1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Digital Certificate
An institution's name and public key encrypted and certified by a third party
Data Validation Control
General control technique to ensure entered data is correct
Design the Software Classes
Activity to determine internal structure for efficient construction
Privileged User
User with special security and system access rights
Designing the User Interface
Activity requiring knowledge of computing devices accessed by clients
Authorization of Users
Factor affecting the risk of fraud
External Systems and Technology Architecture
Key elements for describing the environment
Analysis vs Design
Comparison: Analysis is understanding, design is solution
User Interface Screen Layouts
Not considered a design model
Registered Users
Known and authorized to access parts of the system
Web-Based Application
Software using a browser and web-server
Protocol
Languages, rules, and procedures for data exchange
Deployment Diagram
Not normally produced as part of application component design
XML
Stands for Extensible Markup Language
Server Computer
Manages shared resources for access across a network
System Software
Refers to operating system and web servers
Completeness Control
Control mechanism to ensure all necessary transaction information is entered
Design the Interfaces
Activity involving system interaction with other systems
Embedded Software
Example: Toolbar
Field Combination Control
Integrity control verifying data in one field against others
Verifying Who Sent a Document
Primary purpose of using digital signatures
Security and Controls Design
Design activity pervading all other design activities
VPN
Not a valid web protocol