combined set cs4500
The Code of Fair Information Practices (suggested in 1970 by a US government committee) demands that there must be no personal data record-keeping systems whose very existence is secret. - [ ] True - [ ] False
- [x] True
Failures in computerized systems have resulted in fatalities. - [ ] True - [ ] False
- [x] True
Get the code under source control and building successfully before you change anything... including fixing bugs. - [ ] True - [ ] False
- [x] True
If people did not have privacy, they would have to wear their public face at all times, which could be damaging to their psychological health. - [ ] True - [ ] False
- [x] True
The Web does not have a universally accepted ratings system. - [ ] True - [ ] False
- [x] True
If you decompile third-party code because it doesn't work right, that could mean you are breaking the license of the third-party software. - [ ] True - [ ] False
- [x] True
If you haven't been checking in with your customer, the gap between their ideal software and what you're building to grow very large without you knowing it. - [ ] True - [ ] False
- [x] True
In TDD, each test should verify only one thing. - [ ] True - [ ] False
- [x] True
In general, it's not practical to always hit 100% coverage. - [ ] True - [ ] False
- [x] True
In practice, there is no reason why you cannot consider duties, rights, and consequences when making moral decisions. - [ ] True - [ ] False
- [x] True
Keep iterations short. - [ ] True - [ ] False
- [x] True
Mock objects are rarely working object stand-ins. - [ ] True - [ ] False
- [x] True
Most of the work we've done following the process of the textbook can be captured and reported in a more formal fashion. - [ ] True - [ ] False
- [x] True
There are no hard and fast rules about who to give a task to. - [ ] True - [ ] False
- [x] True
There is no single process that magically makes software development succeed. - [ ] True - [ ] False
- [x] True
When making a bug fix estimate after a spike test, your team's gut feeling matters. - [ ] True - [ ] False
- [x] True
Whistleblowers and their families typically suffer emotional distress and economic hardship. - [ ] True - [ ] False
- [x] True
Your build script should be checked into and out of version control with everything else. - [ ] True - [ ] False
- [x] True
On average, people in which country below work (or worked) the longest? - [ ] Germany - [ ] Ancient Greece - [ ] France - [ ] U.S.
- [x] U.S.
Objectivism is based on the idea that morality has an existance outside the mind, and that it is the responsibility of people to discover morality. - [ ] True - [ ] False
- [x] True
Pretty much all software has some bugs. - [ ] True - [ ] False
- [x] True
Reusing code does not always increase the quality of the final product. - [ ] True - [ ] False
- [x] True
"For ..._____, an abundance of privacy may be a curse, not a blessing." - [ ] outcasts - [ ] criminals - [ ] politicians - [ ] children
- [x] outcasts
"You should promise and deliver rather than ... ______ and fail." - [ ] overpromise - [ ] lie - [ ] add too many bugs - [ ] not deliver
- [x] overpromise
According to Quinn, the most common form of censorship is (perhaps)... - [ ] prepublication review - [ ] government monopolization - [ ] licensing and registration - [ ] self-censorship
- [x] self-censorship
In 2010, Phillip Alpert was convicted of a felony in Florida because he ... - [ ] spammed a computer virus - [ ] stole a friend's credit card number - [ ] sexted a nude photo of his girlfriend - [ ] broadcast a radio monologue called "Filthy Words"
- [x] sexted a nude photo of his girlfriend
If you capture a user's cookie, and use that to hijack an open Web session, that is called ... - [ ] sidejacking - [ ] a copyright infringement - [ ] good clean fun - [ ] code cracking
- [x] sidejacking
In the 1790's, the French used ..._____ to send telegraph messages quickly over long distances. - [ ] water - [ ] electricity - [ ] sight - [ ] ponies
- [x] sight
Rule #2 for TDD is: implement the ..._____ code possible to make your tests pass. - [ ] most efficient - [ ] best documented - [ ] most comprehensive - [ ] simplest
- [x] simplest
There is no silver-bullet process. - [ ] True - [ ] False
- [x] True
"Good code is easy to ..._____, as well as easy to GET." - [ ] COMMIT - [ ] READ - [ ] FIND - [ ] USE
- [x] USE
..._____ created an RFID tag approved for use in humans. - [ ] Verichip Corporation - [ ] Research Dynamics - [ ] Facebook - [ ] Apple
- [x] Verichip Corporation
What was the name of the program that defeated the two best human _Jeopardy! players in 2011?_ - [ ] Richard Epstein - [ ] Watson - [ ] AlphaGo - [ ] Deep Blue
- [x] Watson
The most famous Web site that allows multiple people to contribute and edit its content is ..._____. - [ ] Wikipedia - [ ] Facebook - [ ] Rotten Tomatoes - [ ] MySpace
- [x] Wikipedia
Which of the following does Quinn link to virtue ethics? - [ ] Would my decision hold up to public scrutiny? - [ ] Who is affected? - [ ] Am I treating other human beings with respect? - [ ] How will those who are least empowered be affected?
- [x] Would my decision hold up to public scrutiny?
According to Chapter 9(P), you have to track bugs. - [ ] True - [ ] False
- [x] True
An RFID is a tiny wireless transmitter. - [ ] True - [ ] False
- [x] True
Sometimes software that is used for a long time suddenly goes haywire because unusual conditions happen, by bad luck, all at about the same time. A famous 2005 Tokyo Stock Exchange bug only surfaced after five years because it only occured when ..._____ different unusual conditions happened simultaneously. - [ ] 7 - [ ] 5 - [ ] 12 - [ ] 13
- [x] 7
Quinn writes that the probability that a particular case of identity theft will result in an arrest is about 1 in ..._____. - [ ] 1000 - [ ] 78 - [ ] 170 - [ ] 700
- [x] 700
"The secret to great software development is..." - [ ] the Internet - [ ] iteration - [ ] speed - [ ] precision
- [x] iteration
According to Quinn (and Shoeman), "Most ..._____ takes place under the cover of privacy." - [ ] email - [ ] wrongdoing - [ ] legal contracting - [ ] personal communication
- [x] wrongdoing
Put the following steps for version control into the proper order. You may assume that you have already installed a version control system, and that the system has your current system files already in the system. STEP # 1 2 3. 4 STEPS Identify the code file you want to work on. Check the code out from the respository. Make your changes. Commit your changes back into the repository.
1 Identify the code file you want to work on. 2 Check the code out from the respository. 3 Make your changes. 4 Commit your changes back into the repository.
Match the name to the ethical theory she or he is most closely associated. Names: - Ayn Rand - Jeremy Bentham - John Rawls - Aristotle Ethical Theories: - ethical egoism - utilitarian - social contract theory - virtue ethics
Ayn Rand - ethical egoism Jeremy Bentham - utilitarian John Rawls - social contract theory Aristotle - -virtue ethics
Who developed the A-0 system that automated the process of linking together subroutines to form the complete machine code? - [ ] Grace Murray Hopper - [ ] John Mauchly - [ ] John Backus - [ ] Steve Jobs
- [x] Grace Murray Hopper
The 1890 U.S. census was facilitated by punched cards supplied by... - [ ] Blaise Pascal - [ ] Herman Hollerith - [ ] Clifford Berry - [ ] Steve Wozniak
- [x] Herman Hollerith
Besides their big idea, customers probably have two basic concerns: - [ ] What programming language will you use? - [ ] Who will work on this? - [ ] How much will it cost? - [ ] How long will it take?
- [x] How much will it cost? - [x] How long will it take?
Which company is the corporate descendant of Hollerith's information processing company? - [ ] Apple - [ ] Ferranti - [ ] IBM - [ ] Microsoft
- [x] IBM
An Internet company announced a change in policy in 2012, and it seemed to allow the company to use people's information and photos without compensation or permission. After an outcry from subscribers, the company changed the policy. What company was this? - [ ] Instagram - [ ] Google - [ ] Yahoo - [ ] Apple
- [x] Instagram
Which writer invented the "Three Laws of Robotics?" - [ ] Rex Stout - [ ] Kurt Vonnegut - [ ] Isaac Asimov - [ ] Ray Bradbury
- [x] Isaac Asimov
Which two of the following are cited by Quinn as the attributes that have enabled the World Wide Web to become a global tool for information exchange? - [ ] It is based on the Internet. - [ ] It is decentralized. - [ ] Every object on the Web has a unique address. - [ ] Tim Berners-Lee invented it.
- [x] It is decentralized. - [x] Every object on the Web has a unique address.
Which three of the following must happen once a task gets on the Big Board? - [ ] It must be assigned. - [ ] It must be worked on. - [ ] It must be refactored. - [ ] It must be estimated.
- [x] It must be assigned. - [x] It must be worked on. - [x] It must be estimated.
