When designing business objects which of the following statements is true? (Choose three.)
A process is required for a client in the banking sector that involves using an application to transfer funds between accounts. A strong security model is in place to prevent any malicious activity but the client is nervous about the risk of external problems, like a power cut leaving a case in an incomplete state or a fault in thesource data causing a case to be duplicated or an excessively large transfer to be made.
What should be included in the solution design? (Choose three.)
A process is required for a telecoms company to work cases supplied via a daily Excel file. Although the file will only contain around 1000 rows, the average case time is such that the workload is far too big for one machine to complete in a day, so the solution has been designed with multiple machines in mind. One machine will load the work queue while the others wait, then once the queue is ready all machines will work it together. The requirements state that the input file is machine generated, has a known format, is generally clean but may contain exceptions – rows with an empty cell, partial phone numbers, or accounts that don’t exist.
What should the solution do to combat this problem?
It’s technically possible for one business object to call another. Outside ofusing utility objects are any of the following valid reasons why you would want to do this?
Consider the following high-level design. Thesolution is intended to read medical data from one application in order to update another. An input file is prepared by an overnight batch run for the solution to work through each morning before patients arrive. Usually the input file is fairly small butat certain times each month the file is much larger.
Which of these options should be considered be the process solution designer to guarantee the quality of the end-to-end solution? (Choose four.)