

uses the same key to encrypt and decrypt

43
New cards

Asymmetric key encryption

 uses different keys to encrypt and decrypt

44
New cards

Public key encryption

uses public key to encrypt and private key to decrypt

45
New cards

Digital Certificates

has an institutions name and public key

46
New cards

Technology Architecture

The set of computing hardware, network hardware, and system software employed by an organization

47
New cards

Application Architecture

The set of information systems (including software applications) that an organization needs to support its strategic plan or fulfill its business goals

48
New cards

Distributed Architecture

Distribution of system components (hardware and software) across multiple geographic locations

49
New cards

Client/Server Architecture

server manages system resources and provides access to the resources, client communicates with the server to request resources

50
New cards

Three-layer Architecture

       View layer: accepts user input and displays outputs

       Business logic layer: (aka domain layer) implements the rules and procedures of business processing

       Data layer: manages stored data, usually in databases

<p><span>•</span><span style="font-size: 7pt; font-family: &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><strong>View layer: </strong>accepts user input and displays outputs</p><p class="MsoNormal"><span>•</span><span style="font-size: 7pt; font-family: &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><strong>Business logic layer: (aka domain layer) </strong>implements the rules and procedures of business processing</p><p class="MsoNormal"><span>•</span><span style="font-size: 7pt; font-family: &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span><strong>Data layer: </strong>manages stored data, usually in databases</p>
51
New cards

Location Diagram

model that shows the geographic placement of systems components          

52
New cards

Network Diagram

Model that shows how locations and hardware components are interconnected

53
New cards

Deployment Diagram

Model that shows how software components are distributed across hardware components

54
New cards

Structure Chart 

A hierarchical model (not UML) that shows how software modules relate and break down functions.

Explore top notes

note
Invisible Man Chapter 1
Updated 1173d ago
0.0(0)
note
Media & Information Literacy
Updated 322d ago
0.0(0)
note
Invisible Man Chapter 7
Updated 1173d ago
0.0(0)
note
Unit 3 : Macromolecules
Updated 313d ago
0.0(0)
note
International Cooperation
Updated 1195d ago
0.0(0)
note
Biochimie
Updated 746d ago
0.0(0)
note
Invisible Man Chapter 1
Updated 1173d ago
0.0(0)
note
Media & Information Literacy
Updated 322d ago
0.0(0)
note
Invisible Man Chapter 7
Updated 1173d ago
0.0(0)
note
Unit 3 : Macromolecules
Updated 313d ago
0.0(0)
note
International Cooperation
Updated 1195d ago
0.0(0)
note
Biochimie
Updated 746d ago
0.0(0)

Explore top flashcards

flashcards
S.S. Unit 3 - Study Guide
57
Updated 126d ago
0.0(0)
flashcards
Chapter 27
120
Updated 705d ago
0.0(0)
flashcards
Lit Words: 2 The Boogaloo
24
Updated 496d ago
0.0(0)
flashcards
Lab Practical 3
75
Updated 755d ago
0.0(0)
flashcards
Polyatomic Ions
21
Updated 768d ago
0.0(0)
flashcards
Latin Week 5
26
Updated 920d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1011d ago
0.0(0)
flashcards
S.S. Unit 3 - Study Guide
57
Updated 126d ago
0.0(0)
flashcards
Chapter 27
120
Updated 705d ago
0.0(0)
flashcards
Lit Words: 2 The Boogaloo
24
Updated 496d ago
0.0(0)
flashcards
Lab Practical 3
75
Updated 755d ago
0.0(0)
flashcards
Polyatomic Ions
21
Updated 768d ago
0.0(0)
flashcards
Latin Week 5
26
Updated 920d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1011d ago
0.0(0)