What is the name of a notoriously unreliable x-ray machine that killed three people in the 1980's? - [ ] Malfunction 54 - [ ] Bone Master - [ ] Challenger - [ ] Therac-25
- [x] Therac-25
Who completed the first Web browser on Christmas Day in 1990? - [ ] Gene Spafford - [ ] Bill Gates - [ ] Tim Berners-Lee - [ ] Steve Jobs
- [x] Tim Berners-Lee
A program with a benign capability that conceals a sinister purpose is called a... - [ ] Trojan horse - [ ] presidential campaign - [ ] rootkit - [ ] virus
- [x] Trojan horse
"Everyone should get an equal say to ensure you get the most out of each brainstorming session." - [ ] True - [ ] False
- [x] True
**Never** break the maximum working days that your team can execute in an iteration. - [ ] True - [ ] False
- [x] True
A build tool can make sure the code complies, and you can back out changes with version control; but that doesn't help make sure things work right. - [ ] True - [ ] False
- [x] True
A mock object stands in for real objects. - [ ] True - [ ] False
- [x] True
A tag is a snapshot of the code at the point you made the tag. - [ ] True - [ ] False
- [x] True
An Ant build file is broken into four basic chunks: projects, properties, targets, and tasks. - [ ] True - [ ] False
- [x] True
An improved design can have dramatic postive effects on your burn-down rate. - [ ] True - [ ] False
- [x] True
Branch only when you have to. - [ ] True - [ ] False
- [x] True
Computer simulation plays a key role in contemporary science and engineering. - [ ] True - [ ] False
- [x] True
Most software projects are not completed on time and on budget. - [ ] True - [ ] False
- [x] True
Never system-test your own code. - [ ] True - [ ] False
- [x] True
No process can overcome bad people on a project. - [ ] True - [ ] False
- [x] True
Really getting the requirements down tight, and not letting the customers change their minds downstream, is a recipe for disaster. - [ ] True - [ ] False
- [x] True
Software development isn't just about prioritization and estimation. - [ ] True - [ ] False
- [x] True
Sometimes the customer is going to come up with a big change at the last minute. - [ ] True - [ ] False
- [x] True
Sometimes working on two tasks at the same time is the best option. - [ ] True - [ ] False
- [x] True
Sometimes you might need to commit the same changes to a branch and the trunk if the change applies to both. - [ ] True - [ ] False
- [x] True
The vast majority of people who hold computer-reated jobs do not belong to either of computing's professional societies. - [ ] True - [ ] False
- [x] True
There is evidence that the field of software engineering is becoming more mature. - [ ] True - [ ] False
- [x] True
Velocity is about how fast you and your team can comfortably work, for real. - [ ] True - [ ] False
- [x] True
Which one of the following is NOT an example of federal legislation that limits the amount of information private entities can collect from individuals? - [ ] Genetic Information Nondiscrimination Act of 2008 - [ ] Employee Polygraph Protection Act of 1988 - [ ] U.S. Census Act of 1973 - [ ] Children's Online Privacy Protection Act (went into effect in 2000)
- [x] U.S. Census Act of 1973
Which three of the following defensive measures are listed by Quinn in Chapter 7? - [ ] firewalls - [ ] security patches - [ ] antimalware tools - [ ] lawsuits
- [x] firewalls - [x] security patches - [x] antimalware tools
According to Quinn, "Everyone agrees that people who discover real or potential harms to the public should..." - [ ] check with your family first - [ ] keep quite except in extreme circumstances - [ ] first attempt to get the problem fixed within the organization - [ ] immediately blow the whistle
- [x] first attempt to get the problem fixed within the organization
When in the day should you schedule your daily standup meetings? - [ ] during lunch - [ ] just before people leave for the day - [ ] first thing in the morning - [ ] whenever everyone on the team can make it
- [x] first thing in the morning
A daily standup meeting should last between _____ minutes. - [ ] as long as is needed - [ ] one and ten - [ ] five and fifteen - [ ] two and twenty
- [x] five and fifteen
According to Quinn, the overall effect of information technology is to ..._____ organizational structures. - [ ] flatten - [ ] antiquate - [ ] enforce hierarchical - [ ] bedevil
- [x] flatten
Each project has something unique to it, and your process should be... - [ ] magic - [ ] flexible - [ ] unique - [ ] popular
- [x] flexible
Real success is about delivering ..._____, period. - [ ] functionality - [ ] bug free code - [ ] clear class diagrams - [ ] code coverage in your testing
- [x] functionality
The textbook suggests five things to look for when doing black box testing. Which THREE of the following are in their list? - [ ] functionality - [ ] state transitions - [ ] scraps left lying around - [ ] user input validation - [ ] data destined for other systems
- [x] functionality - [x] state transitions - [x] user input validation
When trying to integrate third-party code that turns out to be buggy, the first step is to... - [ ] document it - [ ] reverse engineer the code and create class diagrams - [ ] run a code coverage report - [ ] get it building
- [x] get it building
What is the most important activity for coming up with estimates you believe in? - [ ] look for large spreads playing planning poker - [ ] getting rid of assumptions - [ ] creating new user stories - [ ] iterating
- [x] getting rid of assumptions
When doing TDD, to keep tests organized in a file. Mark two things below that the textbook suggests about that file of tests. - [ ] make sure different people run the tests and write the code - [ ] keep the tests in the same file as your source code - [ ] give the same directory structure to your test file as your source code directory - [ ] keep the tests in a separate directory at the same level as your source code directory
- [x] give the same directory structure to your test file as your source code directory - [x] keep the tests in a separate directory at the same level as your source code directory
"If you're not sure what the customer wants, or even if you _think_ you're sure, always..." - [ ] test your code carefully - [ ] go back and ask - [ ] code in some extra features - [ ] design defensively
- [x] go back and ask
Whenever something changes during software development, talk it over with your team. If the impact is significant, in terms of functionality or schedule, then you've got to... - [ ] go back to the customer - [ ] encourage your team to put in extra hours - [ ] do some soul-searching - [ ] talk to your manager
- [x] go back to the customer
People who make a living playing persistent online games and selling virtual gold coins and artifacts are called... - [ ] sexters - [ ] cyber bullies - [ ] Internet addicts - [ ] gold farmers
- [x] gold farmers
Which two of the following do the authors mention in Ch. 10(P) as a "sure way to get your customer on board and excited"? - [ ] a neat big board - [ ] good planning - [ ] giving your customer a chance for frequent feedback - [ ] better velocity numbers
- [x] good planning - [x] giving your customer a chance for frequent feedback
Which kind of testing does the book suggest is the best time to check for leaking memory? - [ ] none of them - [ ] black-box - [ ] white-box - [ ] grey-box
- [x] grey-box
In which kinds of testing are you concerned with functionality? - [ ] grey-box - [ ] white-box - [ ] black-box - [ ] none of them
- [x] grey-box - [x] white-box - [x] black-box
George Mason opposed the proposed Constitution of the United States because it contained no declaration of the rights of citizens. The first ten amendments of the U.S. constitution were proposed by James Madison. (He proposed 12, but the first two weren't passed.) The one Madison considered most essential was the one... - [ ] that set congressional pay - [ ] guaranteeing freedom of speech and freedom of the press - [ ] that embodied one man, one vote - [ ] that established the right to bear arms
- [x] guaranteeing freedom of speech and freedom of the press
"Software development is NOT [or at least should not be]..." - [ ] drugery - [ ] expensive - [ ] guesswork - [ ] fun
- [x] guesswork
"Most code works great when things are going as expected - the so-called '..._____' ..." - [ ] happy path - [ ] abends - [ ] correct code - [ ] exceptional conditions
- [x] happy path
"...every person you add to your team makes the job of keeping everyone focused and knowing what they are doing _____." - [ ] more manageable - [ ] harder - [ ] easier - [ ] a billable expense
- [x] harder
Which has a reputation for higher reliability? - [ ] hardware controllers - [ ] neither is known for high reliability - [ ] both have a reputation for higher reliability - [ ] microprocessors
- [x] hardware controllers
John Stuart Mill proposed the principle of ..._____ as a way of deciding when an institution should intervene in the conduct of an individual. - [ ] happiness - [ ] utility - [ ] greater good - [ ] harm
- [x] harm
A computer simulation may produce erroneous results because the model upon which the program is based is flawed, or because the program ..._____. - [ ] has a complex design - [ ] has a bug in it - [ ] is under-tested - [ ] uses assembler language
- [x] has a bug in it
During the gathering of requirements, if you are unclear about anything, then it's time to... - [ ] have another discussion with your customer - [ ] review your notes and revise your user stories - [ ] check with your supervisor - [ ] call a meeting of the development team
- [x] have another discussion with your customer
"The single biggest determinant of success or failure on a project are the ..." - [ ] initial specification - [ ] number of mistakes you make - [ ] detailed internal comments - [ ] people on your team
- [x] people on your team
When you start work on a particular user story in the left column of the big board, where do the tasks for that user story go? - [ ] the Next section - [ ] the In Progress swimlane - [ ] the Completed box - [ ] the Complete column
- [x] the In Progress swimlane
Which three of the following are listed as "core values" by Quinn in Chapter 2? - [ ] the right to own property - [x] the ability to accomplish goals - [x] life - [x] happiness
- [x] the ability to accomplish goals - [x] life - [x] happiness
What event immediately preceeded the end of the famed Pony Express? - [ ] the completion of the first transcontinental telegraph line in 1861 - [ ] the patenting of the electronic telegraph in 1838 - [ ] the invention of the typewriter in 1867 - [ ] Bell and Watson's first telephone call in 1876
- [x] the completion of the first transcontinental telegraph line in 1861
In 1968, Douglas Engelbart gave "the mother of all demos" at the Fall Joint Computer Conference. Engelbart is also known for inventing _____. [I met Engelbart in the 1990's at a conference, and he was modest and polite, despite his celebrity. He died in 2013.] - [ ] COBOL - [ ] the Apple II - [ ] the computer mouse - [ ] Windows
- [x] the computer mouse
A great requirement is written from whose perspective? - [ ] the customer - [ ] the boss - [ ] the designer - [ ] the coder
- [x] the customer
Ultimately, whose choice is it about what is in and what's left out of a project? - [ ] the users - [ ] the developer - [ ] it differs from project to project - [ ] the customer
- [x] the customer
Who sets the priorities, including adding unexpected new tasks? - [ ] the customer - [ ] the manager of the developers - [ ] it depends - [ ] the development team as a whole
- [x] the customer
Who sets the priorities, including adding unexpected new tasks? - [ ] the customer - [ ] the manager of the developers - [ ] it depends - [ ] the development team as a whole
- [x] the customer
The situation in which some people have access to modern information technology while other do not is called... - [ ] survival of the digitally fittest - [ ] the digital divide - [ ] capitalism - [ ] the digital welfare state
- [x] the digital divide
What is the best tool for ensuring that your software meets the needs of your customer? - [ ] the feedback that comes out of each iteration - [ ] the final OK from the customer - [ ] requirements that you gather at the start of the project - [ ] your software process
- [x] the feedback that comes out of each iteration
Functionality is the focus. Only fix code to fix... - [ ] team dis-satisfaction - [ ] user stories - [ ] customer complaints - [ ] your burn-down rate
- [x] user stories
What is the main technique for bridging the gap between what the customer wants (in his or her head) and what s/he receives in delivered software? - [ ] periodic audits - [ ] blueskying - [ ] role playing - [ ] user stories
- [x] user stories
..._____ is the process of determine if the model being implemented is an accurate representation of the system being simulated. - [ ] verification - [ ] valuation - [ ] validation - [ ] none of these
- [x] validation
..._____ is the process of determine if a computer program correctly implements the intended model. - [ ] valuation - [ ] none of these - [ ] validation - [ ] verification
- [x] verification
Of the 9 ethical theories he outlines, Quinn chooses 5 that he considers "most workable." Which five does Quinn pick? - [ ] cultural relativism - [ ] virtue ethics - [ ] subjective relativism - [ ] act utilitarian - [ ] ethical egoism - [ ] divine command theory - [ ] social contract theory - [ ] Kantianism - [ ] rule utilitarian
- [x] virtue ethics - [x] act utilitarian - [x] social contract theory - [x] Kantianism - [x] rule utilitarian
A piece of self-replicating code embedded within another program (the host) is called a... - [ ] worm - [ ] social engineering attack - [ ] virus - [ ] phishing scheme
- [x] virus
If you need to change your process, ... - [ ] wait until the end of your current iteration - [ ] do the change immediately - [ ] vote as a team about when to change - [ ] wait until your next project
- [x] wait until the end of your current iteration
"Great software development delivers..." - [ ] what has been recorded in the requirements - [ ] what the developers decide - [ ] what the customer needs - [ ] what the customer wants
- [x] what the customer wants
"Milestone 1.0 is about delivering ______ ..." - [ ] what's needed - [ ] everything the customer wants - [ ] all the users stories but one - [ ] whatever the team decides
- [x] what's needed
Mock objects are rarely working object stand-ins. - [ ] True - [ ] False
- [x] False
Only two professional organizations, the ACM and the IEEE Computer Society, have the authority to forbid someone from managing computer networks or writing computer programs. - [ ] True - [ ] False
- [x] False
Tags are dynamic. - [ ] True - [ ] False
- [x] False
Testing guarantees things will work. - [ ] True - [ ] False
- [x] False
The Code of Fair Information Practices (proposed by a US government committee) includes a warning that there may not be a way for a person to correct or amend a record of identifiable information about that person. - [ ] True - [ ] False
- [x] False
The authors call it good practice to commit a code change into a tag. - [ ] True - [ ] False
- [x] False
The ignorance or foolishness of one person excuses the bad behavior of another. - [ ] True - [ ] False
- [x] False
The key to capturing good requirements is to focus on a small subset of the most important stakeholders. - [ ] True - [ ] False
- [x] False
The ultimate measure of a software development process is how good the team members feel about the process. - [ ] True - [ ] False
- [x] False
Try to double-up on tasks that have large estimates. - [ ] True - [ ] False
- [x] False
Version control is for code, not for build scripts. - [ ] True - [ ] False
- [x] False
Whatever software development process you settle on, make sure to avoid iterations. - [ ] True - [ ] False
- [x] False
You have to fix all the bugs in new, third-party software before you can continue with your development. - [ ] True - [ ] False
- [x] False
You will probably need to do spike testing on both third-party code and on code you developed yourself. - [ ] True - [ ] False
- [x] False
Your team's velocity does not have to be recalculated for each iteration. - [ ] True - [ ] False
- [x] False
What was the world's first commercial computer? - [ ] Sperry Rand - [ ] Ferranti Mark 1 - [ ] OS 360 - [ ] UNIVAC
- [x] Ferranti Mark 1
In 1973, a radio station broadcast a comedy monologue called "Filthy Words." This led to an extensive legal battle that ended with the U.S. Supreme Court upholding the government's right to censor broadcast media. The comedian who delivered the monologue was... - [ ] Lenny Bruce - [ ] Johnny Carson - [ ] George Carlin - [ ] Bill Cosby
- [x] George Carlin
Another name for the "Big Bang" in sofware development is _ _ _ _ _ , because the customer sees you at the beginning of the project, and then you disappear until the software is delivered at the end. - [x] Going Dark - [ ] Down a Rabbit Hole - [ ] Tunnel Vision - [ ] Tuna Surprise Hot Dish
- [x] Going Dark
In Chapter 9(P), the authors list a "top ten" traits of effective system testing. But they list one trait three times in that list. The trait mentioned three times is... - [ ] Know the starting and ending state of the system. - [ ] A good view of the big picture by the testing team - [ ] Good, frequent communication between the customer, development team, and testing team. - [ ] Automate your testing whenever possible.
