network diagram
architectural design
detail design
local area network (LAN)
client-server architecture
client computers
server computer
Hypertext Markup Language (HTML)
Transmission Control Protocol/Internet Protocol (TCP/IP)
three-layer architecture
view layer
business logic layer or domain layer
data layer
Hypertext Transfer Protocol Secure (HTTPS)
Transport Layer Security (TLS)
content delivery network (CDN)
hosting
colocation
virtual server
cloud computing
Service Level Agreement (SLA)
Virtual Private Networks (VPNs)
peer-to-peer connection
What is the primary objective of systems design?
What is the difference between systems analysis and systems design?
List the major elements that must be designed for a new software application.
List the models that are used for systems analysis.
List the models that are used for systems design.
What is the difference between user-interface design and system-interface design?
On a project that uses iterations to develop the system, in which iteration does systems design begin? Explain why.
What is the difference between architectural design and detail design?
Designing the security and controls impacts the design of which other elements?
Describe what is required for database design.
What is a LAN? When would it be used in deploying a new system?
What is three-layer design?
Describe the contents of each layer in three-layer design.
List the different types of client devices in a client/server architecture.
What is the difference between HTTPS and HTTP?
In the use of software over the Internet, what are the two main security issues that must be considered?
Describe the primary factors that affect throughput for Internet systems.
List five issues that are important when considering an external hosting company.
What is the difference between cloud computing and virtual servers?
Why do companies use colocation facilities?
Describe the issues to be considered when designing for multiple clients.
What is a VPN? Why would a company use a VPN?
A financial corporation has desktop applications running in several different offices that are all supported by a centralized application bank of two computers. In addition, there is a centralized database, which requires three servers. Draw a network diagram representing this requirement.
Describe the differences between HTTPS and a VPN. What kinds of computing and networking situations are better suited to HTTPS? What kind of computing and networking situations are better suited to VPN?