local area network (LAN)
Hypertext Markup Language (HTML)
Transmission Control Protocol/Internet Protocol (TCP/IP)
business logic layer or domain layer
Hypertext Transfer Protocol Secure (HTTPS)
Transport Layer Security (TLS)
content delivery network (CDN)
Service Level Agreement (SLA)
Virtual Private Networks (VPNs)
What is the primary objective of systems design?
What is the difference between systems analysis and systems design?
List the major elements that must be designed for a new software application.
List the models that are used for systems analysis.
List the models that are used for systems design.
What is the difference between user-interface design and system-interface design?
On a project that uses iterations to develop the system, in which iteration does systems design begin? Explain why.
What is the difference between architectural design and detail design?
Designing the security and controls impacts the design of which other elements?
Describe what is required for database design.
What is a LAN? When would it be used in deploying a new system?
What is three-layer design?
Describe the contents of each layer in three-layer design.
List the different types of client devices in a client/server architecture.
What is the difference between HTTPS and HTTP?
In the use of software over the Internet, what are the two main security issues that must be considered?
Describe the primary factors that affect throughput for Internet systems.
List five issues that are important when considering an external hosting company.
What is the difference between cloud computing and virtual servers?
Why do companies use colocation facilities?
Describe the issues to be considered when designing for multiple clients.
What is a VPN? Why would a company use a VPN?
A financial corporation has desktop applications running in several different offices that are all supported by a centralized application bank of two computers. In addition, there is a centralized database, which requires three servers. Draw a network diagram representing this requirement.
Describe the differences between HTTPS and a VPN. What kinds of computing and networking situations are better suited to HTTPS? What kind of computing and networking situations are better suited to VPN?