- [x] Good, frequent communication between the customer, development team, and testing team.
In SVN, what command gives you the latest versions of all files in a project? - [ ] update - [ ] create - [ ] commit - [ ] checkout
- [x] update
In the U.S., the percentage of American workings with jobs in manufacturing has dropped from 35% in 1947 to ...___% in 2011. - [ ] 15 - [ ] 8 - [ ] 9 - [ ] 10
- [x] 9
Which of the following are the two largest "professional" organizations that support the computing field? - [ ] Free Software Foundation - [ ] ACM - [ ] Creative Commons - [ ] IEEE Computer Society
- [x] ACM - [x] IEEE Computer Society
Running your code and doing a quick checkover is really putting your code to the test. - [ ] True - [ ] False
- [ ] True - [x] False
Which two of the following best describe the textbook's ideas about how long an iteration should be? - [ ] don't iterate so often that you're spending all your time preparing for the end of an iteration - [ ] always make an iteration exactly 20 working days - [ ] iterate often enough to catch yourself when you're deviating from the goal - [ ] always make an iteration 30 calendar days
- [ ] don't iterate so often that you're spending all your time - [ ] iterate often enough to catch yourself when you're deviating from the goal
This is the X rule: Any user story that has "X" in its title or in its description can probably be split into two or more smaller user stories. What is "X" in the description above? - [ ] "iterate" - [ ] "or" - [ ] "and" - [ ] "but"
- [x] "and"
According to the Quinn textbook, U.S. call center employees start at about $1700 a month. Quinn say that Filipino call center employees make about ..._____ a month. - [ ] $800 - [ ] $250 - [ ] $140 - [ ] $300
- [x] $300
If you start with the days of work left and subtract the days left before your deadline, which of the results below make you the happiest? - [ ] -2 - [ ] 0 - [ ] none of them make me more happy than the others - [ ] 2
- [x] -2
A quote by John Shedd begins Chapter 7 in Quinn on Computer and Network Security. The quote is "A ship in harbor is safe, but..." - [ ] ...ships can't surf the Web. - [ ] ...that's not what ships are for. - [ ] ...sometimes the harbor gets shelled. - [ ] ...that was before submarines.
- [x] ...that's not what ships are for.
If you don't know how fast your team performs, start with a velocity of... ___. - [ ] .5 - [ ] 0.7 - [ ] .99 - [ ] .9
- [x] 0.7
Make sure that your software builds from almost day _ _ _ . - [ ] 1 - [ ] 30 - [ ] 20 - [ ] 2
- [x] 1
If you start with 30 days on a calendar, then take away weekends and holidays, then apply a velocity of 0.7, then you get ___ days of real work. - [ ] 20 - [ ] 15 - [ ] 16 - [ ] 14
- [x] 14
In what year did the U.S. Congress pass a law that made wiretapping illegal? - [ ] 1894 - [ ] 1944 - [ ] 2002 - [ ] 1934
- [x] 1934
When did George Stibitz demonstrate remote computing at a meeting at Dartmouth College? - [ ] 1957 - [ ] 1940 - [ ] 1972 - [ ] 1937
- [x] 1940
30-day iterations are basically 30 calendar days which you can assume turn into about ___ WORKING days of productive development. - [ ] 20 - [ ] 25 - [ ] 27 - [ ] 28
- [x] 20
How many workdays do the authors recommend as a rule of thumb of the time between iterations. - [ ] 30 - [ ] 20 - [ ] 10 - [ ] 60
- [x] 20
If your iteration is a month long, we count that as ..._____ actual working days. - [ ] 30 - [ ] 25 - [ ] 10 - [ ] 20
- [x] 20
What is the maximum number of years you might spend in prison if you are found guilty of violating the Computer Fraud and Abuse Act? - [ ] 17 - [ ] 20 - [ ] 15 - [ ] 10
- [x] 20
A flash cookie can hold ..._____ information as a browser cookie. - [ ] 25 times as much - [ ] half as much - [ ] the same amount of
- [x] 25 times as much
A good user story includes about how many lines or so of description? - [ ] 3 - [ ] as many as it takes - [ ] 4 - [ ] 5
- [x] 3
According to a 2009 study, only about one in ..._____ software projects are completed on time and on budget. - [ ] 3 - [ ] it's hard to tell - [ ] 4 - [ ] 2
- [x] 3
Quinn estimates that there are about ..._____ million surveillance cameras operating in the U.S. - [ ] 15 - [ ] 30 - [ ] 25 - [ ] 10
- [x] 30
According to Quinn, "Every day about ..._____ email messages are sent." - [ ] 300 million - [ ] 30 billion - [ ] 3 billion - [ ] 300 billion
- [x] 300 billion
Quinn writes that the U.S. NCIC databases contain over ..._____ million records. - [ ] 52 - [ ] 39 - [ ] 18 - [ ] 27
- [x] 39
The average age of a victim of identity theft is ..._____ years. - [ ] 32 - [ ] 40 - [ ] 49 - [ ] 57
- [x] 40
A velocity value of 0.6 says that you expect _____ of your team's time to be spent on other things than actual development work. - [ ] 20% - [ ] 40% - [ ] 60% - [ ] 30%
- [x] 40%
U.S. legal issues surrounding privacy and the government should include consideration of this amendment to the U.S. Constitution: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Which amendment is that? - [ ] 4th - [ ] 8th - [ ] 2nd - [ ] 16th
- [x] 4th
Because of the "dot-com bust" in 2000, the high-tech industry shed ..._____ jobs. - [ ] 750,000 - [ ] 150,000 - [ ] 50,000 - [ ] 500,000
- [x] 500,000
Which of the following questions does Quinn trace to virtue ethics? - [ ] Are my acts worthy of the ideal professional? - [ ] Who is affected? - [ ] Am I treating other humans with respect? - [ ] How will those who are least empowered to be affected?
- [x] Are my acts worthy of the ideal professional?
What computing device was the first built with vacuum tubes? - [ ] Apple II - [ ] EDVAC - [ ] ENIAC - [ ] Atanasoff-Berry Computer
- [x] Atanasoff-Berry Computer
One example of a US citizen wrongly accused of terrorism is... - [ ] Richard Reid - [ ] Brandon Mayfield - [ ] Mark Udall - [ ] Tom Ridge
- [x] Brandon Mayfield
A 1994 U.S. law was passed requiring that network equipment used by phone companies be designed (or modified) in such a way that law enforcement could trace calls, listen in on phone calls, and intercept email messages. The acronym for this law is... - [ ] CALEA - [ ] ECPA - [ ] SCA - [ ] CARNIVORE
- [x] CALEA
When all the tasks in a user story are finished, the user story is transferred to the ..._____ bin on the Big Board. - [ ] Complete - [ ] In Progress - [ ] Completed - [ ] Next
- [x] Completed
In software development, what does CI stand for? - [ ] Continuous Interrogation - [ ] Contiguous Interchangeability - [ ] Coordinated Integration - [ ] Continuous Integation
- [x] Continuous Integation
Which two of the following are mentioned in the textbook in conjunction with "blueskying?" - [ ] Two heads are better than ten. - [ ] Contribute without criticism. - [ ] Rule out wild ideas. - [ ] Think big.
- [x] Contribute without criticism. - [x] Think big.
The authors give us this principle: "Avoid duplicate code by abstracting or separating out things that are common and placing those things in a single location." The authors call this principle... - [ ] cohesion - [ ] SRP - [ ] DRY - [ ] coupling
- [x] DRY
Time sharing on a single computer started in the early 1960's. Where did it start? - [ ] Remington Rand - [ ] Dartmouth College - [ ] IBM - [ ] Silicon Valley, USA
- [x] Dartmouth College
The Amish adopt some technologies, and reject others. According to Quinn, their discussion about a new technology is driven by the question... - [ ] Does it use wood or steel? - [ ] Does it bring us together, or draw us apart? - [ ] How old is the technology? - [ ] Is it electronic, or does it use steam?
- [x] Does it bring us together, or draw us apart?
The first commercially successful programming language that was higher level than assembler and machine code was... - [ ] BASIC - [ ] COBOL - [ ] ALGOL - [ ] FORTRAN
- [x] FORTRAN
### Adding appropriate technical terms to user stores make them more useful. - [ ] True - [ ] False
- [x] False
According to James Moor, it has been shown by philosophers that it is impossible to create a truly intelligent machine capable of ethical decision-making. - [ ] True - [ ] False
- [x] False
After the well-publicized failures of one x-ray machine in the 1980s, injuries from x-ray machines have occured, but no lives have been lost due to those injuries. - [ ] True - [ ] False
- [x] False
At the sytem-testing level, bugs are always code. - [ ] True - [ ] False
- [x] False
Because U.S. law has declared corporations to be legally persons, Quinn supports the idea that we should assign moral responsibility to a corporation, at least in the U.S. - [ ] True - [ ] False
- [x] False
Because embedded systems have their instructions burned into chips, they have no software component. - [ ] True - [ ] False
- [x] False
Branch whenever you get the notion. - [ ] True - [ ] False
- [x] False
Branches are always a bad thing. - [ ] True - [ ] False
- [x] False
By calculating velocity, you take into account your dream of the ideal development team. - [ ] True - [ ] False
- [x] False
Duty is a central aspect of utilitarianism. - [ ] True - [ ] False
- [x] False
Giving people privacy means taking away their moral capital. - [ ] True - [ ] False
- [x] False
Good iteration is like a rare checkup for your software. - [ ] True - [ ] False
- [x] False
Good people cannot overcome a bad process. - [ ] True - [ ] False
- [x] False
Ideally, the developers should do their system testing. - [ ] True - [ ] False
- [x] False
If a user story gets a priority of 50, then you automatically can leave it out. - [ ] True - [ ] False
- [x] False
If someone else wrote a section of code that you have integrated into your software, it's their responsibility. - [ ] True - [ ] False
- [x] False
If you are a team of one, you do not need to iterate. - [ ] True - [ ] False
- [x] False
If you do a conscientious job developing software, your software should have no bugs when it is delivered. - [ ] True - [ ] False
- [x] False
If you know who'll be working on a task in the near future, put that task into the In Progress section of the Big Board. - [ ] True - [ ] False
- [x] False
In TDD, embrace duplicate test code. - [ ] True - [ ] False
- [x] False
In order to play it safe, you should spread out the logic for a behavior over several different classes. - [ ] True - [ ] False
- [x] False
It is relatively straightforward to find software errors in programs where multiple tasks execute at the same tie and interact through shared variables. - [ ] True - [ ] False
- [x] False
It's a good idea to keep your compile code and the source it came from in the same folder. - [ ] True - [ ] False
- [x] False
When writing TDD tests, how should you treat explicit values that aren't constants? - [ ] Use constants or explicit values, whichever you find more convenient. - [ ] Since tests are throwaway code, you don't need to use constants. - [ ] Just like in production code, use constants to encode special fixed values. - [ ] Avoid the use of constants in tests; use explicit values instead.
- [x] Just like in production code, use constants to encode special fixed values.
