Test Bank Chapter 11 Physical Architecture Layer Design - Systems Analysis with UML 6th Edition | Test Bank with Key by Dennis and Wixom by Dennis Wixom, Tegarden. DOCX document preview.

Test Bank Chapter 11 Physical Architecture Layer Design

Chapter 12: Physical Architecture Layer Design
Testbank

Multiple Choices

  1. The computing architecture in which the server performs practically all of the work is known as _____.

a. client connection based architecture

b. client-based architecture

c. client-server architecture

d. server-based architecture

e. middleware architecture

  1. Which of the following is NOT one of the four basic functions of a computer application?

a. application logic

b. data access logic

c. data storage

d. networking logic

e. presentation logic

  1. A server can be a(n) _____.

a. mainframe

b. mainframe, minicomputer, or microcomputer

c. microcomputer

d. minicomputer

e. low-end personal computer

  1. The application function that allows data to be stored and retrieved is called _____.

a. application logic

b. data access logic

c. data storage

d. presentation logic

e. network logic

  1. A server in the client-server architecture performs which of the following application functions?

a. application logic and data storage

b. application logic and presentation logic

c. data access logic and presentation logic

d. data access logic and data storage

e. data storage logic and presentation logic

  1. What is one primary problem with server-based computing architectures?

a. As more users place heavier demands on the server, it is expensive to increase server capacity.

b. Client terminals are no longer made by hardware vendors.

c. It is difficult to maintain security in the server-based environment.

d. Servers are no longer made by hardware vendors.

e. Servers cannot be manufactured quickly by vendors.

  1. Scalability refers to the _____.

a. easy increase or decrease of the storage and processing capabilities of the computer

b. fact that there is no central point of failure in the system

c. deployment of middleware in the system

d. support of many different types of clients and servers

e. ease of decreasing the cost of the infrastructure during economic downturn

  1. In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

a. presentation logic

b. application logic

c. data access logic

d. data storage

e. any of the above can be spread across two or more sets of servers

  1. The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____.

a. control and security, scalability, cost of programming

b. interface capabilities, control and security, cost of programming

c. interface capabilities, control and security, scalability

d. interface capabilities, control, and security

e. interface capabilities, scalability, cost of programming

  1. Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____.

a. server-based

b. client-based

c. client-server

d. network-based

e. client-network server

  1. A network model will depict _____.

a. clients

b. network equipment

c. external networks

d. servers

e. all of these

  1. Elements of a deployment diagram include _____.

a. Nodes, artifacts, and locations of middleware components

b. Client PCs, servers, and locations of application logic modules

c. Servers, external networks, and data access logic

d. Primarily servers

e. Nodes, artifacts, and communication paths

  1. In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________.

a. Encrypt data, decrypt data

b. Store data, restore data

c. Access data, access information

d. Password-protect data, retrieve password

e. Encrypt login id, encrypt password

  1. The public key infrastructure (PKI) is ______.

a. hardware

b. software

c. organizations

d. policies

e. all of these

  1. Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year.

a. 90

b. 80

c. 70

d. 60

e. 50

  1. Systems designed to handle multiple languages on the fly are ____ multilingual systems.

a. ad-hoc

b. concurrent

c. versatile

d. discrete

e. global

  1. Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems.

a. cultural

b. specialized

c. variable

d. idiosyncratic

e. unstated

  1. The cloud can contain the firm’s IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service.

a. Infrastructure as a service (IaaS)

b. Platform as a service (PasS)

c. Software as a service (SaaS)

d. Utility as a service (UaaS)

e. Computing as a service (CaaS)

  1. Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing.

a. distributed computing

b. e-business

c. Remote Method Invocation (RMI)

d. virtualization

e. networking

  1. Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer.

a. the cost of the cloud

b. the level of availability of the cloud

c. the security in the cloud

d. the safety of the cloud

e. the usability of the cloud

  1. Essentially, ___________computing is the idea that computing takes place everywhere and in everything.

a. Internet

b. cloud

c. ubiquitous

d. Internet of Things (IoT)

e. business

  1. The ______________is the idea that, in addition to things having some form of computing capacity built into them, everyday things become connected via the Internet.

a. cloud computing

b. big data

c. machine learning

d. Internet of Things (IoT)

e. e-business

True False

  1. In the server-based architecture, all data stored on one computer.
  2. An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.
  3. With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.
  4. Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.
  5. A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.
  6. Senior management has established the priority for the new system as “the highest security and control at any cost.” The systems analyst should recommend a client-based computing architecture.
  7. Senior management has established the priority for the new system as “user friendly, and quickly and inexpensively expandable to all part of the organization.” The systems analyst should recommend a client-server based computing architecture.
  8. The hardware and software specification is a document that describes what hardware and software are needed to support the application.
  9. Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.
  10. The purpose of the network model is to convey the complexity of the system, to show how the system’s components will fit together, and to help the project team develop the hardware and software specification.
  11. A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.
  12. In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).
  13. A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.
  14. Most systems are not built to use the existing infrastructure in the organization, so the current infrastructure rarely restricts the choice of architecture.
  15. The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.
  16. Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.
  17. In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.
  18. The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.
  19. The function that provides the logic related to the problem domain layer is called application logic.
  20. The function that provides the processing logic required by the human computer interaction layer is called presentation logic.
  21. In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.
  22. Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.
  23. Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.
  24. A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.
  25. The major problem with a server-based architecture is that all data on the server must travel to the client for processing.
  26. Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.
  27. Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.
  28. In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.
  29. Legacy databases and systems are one of seven factors in the hardware and software specification document
  30. Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.
  31. Virtualization is another term for cloud computing.
  32. Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.
  33. With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor’s cloud.
  34. Security concerns are one of the set of obstacles for adopting the cloud.
  35. Cost of cloud is one of the set of obstacles for adopting the cloud.
  36. The paperless office idea is becoming a reality thanks for widely using of tablet devices.
  37. Ubiquitous computing is the idea that computing takes place everywhere and in everything.
  38. Currently, there is only one major approach to support ubiquitous computing: specialized computing devices.
  39. Enhanced objects are a type of magic objects.
  40. Enchanted objects should be in the background simply providing its message for you to receive at your leisure; not “in your face.”

