Design and Security Controls in Software Development Questions With complete verified solutions already graded A+(PASS GUARANTEED)

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:03 PM on 12/3/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

Digital Certificate

An institution's name and public key encrypted and certified by a third party

2
New cards

Data Validation Control

General control technique to ensure entered data is correct

3
New cards

Design the Software Classes

Activity to determine internal structure for efficient construction

4
New cards

Privileged User

User with special security and system access rights

5
New cards

Designing the User Interface

Activity requiring knowledge of computing devices accessed by clients

6
New cards

Authorization of Users

Factor affecting the risk of fraud

7
New cards

External Systems and Technology Architecture

Key elements for describing the environment

8
New cards

Analysis vs Design

Comparison: Analysis is understanding, design is solution

9
New cards

User Interface Screen Layouts

Not considered a design model

10
New cards

Registered Users

Known and authorized to access parts of the system

11
New cards

Web-Based Application

Software using a browser and web-server

12
New cards

Protocol

Languages, rules, and procedures for data exchange

13
New cards

Deployment Diagram

Not normally produced as part of application component design

14
New cards

XML

Stands for Extensible Markup Language

15
New cards

Server Computer

Manages shared resources for access across a network

16
New cards

System Software

Refers to operating system and web servers

17
New cards

Completeness Control

Control mechanism to ensure all necessary transaction information is entered

18
New cards

Design the Interfaces

Activity involving system interaction with other systems

19
New cards

Embedded Software

Example: Toolbar

20
New cards

Field Combination Control

Integrity control verifying data in one field against others

21
New cards

Verifying Who Sent a Document

Primary purpose of using digital signatures

22
New cards

Security and Controls Design

Design activity pervading all other design activities

23
New cards

VPN

Not a valid web protocol