According to Quinn's analysis, which point of view most strongly disapproves of police sting operations to entrap pedophiles in chat rooms? - [ ] utilitarian - [ ] none of the points of view Quinn describes disapproves of the police actions - [ ] social contract - [ ] Kantian
- [x] Kantian
Which of the listed ethical theories matches the following quote most closely? "Mary, you used me, and now you want to throw me away. You got what you wanted, but it was wrong the way you got it." - [ ] act utilitiarian or rule utilitarian - [ ] social contract theory - [ ] Kantianism
- [x] Kantianism
What does "MOOC" stand for? - [ ] Mass Online Oncology Cameras - [ ] Matched Operating systems, Online systems, and Collected databases - [ ] Massive Open Online Courses - [ ] Cows used to produce chocolate milk
- [x] Massive Open Online Courses
A group of researchers demonstrated how it was possible, with just a little information in a supposedly "anonymous" database, to identify people and potentially sensitive information about them. The data they worked with was from what company? - [ ] Facebook - [ ] Netflix - [ ] MySpace - [ ] Twitter
- [x] Netflix
If a user story has to get bumped from the current iteration, where does it go on the big board? - [ ] In Progress - [ ] Next - [ ] Complete - [ ] Completed
- [x] Next
Which two of the countries below make it particularly difficult for ordinary citizens to use the Internet to communicate with the rest of the world? - [ ] North Korea - [ ] Cuba - [ ] Russia - [ ] Hong Kong
- [x] North Korea - [x] Cuba
Which US law was passed to more driver's licenses a more reliable form of identification? - [ ] Predictive Policing Act - [ ] REAL ID Act - [ ] Patriot Act - [ ] FISA
- [x] REAL ID Act
The US congress passed the Driver's Privacy Protection Act in 1994. Whose death was thought responsible for this legislation? - [ ] Richard Nixon - [ ] Nicole Brown Simpson - [ ] Jessica Tandy - [ ] Rebecca Shaeffer
- [x] Rebecca Shaeffer
Chapter 5 is about "good enough design." This chapter features the SRP: the Single ..._____ Principle. - [ ] Respondent - [ ] Retrofit - [ ] Refactoring - [ ] Responsibility
- [x] Responsibility
Who said the following? - "A system that fails to respect its citizens' right to privacy fails to respect the citizens themselves." - [ ] Richard Nixon - [ ] Steve Jobs - [ ] Bill Gates - [ ] Phil Zimmerman
- [x] Richard Nixon
Attacking a database-driven Web application by inserting a query into a text string is called... - [ ] phishing - [ ] rootkit - [ ] denial-of-service attack - [ ] SQL injection
- [x] SQL injection
Who patented his design for an electronic telegraph machine in 1838? - [ ] Joseph Henry - [ ] Christian Oersted - [ ] Samuel Morse - [ ] William Sturgeon
- [x] Samuel Morse
"You have zero privacy anyway. Get over it." According to Quinn, who said that? - [ ] Scott McNealy, former CEO of Sun Microsystems - [ ] Lawrence Lessig, of Creative Commons - [ ] Mark Zuckerberg, of Facebook - [ ] Bill Gates, former head of Microsoft
- [x] Scott McNealy, former CEO of Sun Microsystems
"The formal study of ethics goes back at least 2,400 years, to the Greek philosopher ..._____." - [ ] Socrates - [ ] Kant - [ ] Aristotle - [ ] Plato
- [x] Socrates
Which code of ethics does Quinn choose to examine closely in Chapter 9? - [ ] IEEE Code of Ethics - [ ] British Computing Society Code of Ethics - [ ] ACM Code of Ethics - [ ] Software Engineering Code of Ethics and Professional Practice
- [x] Software Engineering Code of Ethics and Professional Practice
Who founded Apple Computer? - [ ] Steve Wozniak - [ ] Bob Frankston - [ ] Steve Jobs - [ ] Bill Gates
- [x] Steve Wozniak - [x] Steve Jobs
A worm launched in 2009 appeared to target five industrial facilities involved in Iran's nuclear program. The worm is called ... - [ ] Blue Frog - [ ] Stuxnet - [ ] Nashi - [ ] Zues
- [x] Stuxnet
From 2003-2007, the U.S. Dept. of Defense used a database to collect reports of suspicious activities or terrorist threats near military bases. However, by 2005, it was reported the database was also collecting information about antiwar protests and protesters. The name of this database was... - [ ] TALON - [ ] FISA - [ ] Operation Shamrock - [ ] Carnivore
- [x] TALON
Which three of the following are presented by the textbook as the steps in spike testing? - [ ] Take a week to conduct your spike test. - [ ] Pick a random sampling from the tests that are failing. - [ ] At the end of the week, calculate your bug fix rate. - [ ] report your results to the customer
- [x] Take a week to conduct your spike test. - [x] Pick a random sampling from the tests that are failing. - [x] At the end of the week, calculate your bug fix rate.
What event in the 21st century caused the US government to enact legislation that emphasized national security and de-emphasized privacy rights? - [ ] The election of Barack Obama - [ ] The invasion of Ukraine - [ ] Terrorist attacks of 9/11/2001 - [ ] The Cuban Missile Crisis
- [x] Terrorist attacks of 9/11/2001
What does TDD stand for? - [ ] Timely Data Development - [ ] Too Distracted to Develop - [ ] Test-Driven Development - [ ] Test Data Determination
- [x] Test-Driven Development
Why is it a red flag when you learn that a customer doesn't understand one of your requirements? - [ ] The developer was probably vague in the wording. - [ ] It may have been transcribed incorrectly. - [ ] The customer couldn't possibly have asked for a requirement she or he doesn't undertand. - [ ] The developer may not have understood what the customer meant.
- [x] The customer couldn't possibly have asked for a requirement she or he doesn't undertand.
According to Brad Templeton, Chair of the Board of the Electronic Freedom Foundation, why is email spam called spam? - [ ] a Monty Python comedy sketch - [ ] It stands for "Sinister Postal Anonymous Mail." - [ ] the popularity of canned meat in Hawaii - [ ] It stands for "Suspicious and Probably Abusive Mail."
- [x] a Monty Python comedy sketch
"Use ... _____ to plan and monitor your current iteration's work. - [ ] automated version control - [ ] a big board on your wall - [ ] a spreadsheet - [ ] a software development tool
- [x] a big board on your wall
What does the textbook call a place where you're working on code that isn't in the main development tree of the code? - [ ] a branch - [ ] the main line - [ ] a diversion - [ ] the trunk
- [x] a branch
When you use Ant, you store the steps to build your project in an XML file (usually named build.xml), and that file is called _____. - [ ] an Ant hill - [ ] a task - [ ] a build script - [ ] a target
- [x] a build script
Quinn tells the story of London citizens dying because ambulances did not arrive on time. The problem was ..._____. - [ ] cell phone problems - [ ] a drivers' strike - [ ] a computerized ambulance dispatch system - [ ] experimental tires
- [x] a computerized ambulance dispatch system
According to the textbook, most things that people take for granted as good software development started out as ..._____ at some point. - [ ] a scholarly paper - [ ] a goofy idea - [ ] a doctoral dissertation - [ ] institutional memory
- [x] a goofy idea
According to Michael McFarland, a team of engineers should be held to ..._____ of its individual members. - [ ] the sum of the moral responsibility - [ ] a higher level of moral responsibility than any - [ ] the average level of moral responsibility - [ ] a slightly lower level of moral responsibility than any
- [x] a higher level of moral responsibility than any
A once popular programming language was named after Blaise Pascal. In 1640, Pascal constructed... - [ ] a primitive printing press - [ ] a mechanical calculator - [ ] the Step Reckoner - [ ] an arithmetic table
- [x] a mechanical calculator
Michael LaChat argues, among other things, "...that a fully conscious personal AI would be unwilling to accept its status as..." - [ ] a citizen - [ ] an autonomous being - [ ] a piece of property - [ ] an algorithm
- [x] a piece of property
What kind of "big board" does the book recommend? - [ ] whatever works for your group - [ ] a physical board or a virtual board - [ ] a virtual white board accessible to each member of the team - [ ] a real bulletin board or white board hanging somewhere
- [x] a real bulletin board or white board hanging somewhere
At the end of each iteration, you should go though ...______ in an iteration review. - [ ] a standard set of questions - [ ] a code walkthrough - [ ] a dramatic reading - [ ] a customer survey
- [x] a standard set of questions
In 1999, the NASA Mars Climate Orbiter burned up in Mars atmosphere because ... - [ ] a units mismatch - [ ] an infinite loop - [ ] an overrun buffer - [ ] a computer virus
- [x] a units mismatch
What is it usually called when you do formal testing with the customer before they sign off on your work? - [ ] system testing - [ ] unit testing - [ ] random testing - [ ] acceptance testing
- [x] acceptance testing
Which of the following is a fully developed profession that does not require graduate study for membership? - [ ] medicine (M.D.s) - [ ] law (lawyers) - [ ] computer science (programmers) - [ ] accounting (CPAs)
- [x] accounting (CPAs)
Which of the listed ethical theories matches the following quote most closely? "John, this tax cut is outrageous. Too many people lose too much, and only a priveledged few will gain." - [ ] Kantianism - [ ] social contract theory - [ ] act utilitiarian or rule utilitarian
- [x] act utilitiarian or rule utilitarian
Which two of the following are mentioned as signs that you are done with an iteration? - [ ] all user stories in this iteration are in the completed area of the board - [ ] you have acheived the perfect design - [ ] the project is complete - [ ] all tasks in this iteration are in the completed area of the board
- [x] all user stories in this iteration are in the completed area of the board - [x] all tasks in this iteration are in the completed area of the board
"...checking back with the customer is _ _ _ _ worth it." - [ ] usually - [ ] sometimes - [ ] always - [ ] seldom
- [x] always
"...the final decision on priorities is ..._____ the customer's to make." - [ ] always - [ ] usually - [ ] never - [ ] sometimes
- [x] always
The English word "electricity" comes from the Greek word for... - [ ] atom - [ ] amber - [ ] charge - [ ] power
- [x] amber
The consequence of the privacy we have in modern culture is that we live ..._____. - [ ] in an armed camp - [ ] without secrets - [ ] among strangers - [ ] in fear
- [x] among strangers
In 1991, a Patriot missile system failed to fire at an incoming Scud missile, and 28 soldiers died. The software involved failed because of... - [ ] an incorrectly overloaded operation - [ ] an infinite loop - [ ] a mistyped variable name - [ ] an accumulation of truncation errors
- [x] an accumulation of truncation errors
"Privacy is a zone of inaccessibility." From whose point of view is that definition of privacy likely? - [ ] law enforcement officials - [ ] social media providers - [ ] Internet service providers - [ ] an individual seeking to restrict access
- [x] an individual seeking to restrict access
"...always do only what your user story says, ..." - [ ] unless there are exceptional circumstances - [ ] or a little more - [ ] or a little less - [ ] and not an ounce more
- [x] and not an ounce more
According to Chapter 12(P), the single biggest determinant of success or failure on a project ... - [ ] are the people on your team - [ ] is the process you adopt - [ ] is your first iteration - [ ] is the programming language you choose
- [x] are the people on your team
What is "a field of computer science and engineering concerned with the computational understanding of what is commonly called intelligent behavior, and with the creation of artifacts that exhibit such behavior?" - [ ] artificial intelligence - [ ] robotics - [ ] data mining - [ ] neural nets
- [x] artificial intelligence
"The development team works on the bug..." - [ ] outside of the iteration process - [ ] as part of an iteration - [ ] during stand up meetings - [ ] on weekends, from home
- [x] as part of an iteration
"Keep the time it takes to run your tests ..._____." - [ ] it doesn't matter - [ ] as short as possible - [ ] reasonable - [ ] as long as you can stand it
- [x] as short as possible
"Try to keep your observation..." - [ ] obvious to the users - [ ] formal, so users feel safe - [ ] up front and personal - [ ] as unobtrusive as possible
- [x] as unobtrusive as possible
An attack that enables a single person to harm a huge organization is called... - [ ] terrorism - [ ] asymmetric - [ ] politically effective - [ ] botnet
- [x] asymmetric
How often does the textbook suggest that you run your entire test suite? - [ ] every other day - [ ] once a week - [ ] at least once a day - [ ] never more than once a day
- [x] at least once a day
"Most successful teams do ..._____ up-front design each iteration." - [ ] the textbook is ambiguous on this point - [ ] extensive and comprehensive - [ ] no - [ ] at least some
- [x] at least some
When during your project should you apply velocity? - [ ] at the beginning - [ ] it depends on the project - [ ] at the end - [ ] in the middle
- [x] at the beginning
When does the process of gathering requirements happen? - [ ] at the beginning and at the end of your project - [ ] at the beginning and at the end of each iteration - [ ] once at the start of the project - [ ] at the beginning of each iteration
- [x] at the beginning of each iteration
"Working software comes first; ..._____ is second." - [ ] spike testing - [ ] beautiful code - [ ] velocity - [ ] code coverage
- [x] beautiful code
"Every great piece of software starts with a customer's..." - [ ] big idea - [ ] money - [ ] initial design - [ ] discontent
- [x] big idea
Which three of the following are crucial to system testing? - [ ] black-box scenarios - [ ] real-world scenarios - [ ] small pieces of code, one at a time - [ ] exercises the functionality of the system from front to back
- [x] black-box scenarios - [x] real-world scenarios - [x] exercises the functionality of the system from front to back