Short Answer

  1. Describe the fundamental types of computing architectures. Identify the four general functions of an application system and apply each to the corresponding computing architecture.

The four general functions of an application system are data storage, data access, application logic, and presentation logic. Data storage is the function that is represented in the entity relationship diagram. Data storage is the actual data that is stored. Data access is the process that is required to retrieve the data that is stored. Data access includes the query language. Application logic is the process that is documented in the data flow diagram. Presentation logic includes the acceptance of the user’s commands through the user interface and all information that is presented to the user via reports, screens, etc.

In a server-based architecture the server provides the presentation logic, the application logic, the data access logic, and the data storage. The client does not provide anything.

In a client-based architecture the client provides the presentation logic, the application logic, and the data access logic. The server provides the data storage.

In a client-server based architecture the client provides the presentation logic. The server provides the data storage logic and the data access. The application logic may be split between both the client and the server.

  1. Identify the characteristics used when selecting a computing architecture. Provide a description of characteristic.

The cost of the infrastructure is the major force toward the implementation of client-server computing. Client-server based architectures cost less than server-based and tend to cost less than client-based.

The cost of developing systems is also important. Developing software for client-server computers is complex and expensive. It is thought to be 4 or 5 times more expensive than server-based. Client-based computing is less expensive than server-based because of the graphical user interface.

Ease of development has come a long way since the development of graphical user interfaces. Client-based and client-server based systems are much easier to develop than server-based. But, client-server based system do have a complexity built in when multiple layers of hardware are used.

Typically server-based applications contain character-based interfaces which are not as simple to use as graphical user interfaces (GUI). New GUI and web development tools assist in the development of improved client-based and client-server based systems.

Server-based systems are the most secure for multi-user environments. Client-server systems are still maturing in terms of security. Client systems are secure for individual users.

Scalability is the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. The most scalable architecture is client-server. By contrast, server-based architectures rely on mainframe hardware that needs to be scaled up in large expensive increments. Client-based architectures have ceilings, above which the application cannot grow.

  1. Scott and Tim need to implement a very secure system for the Johnson Space Flight Center. The Center has an endless hardware budget, so infrastructure costs are not a consideration. The Center has a well-trained IS staff that is available for the project. Only six people will be interacting with the new system and they are engineers with years of computer experience. Scott and Tim do not see changes to the system in the near future. Using the six characteristics of a computing architecture, make an architecture selection recommendation to Scott and Tim.
  2. Sara and Julian need to implement a system for the Johnson Space Flight Center. It is projected that the Center will grow 60% or more over the next two years. These drastic increases at the Center will be reflected in huge increases in personnel, the relocation of offices, and many software upgrades. All of the software to be used in this system is considered “non-secure”. The software will be purchased, thus reducing the cost of development. Using the six characteristics of a computing architecture, make an architecture selection recommendation to Sara and Julian.
  3. Explain how the four fundamental computer application functions are handled in client-server computing architectures. Discuss what is meant by fat client and thin client configurations.
  4. Explain the distinction between two-tiered, three-tiered, and n-tiered client-server architectures. What is the chief advantage of a multi-tiered architecture as compared to a two-tiered architecture? What are the limitations?

The primary advantage of multi-tiered client-server architecture is the fact that the processing load can be balanced among the application servers; it is more scalable. The disadvantages of the n-tiered architecture arise from increased network traffic required in this environment. Since more communication occurs between the servers, more network traffic will be generated, requiring a higher-capacity network. The second problem is that it is more difficult to develop software in the multi-tiered architecture, since more devices have to communicate in order to complete a user transaction.

  1. Discuss the factors that might encourage an organization to adopt a server-based architecture as opposed to a client-server-based architecture.
  2. Describe deployment diagrams. Discuss different components of a deployment diagram.
  3. Describe network models. Discuss different components of a network model.
  4. Name the three different types of clouds. How do they differ from each other?
  5. What are the issues related to security in the cloud?
  6. What is meant by a service-oriented architecture?
  7. What is meant by ubiquitous computing? How about the Internet of Things?
  8. What is an enchanted object?

Document Information

Document Type:
DOCX
Chapter Number:
11
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 11 Physical Architecture Layer Design
Author:
Dennis Wixom, Tegarden

Connected Book

Systems Analysis with UML 6th Edition | Test Bank with Key by Dennis and Wixom

By Dennis Wixom, Tegarden

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party