7. Client/Server pattern is good when many clients a) process/different, b) share/same, & Pipe and filter pattern should be used for a) interactive, b) event, 9. Maintainability is better when a) fine-grain, 10 A lavered b) coarse-grais, data remotely. c) store/same, d) none. applications. e) data processing. decomposition is used. c) arbitrary. d) all. d) all
7. Client/Server pattern is good when many clients a) process/different, b) share/same, & Pipe and filter pattern should be used for a) interactive, b) event, 9. Maintainability is better when a) fine-grain, 10 A lavered b) coarse-grais, data remotely. c) store/same, d) none. applications. e) data processing. decomposition is used. c) arbitrary. d) all. d) all
Principles of Information Systems (MindTap Course List)
12th Edition
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter9: Enterprise Systems
Section: Chapter Questions
Problem 2SAT
Related questions
Question
Principles of softeware engineer
![7. Client/Server pattern is good when many clients
a) process/different,
b) share/same,
8. Pipe and filter pattern should be used for
a) interactive,
b) event,
9. Maintainability is better when
a) fine-grain,
decomposition is used.
b) coarse-grain,
10.A layered archotecture is good for
e) arbitrary,
none functional requirement.
a) security, b) performance, c) functional,
11.MVC pattern is used when there is a need to separate
d) none.
layer from layer
a) database/processing b) store/processing e)view/processing d) none.
14. Interactive applications are a type of
a) data
b) event
applications.
e) data processing.
15. Database intensive applications are a type of
a) data
b) event
the
12. Layered pattern is used when security and
layers are needed
a) low/dependent b) high/dependent c) low/independent d) high/independent.
13. Application architectural patterns are based on common
a) non-functional b) system
c) domain
processing applications
c) transaction
18. Unit testing is a part of
a) acceptance
e) transaction
b) system
data remotely.
c) store/same,
d) none.
16. Which of the folloings checks user real requirements?
a) testing
b) inspection
e) reviewing
d) all.
9. Complete coverage of testing of a class includes
a) methods
b) attributes
c) state
e) development
requirements
d) design
d) all
17. Which of the followings contain a setup, a call and an assertion parts?
a) inspection b) release testing e) acceptance testing d) automated testing
testing
d) all
d) language
processing applications
d) language
d) realease
d) all
Approaches like grammar, tangible things, scenario-based analysis are used to identify
b) class objects c) context diagrams
use cases
d) subsystems](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fab4c6fbb-baf8-40af-b59c-983bdd03446b%2Fad597dd4-8f7d-4030-81c1-2c2ff77c4779%2Fn3d24d4_processed.jpeg&w=3840&q=75)
Transcribed Image Text:7. Client/Server pattern is good when many clients
a) process/different,
b) share/same,
8. Pipe and filter pattern should be used for
a) interactive,
b) event,
9. Maintainability is better when
a) fine-grain,
decomposition is used.
b) coarse-grain,
10.A layered archotecture is good for
e) arbitrary,
none functional requirement.
a) security, b) performance, c) functional,
11.MVC pattern is used when there is a need to separate
d) none.
layer from layer
a) database/processing b) store/processing e)view/processing d) none.
14. Interactive applications are a type of
a) data
b) event
applications.
e) data processing.
15. Database intensive applications are a type of
a) data
b) event
the
12. Layered pattern is used when security and
layers are needed
a) low/dependent b) high/dependent c) low/independent d) high/independent.
13. Application architectural patterns are based on common
a) non-functional b) system
c) domain
processing applications
c) transaction
18. Unit testing is a part of
a) acceptance
e) transaction
b) system
data remotely.
c) store/same,
d) none.
16. Which of the folloings checks user real requirements?
a) testing
b) inspection
e) reviewing
d) all.
9. Complete coverage of testing of a class includes
a) methods
b) attributes
c) state
e) development
requirements
d) design
d) all
17. Which of the followings contain a setup, a call and an assertion parts?
a) inspection b) release testing e) acceptance testing d) automated testing
testing
d) all
d) language
processing applications
d) language
d) realease
d) all
Approaches like grammar, tangible things, scenario-based analysis are used to identify
b) class objects c) context diagrams
use cases
d) subsystems
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![Principles of Information Systems (MindTap Course…](https://www.bartleby.com/isbn_cover_images/9781285867168/9781285867168_smallCoverImage.gif)
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
![Management Of Information Security](https://www.bartleby.com/isbn_cover_images/9781337405713/9781337405713_smallCoverImage.gif)
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
![Principles of Information Systems (MindTap Course…](https://www.bartleby.com/isbn_cover_images/9781285867168/9781285867168_smallCoverImage.gif)
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
![Management Of Information Security](https://www.bartleby.com/isbn_cover_images/9781337405713/9781337405713_smallCoverImage.gif)
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,