According to Quinn (and Levine), "Privacy is necessary for a person to ..._____ as an individual." - [ ] vote - [ ] blossom - [ ] run for office - [ ] sign a contract
- [x] blossom
The textbook suggests five things to look for when doing black box testing. Which THREE of the following are in their list? - [ ] boundary cases and off-by-one errors - [ ] verifying auditing and logging - [ ] functionality - [ ] system-added information - [ ] output results
- [x] boundary cases and off-by-one errors - [x] functionality - [x] output results
What are three ways the authors list to "get inside your customer's head"? - [ ] brain storming - [ ] user stories - [ ] observation - [ ] the estimation game
- [x] brain storming - [x] user stories - [x] observation
"When someone wants to run your project, they need to do more than just compile source code - they need to ..._____ the project." - [ ] estimate - [ ] document - [ ] read - [ ] build
- [x] build
"...a ..._____ allows you to write your own instructions for dealing with your source code." - [ ] version control system - [ ] compiler - [ ] build tool - [ ] interpreter
- [x] build tool
If your customer isn't happy, you... - [ ] didn't do a good job coding - [ ] built the wrong software - [ ] are in the wrong business - [ ] are a bad person
- [x] built the wrong software
"You really ..._____ factor in complete surprises." - [ ] need time to - [ ] need to be prepared to - [ ] should - [ ] can't
- [x] can't
"Intimacy is not just about sharing information; it's also about ..._____." - [ ] rights - [ ] caring - [ ] power - [ ] lawsuits
- [x] caring
..._____ responsibility is assigned to people because they did something, or failed to do something, that caused something to happen. - [ ] inherited - [ ] causal - [ ] legal - [ ] role
- [x] causal
The ability to ..._____ is a powerful reason why those in computer-related careers should follow a code of ethics. - [ ] form professional associations - [ ] control Web servers - [ ] program sophisticated computers - [ ] cause harm to members of the public
- [x] cause harm to members of the public
Iterations are kept short so that you can... - [ ] plan vacation days more conveniently - [ ] check your software with the customer often - [ ] estimate user stories more precisely - [ ] fit everything in an iteration onto the big board
- [x] check your software with the customer often
As you fix the relevant bugs in third-party code, every file you touch should come out of your cleanup with... - [ ] a list of code dependencies - [ ] clear documentation - [ ] a line count - [ ] class diagrams
- [x] clear documentation
Just like your source files and deployment descriptions, your build script is ..._____. - [ ] compilable - [ ] perfect - [ ] something the customer must understand - [ ] code
- [x] code
The percentage of code that executes at least once after all the tests in your test suite are run is called the... - [ ] confidence booster - [ ] code coverage - [ ] jUnit - [ ] branching tests
- [x] code coverage
Which two of the following are actually two names for the same thing? - [ ] cohesion - [ ] SRP - [ ] velocity - [ ] DRY
- [x] cohesion - [x] SRP
"The more you take advantage of ..._____ in your build files, the more familiar your project will look to someone else, and the easier the project will be to integrate with external tools." - [ ] testing - [ ] common conventions - [ ] programming language specifics - [ ] properties
- [x] common conventions
The key to most problems you'll run into in software development is... - [ ] testing - [ ] a programming language - [ ] communication - [ ] the operating system
- [x] communication
According to Quinn, "Forming ..._____ allows us to enjoy better lives than if we lived in isolation." - [ ] software engineering teams - [ ] communities - [ ] countries - [ ] corporations
- [x] communities
Which three of the following are wrapped up in continuous integration? - [ ] compilation - [ ] designing - [ ] version control - [ ] testing
- [x] compilation - [x] version control - [x] testing
Build scripts are not as valuable when you are developing in Perl or PHP because those languages don't ..._____ code. - [ ] compile or package - [ ] store - [ ] test - [ ] deploy
- [x] compile or package
A "good," "standard" build script should do at least three things... - [ ] compile your project - [ ] clean up the mess it makes - [ ] phone home - [ ] generate documentation
- [x] compile your project - [x] clean up the mess it makes - [x] generate documentation
Which of these does NOT need a license or certification to legally practice? - [ ] accountant - [ ] lawyer - [ ] medical doctor - [ ] computer programmer
- [x] computer programmer
Task estimates add ..._____ to user story estimates. - [ ] customer opinions - [ ] errors - [ ] confidence - [ ] uncertainty
- [x] confidence
What are two synonyms for "version control?" [mark two] - [ ] user story index - [ ] configuration management - [ ] task manager - [ ] CM
- [x] configuration management - [x] CM
When it comes to estimating how long it will take to fix a bug, it pays to guess... - [ ] capriciously - [ ] conservatively - [ ] optimistically - [ ] with a crystal ball
- [x] conservatively
In the chapter on testing, the textbook mentions something that humans aren't very good at. That is... - [ ] selecting a testing framework - [ ] consistency in how a test is run - [ ] coming up with tests - [ ] figuring out what to test
- [x] consistency in how a test is run
"Ant properties are a lot like _____." - [ ] tasks - [ ] constants - [ ] projects - [ ] targets
- [x] constants
..._____ tools run your tests when you check in your code. - [ ] continuous integration - [ ] version control - [ ] testing frameworks - [ ] no such tools are mentioned
- [x] continuous integration
After playing a round of planning poker, the goal is to get rid of as many assumptions as possible, and to ____ all of the points on each user story's spread of estimates. - [ ] add - [ ] converge - [ ] average - [ ] examine
- [x] converge
In 1996, the French space agence launched a sattelite, and it crashed. The software error that caused the crash was traced to a piece of code that ... - [ ] coordinates GPS sattelites - [ ] decodes instructions from ground control - [ ] converts a 64-bit floting point value into a 16 bit integer value - [ ] senses light to help define direction
- [x] converts a 64-bit floting point value into a 16 bit integer value
"When user stories are being prioritized, you need to stay..." - [ ] in touch with the development team - [ ] customer-focused - [ ] in control of the process - [ ] up-to-date on your documentation
- [x] customer-focused
Megan Meier killed herself after "Josh Evans" posted harsh criticisms of her on MySpace. It was later discovered that "Josh Evans" was a fictional persona two created by two girls. This was a famous case of ..._____. - [ ] cyberbullying - [ ] identity theft - [ ] sexting - [ ] Internet anonymity
- [x] cyberbullying
..._____ is the process of searching through many records in one or more databases looking for patterns or relationships. - [ ] opt-in - [ ] data mining - [ ] a black box - [ ] opt-out
- [x] data mining
..._____ is the process of searching through one or more databases looking for patterns or relationships among the data. - [ ] database query - [ ] data mining - [ ] big data - [ ] normalizing a database
- [x] data mining
What units are used on both axes of a burn down graph? - [ ] weeks - [ ] hours - [ ] days - [ ] user stories
- [x] days
Assuming that multiple days of work are required for your project, and that your velocity is within the range specified in the book, then which of these will always be at least as large as the other two? : days of work estimated days required to get the work done (after using velocity) velocity - [ ] days of work estimated - [ ] we can't be sure - [ ] velocity - [ ] days required to get the work done
- [x] days required to get the work done
An intentional action designed to prevent legitimate users from making use of a computer service is called a ..._____ attack. - [ ] SQL injection - [ ] denial-of-service - [ ] phishing - [ ] rootkit
- [x] denial-of-service
Which of the following are things that describe a good user story? - [ ] mentions specific technologies - [ ] describes one thing that the software needs to do for the customer - [ ] is a long essay - [ ] is written using language that the customer understands - [ ] is short - [ ] uses technical terms that are unfamiliar to the customer - [ ] is written by the customer (no matter who scribbles on a notecard)
- [x] describes one thing that the software needs to do for the customer - [x] is written using language that the customer understands - [x] is short - [x] is written by the customer (no matter who scribbles on a notecard)
### Chapter 12(P) lists three traits that are common among software development processes that work. They are... - [ ] develop iteratively - [ ] silver-bullet processes - [ ] always evaluate and assess - [ ] incorporate best practices
- [x] develop iteratively - [x] always evaluate and assess - [x] incorporate best practices
Use a version control tool to... [pick two - [ ] communicate with your customer - [ ] automatically debug your coding errors - [ ] distribute changes in your software to your team - [ ] track changes in your software
- [x] distribute changes in your software to your team - [x] track changes in your software
"A good ethical theory should enable you to make a persuasive, logical argument to a ..._____ audience." - [ ] diverse - [ ] influencial - [ ] agreeable - [ ] rational
- [x] diverse
Whenever you make a branch, there are hidden people costs. Each branch is a separate code base that needs to be... [mark three] - [ ] shown to the customer - [ ] documented - [ ] maintained - [ ] tested
- [x] documented - [x] maintained - [x] tested
In TDD, when you implement code to make a particular test pass, and you already know what your next test is going to be, ... - [ ] add any code you think might be useful for future tests - [ ] add the code you're going to need for the next test - [ ] make sure that second test won't fail - [ ] don't add the code you're going to need for the next test
- [x] don't add the code you're going to need for the next test
If a malware creator hacks into a legitimate Web site and installs a software booby trap, when you visit that website you can unintentionally download their software. This is called a ... - [ ] trojan horse - [ ] virus - [ ] drive-by download - [ ] script kiddie
- [x] drive-by download
Iteration packing is important - ...____ if you need to keep it going. - [ ] drop stories - [ ] add days - [ ] work overtime - [ ] add new members to the development team
- [x] drop stories
Which of the following are considered "ordeals" used in order to information about a person? - [ ] driver's license - [ ] key - [ ] drug test - [ ] lie detector
- [x] drug test - [x] lie detector
The goal during estimation is to ____ as many assumptions as possible by ___ those assumptions with the customer. - [ ] illuminate / blueskying - [ ] enumerate / exploring - [ ] eliminate / clarifying - [ ] generate / discussing
- [x] eliminate / clarifying
Which of the following are considered "credentials" used in order to information about a person? - [ ] lie detector - [ ] employee badge - [ ] drug test - [ ] driver's license
- [x] employee badge - [x] driver's license
WIth respect to schedule, a good iteration... - [ ] leaves everyone feeling refreshed - [ ] has a little time left over - [ ] ends right when it's scheduled to - [ ] has a little work left over
- [x] ends right when it's scheduled to
In March 2003, the U.S. Justice Dept. announced that it would no longer require the FBI to ..._____ before entering it in the NCIC database. - [ ] obtain a warrant - [ ] back up the information - [ ] notify citizens that their information was included - [ ] ensure the accuracy of information
- [x] ensure the accuracy of information
A software bug in ...______ made AT&T's System 7 switches crash in 1990. - [ ] a Trojan horse - [ ] a numerical conversion routine - [ ] an Xray machine - [ ] error-recovery code
- [x] error-recovery code
Which of these is more difficult: estimating each user story, or adding up all the user story estimates to get a total estimate for the project? - [ ] they are about the same - [ ] estimating each user story - [ ] adding up all the user story estimates to get a total estimate for the project - [ ] we can't be sure
- [x] estimating each user story
Which of the following are characteristics recommended for stand up meetings? - [ ] every day - [ ] same time, same place - [ ] ideally in the morning - [ ] mandatory - [ ] include snacks - [ ] at least an hour
- [x] every day - [x] same time, same place - [x] ideally in the morning - [x] mandatory
Functional code trumps beautiful code ..._____. - [ ] every single time - [ ] rarely - [ ] almost always - [ ] usually
- [x] every single time
When should you update new estimates and the time left on the burn-down chart - [ ] whenever it is convenient - [ ] only when we review an estimate - [ ] every time we do any work or review an estimate - [ ] only when we do work
- [x] every time we do any work or review an estimate
According to Moore's Law, integrated circuits become twice as powerful roughly... - [ ] annually - [ ] each decade - [ ] in five year increments - [ ] every two years
- [x] every two years
In Chapter 8(P), the authors suggest that when things get hard to test, ... - [ ] examine your design - [ ] talk to the customer - [ ] write more tests - [ ] throw out earlier tests
- [x] examine your design
Because functionality in user stories can change, make sure the testing team understands to... - [ ] write good code - [ ] expect change - [ ] do unit testing - [ ] be steadfast
- [x] expect change
According to Quinn: "Today hackers are people who gain unauthorized access to computers and computer networks." However, which two of the following phrases does Quinn use to describe "hackers" in its original (1950s, 1960s) meaning? - [ ] explorer - [ ] risk taker - [ ] criminal - [ ] terrorist
- [x] explorer - [x] risk taker
### The first rule of effective test-driven development is: your test should always ..._____ before you implement any code. - [ ] pass - [ ] fail - [ ] compile - [ ] execute
- [x] fail
In TDD, you always want to write tests that initially ..._____. - [ ] execute efficiently - [ ] pass - [ ] cover lots of statements - [x] fail
- [x] fail
"As a rule of thumb, estimates that are longer than _____ days are much less likely to be accurate..." - [ ] twenty - [ ] fifteen - [ ] forty - [ ] seven
- [x] fifteen
Some version control tools (though not Subversion) control the files so that when one person checks out a file, no one else can check out that file until it is checked back in. This is called enforcing a ..._____. - [ ] strong commit - [ ] file locking mode - [ ] FIFO queue - [ ] FILO queue
- [x] file locking mode
Good commit messages make ..._____ easier. - [ ] finding older software - [ ] writing clean code - [ ] finding new software - [ ] committing clean changes
- [x] finding older software
If you got buggy third-party code, did a spike test, and determined an estimate to fix the bugs that you are reasonably confident in, what do you do next? - [ ] head back to the customer - [ ] start legal action against the third-party - [ ] take a well-earned vacation - [ ] start fixing the remaining bugs
- [x] head back to the customer
Bill Gates got into a dispute with ...____ about their free distribution of the source code for Microsoft's Altair BASIC. - [ ] IBM - [ ] the U.S. Dept. of Defense - [ ] Apple Computer - [ ] hobbyists and the Homebrew Computer Club
- [x] hobbyists and the Homebrew Computer Club
When determining priorities among the user stories, don't get caught up on ..._____. - [ ] the customer's opinion - [ ] the customer's priorities - [ ] how long those user stories will take to develop - [ ] functionality that meets the most important needs of the customer
- [x] how long those user stories will take to develop
When you use Subversion with a web server, then multiple developers can use file names that begin with... - [ ] c:/ - [ ] the book doesn't say - [ ] trunk.web.svn - [ ] http:// or https://
- [x] http:// or https://
The phrase "Big Bang" means that you work a lot, and than, BANG, something _ _ _ _ _ comes out of the work all at once. - [ ] useful and productive - [ ] huge and complex - [ ] initially exciting - [ ] valuable to the customer
- [x] huge and complex
What length of time is recommended for stand up meetings? - [ ] at least an hour - [ ] ideally 15 minutes or less - [ ] at least 30 minutes - [ ] whatever it takes to solve the hard issues
- [x] ideally 15 minutes or less
Every process change should be examined at least twice: first, to decide to make the change, and then - at least an iteration later - to measure... - [ ] if the team members are happy with the process - [ ] if your process change is consistent with other development teams - [ ] if the change was a good idea or not - [ ] if the customer approves of your process change
- [x] if the change was a good idea or not
According to the authors, what is the perfect thing for writing down requirements? - [ ] blank newsprint - [ ] index cards - [ ] your company's station - [ ] sticky notes
- [x] index cards
"Computerized databases and the Internet have made accessing many public records..." - [ ] legally protected - [ ] tightly controlled - [ ] inexpensive - [ ] quick
- [x] inexpensive - [x] quick
Frank and Cook explain the "winner-take-all society" as having harmful effects on our economy and culture. Which three of the following are reasons they cite for the winner-take-all trend? - [ ] information technology - [ ] the spread of the English language - [ ] network effects - [ ] hackers
- [x] information technology - [x] the spread of the English language - [x] network effects
The World Trade Organization supports globalized free trade with an argument (among others) that countries with ..._____ are less likely to go to war with each other. - [ ] fewer nuclear weapons - [ ] treaties against cyberwarfare - [ ] outsourced jobs - [ ] interdependent economies
- [x] interdependent economies
Quinn wrote that our relationship with technology is complicated. We create technology and choose to adopt it. However, once we have adopted a technological device, ... - [ ] it can transform us - [ ] we have no idea what happens next - [ ] the U.S. government steps in - [ ] the future is locked in
- [x] it can transform us
"If you can get by without a feature, then..." - [ ] the customer doesn't really want it - [ ] there's no reason to ever program it - [ ] it isn't a good user story - [ ] it isn't really baseline functionality
- [x] it isn't really baseline functionality
As soon as an unplanned task is assigned and given an estimate, ... - [ ] it can't be a problem - [ ] it won't require any more time - [ ] you can safely ignore it - [ ] it isn't unplanned any more
- [x] it isn't unplanned any more
Which two of the following do the authors mention that ways that a great design helps you? - [ ] users will recognize the difference - [ ] it makes your software more flexible - [ ] it increases communication with the customer - [ ] it helps you be more productive
- [x] it makes your software more flexible - [x] it helps you be more productive
"If a feature isn't essential, ..." - [ ] be sure to delay its implementation - [ ] you probably didn't specify it correctly - [ ] it's probably not a 10 - [ ] get rid of it
- [x] it's probably not a 10
"One benefit of ..._____ is that you get a chance to step back and think about what you've just built every month or so." - [ ] test-driven development - [ ] object-oriented programming - [ ] top-down design - [ ] iterative development
- [x] iterative development
"If two people made changes to the same set of lines in the same files, ... most version control systems ..._____." - [ ] alternate lines of code between the two people's changes - [ ] include both persons' coding - [ ] merge the original file, and the two changed files - [ ] just punt, kicking the file back to the person trying to commit the code
- [x] just punt, kicking the file back to the person trying to commit the code
"Each test should execute from a ...______ state." Which two adjectives does Chapter 8(P) use to describe this desireable testing state? - [ ] large - [ ] known - [ ] restorable - [ ] small
- [x] known - [x] restorable
In Chapter 9, the authors state: "...the whole point of iterative development is to ..._____ each iteration...." - [ ] improve - [ ] document - [ ] learn from - [ ] make progress during
- [x] learn from
Quinn describes a tradeoff that people today have (perhaps not consciously) made: compared to medieval Europeans or modern Bushmen, US adults have - [ ] less freedom and more security - [ ] more freedom and less security - [ ] less leisure time and more material possessions - [ ] more leisure time and less material possessions
- [x] less leisure time and more material possessions
When the NCIC processes a request for information, what is their average response time (according to Quinn)? - [ ] more than a day - [ ] less than a minute - [ ] less than one second - [ ] about five seconds
- [x] less than one second
In 1993, the IEEE Computer Society and the ACM set up a joint committee to explore establishing software engineering as a profession. A code of ethics eventually came out of this effort. But in 1999, the ACM Council pulled out of the joint effort because they decided to oppose... - [ ] computer science curricula - [ ] software testing - [ ] funding - [ ] licensing
- [x] licensing
Usually (during a software development project), cash is a _____. - [ ] non-factor - [ ] limitation - [ ] distraction - [ ] motivation
- [x] limitation
In TDD, more tests always means ..._____. - [ ] slightly more code - [ ] slightly less code - [ ] lost more code - [ ] lots less code
- [x] lost more code
"Naming a class with your company's name is a ..._____ idea..." - [ ] whimsical - [ ] brilliant advertising - [ ] lousy - [ ] clever
- [x] lousy
The principal advantage of spam over other forms of advertising is its ... - [ ] transmission speed - [ ] assynchronous nature - [ ] global reach - [ ] low cost
- [x] low cost
Which of these pairs is the best pair to have in your software? - [ ] high coupling and low cohesion - [ ] high coupling and high cohesion - [ ] low coupling and low cohesion - [ ] low coupling and high cohesion
- [x] low coupling and high cohesion
According to Quinn, the two prinipal catalysts for the Information Age have been... - [ ] low-cost computers - [ ] intellectual property laws - [ ] high speed communication networks - [ ] software engineering principles
- [x] low-cost computers - [x] high speed communication networks
The "mal" in "malware" stands for ... - [ ] maladaptive - [ ] malicious - [ ] maladjusted - [ ] malingering
- [x] malicious
One characteristic of the Internet that makes censorship more difficult is that the Internet supports ..._____ communications. - [ ] controlled - [ ] traceable - [ ] one-to-many - [ ] many-to-many
- [x] many-to-many
What led to the "de-skilling" of bookkeeping between 1880 and 1910? - [ ] changes in labor law - [ ] popular fiction - [ ] men killed in war - [ ] mechanical calculators
- [x] mechanical calculators
"If two people make changes to the same file but in different places, most version control system try to ..._____." - [ ] favor the first changer's changes - [ ] merge the changes together - [ ] notify both people of the problem - [ ] lock down the file in its original form until the conflict is resolve
- [x] merge the changes together
"Every society has rules of conduct describing what people outght and ought not to do in various situations. We call these rules _____." - [ ] religion - [ ] morality - [ ] ethics - [ ] law
- [x] morality
"In 1990, few people other than college professors used email. Today ..._____ people... have email accounts." - [ ] uncountable - [ ] more than a billion - [ ] a trillion - [ ] a hundred million
- [x] more than a billion
Quinn argues that modern culture fosters ...____ privacy than previous, agrarian societies. - [ ] about the same - [ ] much less - [ ] much greater
- [x] much greater
### "Beautiful code is ..._____, but tested and readable code is delivered on time." - [ ] counter-productive - [ ] required - [ ] rewarded - [ ] nice
- [x] nice
When it comes to requirements,... - [ ] the first assumption in should be the last assumption out - [ ] no assumption is a good assumption - [ ] assumptions should be prioritized - [ ] the more assumptions, the better
- [x] no assumption is a good assumption
"All but the smallest projects have a ..._____ build process." - [ ] mysterious - [ ] chaotic - [ ] nontrivial - [ ] unmanageable
- [x] nontrivial
According to the textbook, is there a maximum team size that you should never go over? - [ ] the authors don't say - [ ] 21 - [ ] not really - [ ] yes
- [x] not really
"If your system doesn't pass your tests, it's..." - [ ] not much fun - [ ] not working - [ ] dead in the water - [ ] back to the board
- [x] not working
Every ..._____ in your system should have a single responsibility. - [ ] user - [ ] person - [ ] task - [ ] object
- [x] object
The authors plan to teach us how to avoid being a software development casualty by delivering software that is... [mark three] - [ ] on budget - [ ] on time - [ ] structured top down - [ ] needed
- [x] on budget - [x] on time - [x] needed
If you have to do a demo to prove that a task has been properly implemented, then the time for doing the demo goes where on the Big Board? - [ ] inside the description of the relevant user story - [ ] this time doesn't belong on the Big Board - [ ] in a separate area on the Big Board - [ ] on the paper for the task itself
- [x] on the paper for the task itself
If a programmer X is assigned to work on two tasks, but she's only actually working on one, how many tasks get put into the In Progress area on the big board? - [ ] two - [ ] zero - [ ] one - [ ] it depends
- [x] one
A task specifies a piece of development work that needs to be carried out by... - [ ] one developer - [ ] your company - [ ] the customer - [ ] your team
- [x] one developer
Your task estimates should ideally be between ...___________ days long. - [ ] only a few - [ ] one half and five - [ ] one and ten - [ ] one and three
- [x] one half and five
Dealing with code that doesn't work is... - [ ] outside the scope of our textbook - [ ] rare in today's software environment - [ ] cause for abandoning your process temporarily - [ ] part of software development
- [x] part of software development
When you are specifying properties in an Ant build file, you can use "location" instead of "value" if you're dealing with ..._____. - [ ] tasks - [ ] targets - [ ] numbers - [ ] paths
- [x] paths
According to Chapter 8(P), the heart and soul of TDD is focusing on ...______. - [ ] one user interface at a time - [ ] customer needs - [ ] the big picture - [ ] small bits of code
- [x] small bits of code
Which two of the following are the choices mentioned in the textbook as responses to discovering that third-party code doesn't work? - [ ] persevere with the library - [ ] go into hiding - [ ] discard the third-party code and try to write the code yourself - [ ] quit your job
- [x] persevere with the library - [x] discard the third-party code and try to write the code yourself
A large-scale effort using bulk email messages (usually from a botnet) in order to gain sensitive information from gullible computer users is called... - [ ] phishing - [ ] denial-of-service attack - [ ] virus - [ ] SQL injection
- [x] phishing
According to Quinn, scholars of the Arab Spring point out that people started using online social networks such as Twitter to keep up with their friends, but these interactions caused them to become... - [ ] rich - [ ] smarter - [ ] politicized - [ ] consumers
- [x] politicized
"Any user stories that don't make it into Milestone 1.0 are not ignored, just..." - [ ] rejected - [ ] postponed until Milestone 2, or 3... - [ ] acknowledged, but then forgotten - [ ] returned to the customer in the final report
- [x] postponed until Milestone 2, or 3...
According to the textbook, in software development, more knowledge == better ..._____. - [ ] process - [ ] customer satisfaction - [ ] schedules - [ ] fewer bugs
- [x] process
"Everything in your Ant build file is part of a single ..._____." - [ ] task - [ ] target - [ ] property - [ ] project
- [x] project
It's generally a good idea (particularly as your Ant build file becomes more complex) to use ..._____ to let you define the directories once, and refer to them by aliases throughout the rest of the file. - [ ] targets - [ ] properties - [ ] projects - [ ] tasks
- [x] properties
According to Quinn, "...most commentators can agree that privacy is a ..._____ right." - [ ] prudential - [ ] absolute - [ ] natural - [ ] fundamental
- [x] prudential
In a ..._____, two or more concurrent tasks share a variable, and the order in which they read or write the value of the variable can affect the behavior of the program. - [ ] buffer overflow - [ ] race condition - [ ] piece of unreachable code - [ ] semaphore
- [x] race condition
According to the textbook, "Adding more developers or getting everyone to work longer hours will often blow your budget and _ _ _ _ results in the performance gains you might expect." - [ ] occasionally - [ ] rarely if ever - [ ] often - [ ] only sometimes
- [x] rarely if ever
"Ethics is the philosophical study of morality, a ..._____ examination into people's moral beliefs and behavior." - [ ] economic - [ ] legislative - [ ] sacred - [ ] rational
- [x] rational
Based on the knowledge you and your team have built up in an iteration, as you plan the next iteration, you should... - [ ] recalculate the fees you will charge the customer - [ ] reprioritize your stories - [ ] congratulate yourselves on a job well done - [ ] re-estimate all your stories and tasks
- [x] re-estimate all your stories and tasks
"When it comes to bug fixing, we ...____ be sure." - [ ] really can't - [ ] will rarely - [ ] must - [ ] often can
- [x] really can't
You've implemented your objects correctly when each of your objects has only one... - [ ] method - [ ] variable - [ ] reason to change - [ ] programmer
- [x] reason to change
What color does the textbook suggest for unplanned tasks that go up on the Big Board? - [ ] green - [ ] white - [ ] red - [ ] yellow
- [x] red
Superficially, automation eliminates jobs; but automation can also simulate the creation of new jobs by (choose two): - [ ] replacing human workers - [ ] replacing other machines - [ ] reducing prices - [ ] increasing real income of consumers
- [x] reducing prices - [x] increasing real income of consumers
With iteration, every time you make significant progress in your software development, you ______ and _____. [Mark two of the following...] - [ ] refine what you're working on - [ ] check with the customer - [ ] adjust your schedule - [ ] change your price estimate
- [x] refine what you're working on - [x] check with the customer
"If the features don't fit, _____." - [ ] reprioritize - [ ] give up on this project - [ ] edit the content of your user stories - [ ] send for the medics
- [x] reprioritize
In 1890, Warren and Brandeis argued that the legal system should protect people's ..._____. - [ ] right to know - [ ] right to be left alone - [ ] access to health care - [ ] access to information
- [x] right to be left alone
Fill in the same word into the two blanks in this statement: The ...__ effect is when one small change in your software can cause a ..._____ of changes throughout your code. - [ ] ripple - [ ] plethora - [ ] horde - [ ] wave
- [x] ripple
..._____ responsibility is borne because of a person's assigned duties. - [ ] inherited - [ ] role - [ ] causal - [ ] legal
- [x] role
"Two particularly useful techniques that help you understand the customer are _____ and _____." - [ ] surveys - [ ] checklists - [ ] role playing - [ ] observation
- [x] role playing - [x] observation
A set of programs that provide privileged access to a computer is called a... - [ ] virus - [ ] Trojan horse - [ ] Swiss army knife - [ ] rootkit
- [x] rootkit
The three parts of a task are... - [ ] rough description - [ ] user story - [ ] title - [ ] estimate
- [x] rough description - [x] title - [x] estimate
The three parts of a task are... - [x] rough description - [x] title - [x] estimate
- [x] rough description - [x] title - [x] estimate
Sometimes when integrating third-party code, there is lots of code that you don't directly use, and therefore don't test. Even if this untested code includes bugs, the textbook suggests that you focus on functionality and not obsess over testing this unused code. However, there is one exception to this rule. The exception is ..._____ issues. - [ ] security - [ ] user story - [ ] estimating - [ ] spike testing
- [x] security
By getting buggy third party software buildable and integrated into your development environment (including version control and testing harness), you have prevented all the problems the textbook describes from... - [ ] taking ownership of the third-party bugs - [ ] being revealed to the customer - [ ] sneaking up on you and biting you - [ ] a promotion
- [x] sneaking up on you and biting you
"...privacy is a ..._____ that allows individuals to have some level of control over who is able to gain access to their physical selves and their personal information." - [ ] legal fiction - [ ] social arrangement - [ ] political contrivance - [ ] legal framework
- [x] social arrangement
Which of the listed ethical theories matches the following quote most closely? "John, I am not going to do that. I didn't sign up for that kind of treachery; none of us did. And if the rest of the team had known what you were going to do, they would never have agreed to this expedition." - [x] social contract - [ ] act utilitiarian or rule utilitarian - [ ] Kantianism
- [x] social contract
..._____ arose out of the difficulties organizations encountered when they began constructing large software systems. - [ ] electrical engineering - [ ] risk management - [ ] software engineering - [ ] software safety
- [x] software engineering
What the customer needs is also known at the " ." - [ ] spiral model - [ ] top down design - [ ] waterfall model - [ ] software requirements
- [x] software requirements
"Unless ..._____, don't change things mid-iteration." - [ ] the customer demands it - [ ] someone is on fire - [ ] you think it is important - [ ] your manager suggests it
- [x] someone is on fire
It's called ..._____ when you do one burst of testing activity to see what you get done in a specific time period, and using that to estimate how long it will take to do the entire testing and debugging of a piece of software. - [ ] spike testing - [ ] test coverage - [ ] exhaustive testing - [ ] blind panic
- [x] spike testing
A program that communicates over an Internet connection without the user's knowledge or consent is called ... - [ ] rootkit - [ ] Trojan horse - [ ] spyware - [ ] spam
- [x] spyware
A daily meeting that is designed to be quick and keep everyone in the loop is called a _________ meeting. - [ ] standup - [ ] special - [ ] customer support - [ ] quicky
- [x] standup
When it comes to having more than one place to store requirements, ... - [ ] document carefully - [ ] be careful to keep them synchronized - [ ] steer clear of it - [ ] embrace it
- [x] steer clear of it
The Wikipedia definition of a software development process is a ..._____ imposed on the development of a software product. - [ ] structure - [ ] schedule - [ ] big board - [ ] sliver-bullet
- [x] structure
What kind of testing is done in a situation that's as close to real-world as you can manage? - [ ] system testing - [ ] unit testing - [ ] test-first development - [ ] random testing
- [x] system testing
Choose a process that works for YOUR team and YOUR project... and then... - [ ] tailor the artifacts it produces to match what YOUR customer wants and needs - [ ] insist on formalities that go beyond the big board - [ ] explain your process carefully to YOUR customer - [ ] lock it in
- [x] tailor the artifacts it produces to match what YOUR customer wants and needs
In Ant you can group different actions into a ..._____, which is just a set of work. - [ ] location - [ ] task - [ ] target - [ ] property
- [x] target
In Ant, a ..._____ is the work horse of your build script, and usually maps to a sepecific command, like javac. - [ ] project - [ ] target - [ ] property - [ ] task
- [x] task
Which kind of estimate is better to rely on, user story estimates or task estimates? - [ ] it doesn't matter which, just so you are consistent - [ ] the book doesn't say - [ ] task estimates - [ ] user story estimates
- [x] task estimates
In order to "get to the real work," you break each user story into - [ ] tasks - [ ] more user stories - [ ] red sticky notes - [ ] velocity
- [x] tasks
Whenever you're going to make changes in your software development process, take your ..._____ opinion into account. - [ ] team's - [ ] manager's - [ ] users' - [ ] customer's
- [x] team's
The rate at which a new technology is assimilated into a society is called... - [ ] measured marketing - [ ] delayed gratification - [ ] technological diffusion - [ ] progress
- [x] technological diffusion
An arrangement where employees spend a significant portion of their workday at a physical distance from the employer or from a traditional place of work is called... - [ ] under employment - [ ] telework - [ ] home schooling - [ ] outsourcing
- [x] telework
What is the name of the technique in which you write your code with testing in mind right from the start? - [ ] automated testing - [ ] test-driven development - [ ] regression testing - [ ] version control
- [x] test-driven development
In discussing testing, our textbook invites us to look at the system being built from three perspectives... - [ ] testers peek under the covers a little - [ ] users see the system from the outside - [ ] managers look at the burn down rate - [ ] developers let it all hang out
- [x] testers peek under the covers a little - [x] users see the system from the outside - [x] developers let it all hang out
You know what code is broken because you have... - [ ] development delays - [ ] a bad feeling - [ ] customer complaints - [ ] tests that fail
- [x] tests that fail
"Don't let the customers talk you into longer development cycles _____" - [ ] than what you were taught in this class - [ ] than a week - [ ] than you're comfortable with - [ ] than the average work week
- [x] than you're comfortable with
In the text, and in Subversion, by default the version control software gives you code from the trunk. Some other version control systems call this... [choose two] - [ ] the HEAD - [ ] the express - [ ] the main line - [ ] the branches
- [x] the HEAD - [x] the main line
The larger the difference between the estimates, ... [pick two] - [ ] the less confident you are in the estimate - [ ] you win at planning poker - [ ] the more assumptions you need to root out - [ ] the more bluesky you have generated
- [x] the less confident you are in the estimate - [x] the more assumptions you need to root out
"If you'd be happy for someone else to read your code and rely on your software, then it's probably in good shape." The textbook calls this... - [ ] the golden rule for code - [ ] a rule of thumb - [ ] being nice - [ ] the pride test
- [x] the pride test
In the role playing described in the textbook, the software developer pretends to be... - [ ] a user - [ ] the customer - [ ] the designer - [ ] the software
- [x] the software
Your project estimate is... - [ ] the sum of the estimates for your user stories - [ ] is only possible after some of the coding is accomplished - [ ] determined by focusing on the project as a whole single unit - [ ] comes after you've started designing the code
- [x] the sum of the estimates for your user stories
What goes into the left column on the big board? - [ ] the user stories for this iteration - [ ] the most difficult user stories - [ ] all the user stories for the project - [ ] only high priority tasks
- [x] the user stories for this iteration
Who should be doing the estimates for each iteration? - [ ] the person on the team who tends to estimate most accurately - [ ] the team's best programmer - [ ] the whole team - [ ] the team leader
- [x] the whole team
Professionals have a special obligation to ensure their actions are for the good of those who depend on them because... - [ ] they are smarter - [ ] they have higher status in society - [ ] their decisions can have more serious consequences - [ ] they get paid more
- [x] their decisions can have more serious consequences
"The most important thing about dealing with bugs on a software project is making sure..." - [ ] the customer knows the bug - [ ] they get fixed - [ ] the person who made the bug is identified - [ ] they get recorded and tracked
- [x] they get recorded and tracked
Using the recommended testing schedule described in Chapter 9, the development team will start getting bug reports on their first iteration about the time they're getting into the ...____ iteration. - [ ] first - [ ] third - [ ] last - [ ] second
- [x] third
When things are intricately interdependent, we say that your software pieces are ..._____. This is generally not a good thing. - [ ] loosely coupled - [ ] coherent - [ ] tightly coupled - [ ] incoherent
- [x] tightly coupled
According to the textbook, what is the relationship of a spike test and iteration length? - [ ] the textbook doesn't say - [ ] a spike test must be compensated for by removing user stories from an iteration - [ ] time for a spike test is not usually counted in an iteration - [ ] a spike test shortens the current iteration
- [x] time for a spike test is not usually counted in an iteration
When jobs are lost to some kind of automation, remaining workers may work harder... - [ ] because the technology tools make their work easier and faster to do - [ ] to enhance the company's bottom line - [ ] to avoid being part of the next layoff - [ ] to support their bosses better
- [x] to avoid being part of the next layoff
Which is better: to deliver some of the features working perfectly; or to deliver all of the features, some of which might be less than perfect. - [ ] they are about the same - [ ] it depends on the specifics of the project - [ ] to deliver some of the features working perfectly - [ ] to deliver all of the features, some of which might be less than perfect
- [x] to deliver some of the features working perfectly
Why did cash registers ring a bell when the drawer was opened? - [ ] to reduce embezzlement by clerks - [ ] to entertain customers - [ ] to advance the paper tape - [ ] to remind clerks to close the drawer
- [x] to reduce embezzlement by clerks
In 1986, the Electronic Communications Privacy Act (ECPA) allowed police to attach two kinds of surveillance devices to a suspect's phone line. One kind of device displays the caller's phone number when someone calls the suspect; that device is called a ... - [ ] pen register - [ ] roving wiretap - [ ] trap-and-trace device - [ ] CALEA
- [x] trap-and-trace device
The Subversion authors recommend putting your code initially into a directory called ..._______. Then, other versions would go into a directory called ..._____. - [ ] yin / yang - [ ] bin / doc - [ ] Fred / Ernie - [ ] trunk / branches
- [x] trunk / branches
In the end, when it comes to code, ... - [ ] only trust other people if they follow your process - [ ] make sure you trust your third party vendor - [ ] stick to the contract - [ ] trust no one
- [x] trust no one
If one apprach to gather good requirements doesn't work, ... - [ ] try it again more carefully - [ ] wait a while - [ ] consider giving up on the project - [ ] try another
- [x] try it again more carefully
According to Quinn, in order to be fair, communications should be... - [ ] civil - [ ] low cost - [ ] transparent - [ ] two-way
- [x] two-way
The Patriot Act expanded the use of National Security Letters, making it easier for the FBI to collect private electronic communications. Which of the following are true about National Security Letters? - [ ] the FBI merely needs to show probable cause to issue them - [ ] typically, they contain a gag order - [ ] they do not require the approval of a judge - [ ] about 50,000 are issued every year
- [x] typically, they contain a gag order - [x] they do not require the approval of a judge - [x] about 50,000 are issued every year
"...with version control, you can..." [mark three] - [ ] remove all bugs from the start - [ ] undo mistakes - [ ] make sure your code is always safe - [ ] make bug fixes
- [x] undo mistakes - [x] make sure your code is always safe - [x] make bug fixes
What kind of testing should you be doing all along during an iteration? - [ ] system testing - [ ] unit testing - [ ] both unit testing and system testing - [ ] the textbook doesn't take a stand on this issue
- [x] unit testing
When do tasks move from Complete to Completed on the Big Board? - [ ] only when the entire project is done - [ ] one day after the task goes into Complete - [ ] when you are sure that task is done - [ ] when all of the tasks in a user story are done
- [x] when all of the tasks in a user story are done
"Successful software development is about knowing ____... you are." - [ ] the time it takes to determine who - [ ] what - [ ] where - [ ] who
- [x] where
In 1659 the General Court of Massachusetts decreed that citizens who celebrated Christmas or other holidays by refusing to work or feasting should be... [choose two] - [ ] whipped - [ ] sent to church - [ ] fined - [ ] emotionally supported
- [x] whipped - [x] fined
A ..._____ is someone who breaks ranks with an organization in order to make an unauthorized disclosure of information about a harmful situation after attempts to report the concerns through authorized organizational channels have been ignored or rebuffed. - [ ] spy - [ ] whistleblower - [ ] undercover reporter - [ ] paid informant
- [x] whistleblower
Which kind of testing examines the branching in the code during testing? - [ ] black-box - [ ] none of them - [ ] white-box - [ ] grey-box
- [x] white-box
In TDD, keep your test code ..._____. - [ ] with your tests - [ ] only temporarily - [ ] with your source code - [ ] separate from everything else
- [x] with your tests
The textbook list four things you're generally looking for with white box testing. Mark four: - [ ] working as documented - [ ] proper error handling - [ ] testing all the different branches of code - [ ] user input validation - [ ] proper handling of resource constraints
- [x] working as documented - [x] proper error handling - [x] testing all the different branches of code - [x] proper handling of resource constraints
There are lots of good testing frameworks, but they run your tests; they don't ..._____ them for you. - [ ] help in organizing - [ ] collect - [ ] write - [ ] execute
- [x] write
When you use TDD, what is the order of development? - [ ] the order doesn't matter in TDD - [ ] write tests intentionally to maximize statement coverage - [ ] write some code, write a test to exercise that code - [ ] write a test, write some code to pass that and earlier tests
- [x] write a test, write some code to pass that and earlier tests
"'Version' is a lable and doesn't mean anything more, whereas 'Milestone' means you deliver significant functionality and..." - [ ] the customer is completely satisfied - [ ] all your user stories are done - [ ] and you are closer to being paid - [ ] you get paid
- [x] you get paid
What two things have to happen before you are done developing a piece of software using test-driven development? - [ ] the customer is satisfied - [ ] you're out of tests to write - [ ] all your tests pass - [ ] the schedule says you're done
- [x] you're out of tests to write - [x] all your tests pass
A great software process is a process that lets ..._____ development team be successful. - [ ] every - [ ] your - [ ] a focused - [ ] any
- [x] your
Which two of the following are the best indicators of how an iteration went? - [ ] a customer survey - [ ] your burn-down rate - [ ] the rest of your big board - [ ] the amount of coffee you drank
- [x] your burn-down rate - [x] the rest of your big board
Who should reprioritize your user stories for a new iteration? - [ ] your manager - [ ] your lead programmer - [ ] the best estimator on the team - [ ] your customer
- [x] your customer
Who should understand what a user story means? - [ ] your customer - [ ] either you or your customer should understand each user story - [ ] both you and your customer - [ ] you
- [x] your customer - [x] both you and your customer
What is "Milestone 1.0?" - [ ] your first iteration - [ ] your first major release of the software to the customer - [ ] the first list of prioritized user stories - [ ] your first functioning software for this project
- [x] your first major release of the software to the customer
Remember, a build tool is for ..._____, not just for you. - [ ] your instructor - [ ] your team - [ ] your immediate family - [ ] your customer
- [x] your team
Match these important milestones in the development of the Internet with the year. Milestones: - Ray Tomlinson wrote software enabling email - ARPA initiated the design and construction of the ARPANET - According to Quinn, the birth date of the Internet occured in this year - The first four Inerface Message Processors were delivered to four universities Years: - 1972 - 1967 - 1983 - 1969
Ray Tomlinson wrote software enabling email - 1972 ARPA initiated the design and construction of the ARPANET - 1967 According to Quinn, the birth date of the Internet occured in this year - 1983 The first four Inerface Message Processors were delivered to four universities - 1969
If you think of the source code as "boxes," what colored box is most closely associated with which group of people? boxes: - black box - grey box - white box (also known as "clear box") groups of people: - users - testers - developers
black box : users grey box : testers white box (also known as "clear box") : developers
Daniel Solove proposed four categories of privacy-related activities. Match the category with its definition. Private-related activities: - information collection - information processing - information dissemination - invasion Definitions: - activities that gather personal information - activities that store, manipulate, and use personal information - activities that spread personal information - acticities that intrude upon a person's daily life, interrupt a person's solitude, or interfere with someone's decision making
information collection - activities that gather personal information information processing - activities that store, manipulate, and use personal information information dissemination - activities that spread personal information invasion - acticities that intrude upon a person's daily life, interrupt a person's solitude, or interfere with someone's decision making
Quinn uses an anaolgy to explain the difference between ethics and morality. Match the terms below using Quinn's analogy Terms: - society - morality - people doing ethics Anologies: - town - road network - people in balloons floating above the town
society - town morality - road network people doing ethics - people in balloons floating above the town
Quinn presents nine ethical theories. Match the name of a theory with the phrase most closely aligned with that theory Names of theories: - subjective relativism - cultural relativism - divine command theory - ethical egoism - Kantianism - rule utilitarianism - act utilitarianism - social contract theory - virtue ethics Phrases: - What's right for you may not be right for me. - The meaning of "right" and "wrong" rests with a society's actual moral guidelines. - Good actions are those aligned with the will of God and bad actions are those contrary to the will of God. - The morally right action for a person to take in a particular situation is the action that will provide that person with the maximum long-term benefit. - Act only from moral rules that you can at the same time will to be universal moral laws. - An action is right (or wrong) to the extent that it increases (or decreases) the total happiness of the affected parties. - We ought to adopt those moral rules that, if followed by everyone, lead to the greatest increase in total happiness over all affected parties. - Morality consists in the set of rules, governing how people are to treat one another, that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well. - A right action is an action that a virtuous person, acting in character, would do in the same circumstances.
subjective relativism - What's right for you may not be right for me. cultural relativism - The meaning of "right" and "wrong" rests with a society's actual moral guidelines. divine command theory - Good actions are those aligned with the will of God and bad actions are those contrary to the will of God. ethical egoism - The morally right action for a person to take in a particular situation is the action that will provide that person with the maximum long-term benefit. Kantianism - Act only from moral rules that you can at the same time will to be universal moral laws. act utilitarianism - An action is right (or wrong) to the extent that it increases (or decreases) the total happiness of the affected parties. rule utilitarianism - We ought to adopt those moral rules that, if followed by everyone, lead to the greatest increase in total happiness over all affected parties. social contract theory - Morality consists in the set of rules, governing how people are to treat one another, that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well. virtue ethics - A right action is an action that a virtuous person, acting in character, would do in the same circumstances.
Match the term from Chapter 5 to what it does. Terms : unplanned tasks and user stories perfect design SRP DRY refactoring good-enough design What it does: - I make sure that the unexpected becomes - I'm what you strive for, but ultimately you might not deliver. - I make sure that all the parts of your software have one well-defined job. - I help you make sure that everything has its place, and that place is only one place. - With me, the design gets better with small improvements throughout your code. - My mantra is, "Perfect is great, but I deliver."
unplanned tasks and user stories - I make sure that the unexpected becomes expected and managed. perfect design - I'm what you strive for, but ultimately you might not deliver. SRP - I make sure that all the parts of your software have one well-defined job. DRY - I help you make sure that everything has its place, and that place is only one place. refactoring - With me, the design gets better with small improvements throughout your code. good-enough design - My mantra is, "Perfect is great, but I deliver."