CS 2401

¡Supera tus tareas y exámenes ahora con Quizwiz!

The Advanced Encryption Standard has a fixed block size of ________bits and a key size of _______ , ________ and _________ bits Select one: a. 256, 128, 192, 256 b. 128, 128, 192 and 256 c. 192, 128, 192, 256 d. None of the above

128, 128, 192 and 256

4. A ------- is a path that begins and ends at the same node whereas a --------------- is a circuit with no node (other than the starting node) included more than once Select one: a. Cycle, Circuit b. Circuit, Cycle c. Valid, Invalid d. None of the above

Circuit, Cycle

Boundary testing and Control-flow testing are criteria for ? Select one: a. Unit Testing b. Test Coverage c. Code Coverage d. None of the above

Code Coverage

On the Ordinal Cohesion Scale, rate the following in the Lowest to Highest order of cohesion. Select one: a. Logical , Coincidental, Sequential, Temporal, Functional b. Coincidental, Sequential, Functional, Temporal, Logical c. Coincidental, Logical, Temporal, Sequential, Functional d. Logical, Sequential, Coincidental, Temporal, Functional

Coincidental, Logical, Temporal, Sequential, Functional

Which of the following is not an issue to consider when reverse engineering? Select one: a. Abstraction Level b. Completeness c. Connectivity d. Directionality

Connectivity

Hiding the object state , so that it can be observed or affected only via object's methods is known as ----------? Select one: a. Classification b. Encapsulation c. Objectification d. None of the above

Encapsulation

A Test, is an erroneous hardware or software element of a system that can cause the system to fail. Select one: True False

False

Acceptance tests are normally conducted by the developer? Select one: True False

False

Boundary value analysis can only be used to do white-box testing. Select one: True False

False

Cohesion is of two types, Internal and Syntactic. Select one: True False

False

Cyclomatic complexity measures software complexity from the machines viewpoint in terms of how the size of the input data affects an algorithms usage of computational resources (usually running time or memory) Select one: True False

False

Cyclomatic complexity of graph G equals #edges + #nodes - 2 V(G) = e + n - 2 Select one: True False

False

For a strongly connected graph a real edge is created to connect the END node to the BEGIN node Select one: True False

False

If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the Pub-Sub design pattern. Select one: True False

False

In the RSA system, the receiver does as follows: Randomly select two large prime numbers p and q, which always must be kept secret. Select an integer number E, known as the public exponent, such that (p - 1) and E have no common divisors, and (q - 1) and E have no common divisors. Determine the private exponent, D, such that (ExD - 1) is exactly divisible by both (p - 1) and (q - 1). In other words, given E, we choose D such that the integer remainder when ExD is divided by (p - 1)x(q - 1) is 1. Determine the product n = pxq, known as public modulus. Release publicly the public key, which is the pair of numbers n and E, K + = (n, E). Keep secret the private key, K - = (n, D). The above events are mentioned in the correct order as they are performed while writing the algorithm. Select one: True False

False

In the RSA system, the receiver does as follows: Randomly select two large prime numbers p and q, which always must be kept secret. Select an integer number E, known as the public exponent, such that (p 1) and E have no common divisors, and (q 1) and E have no common divisors. Determine the private exponent, D, such that (ED 1) is exactly divisible by both (p 1) and (q 1). In other words, given E, we choose D such that the integer remainder when ED is divided by (p 1)(q 1) is 1. Determine the product n = pq, known as public modulus. Release publicly the public key, which is the pair of numbers n and E, K = (n, E). Keep secret the private key, K = (n, D). The above events are mentioned in the correct order as they are performed while writing the algorithm. Select one: True False

False

Is the following diagram about cohesion true? Select one: True False

False

Objects are abstractions that specify the state and behavior of different collections of objects. Select one: True False

False

Objects coupling is indirectly proportional to the number of different messages the object sends to other objects. Select one: True False

False

Software engineering umbrella activities are only applied during the initial phases of software development projects. Select one: True False

False

Software is a product and can be manufactured using the same technologies used for other engineering artifacts? Select one: True False

False

Symmetric cryptosystems are also known as Public Key systems Select one: True False

False

The only time reengineering enters into work with a legacy system is when it components will be implemented as objects. Select one: True False

False

The size estimate for a software product to be built must be based on a direct measure like LOC. Select one: True False

False

These documents record the process of development and maintenance. Plans, schedules, process quality documents and organizational and project standards are process documentation. This is called as Product Documentation Select one: True False

False

This is the process of preparing the document for professional printing. It is supported by desktop-publishing packages, artwork packages and type styling programs. This process is Document Polishing Select one: True False

False

Cohesion is a qualitative indication of the degree to which a module Select one: a. cannot be written more compactly. b. Focuses of just one thing. c. is able to complete its function in a timely manner. d. is connected to other modules and the outside world.

Focuses of just one thing.

The correct order for all requirement engineering techniques is Select one: a. Analysis, Gathering, Specifications b. Gathering, Specifications, Analysis c. Gathering, Analysis, Specifications d. Analysis, Specifications, Gathering

Gathering, Analysis, Specifications

A popular approach to micro-level design is known as responsibility-driven design (RDD). We know the types of responsibilities that objects can have: Type 1 responsibility (knowing): Memorizing data or references, such as data values, data collections, or references to other objects, represented as a _____________. Type 2 responsibility (doing): Performing computations, such as data processing, control of physical devices, etc., represented as a ____________ Type 3 responsibility (communicating): Communicating with other objects, represented as __________ sending (method invocation). Select one: a. Message, Method, Property b. Property, Method, Message c. Method, Property, Message d. Property, Message, Method

Property, Method, Message

Concept Maps, while representing knowledge about the problem domain, are expressed in terms of 'concepts' and -------, and are used to represent knowldge, beliefs, feelings etc. Select one: a. Problems b. Propositions c. Adverbs d. Verbs

Propositions

Concept Maps, while representing knowledge about the problem domain, are expressed in terms of 'concepts' and -------, and are used to represent knowledge, beliefs, feelings etc. Select one: a. Problems b. Propositions c. Adverbs d. Verbs

Propositions

Which of the following activities is not part of the software reengineering process model? Select one: a. Forward Engineering b. Inventory Analysis c. Prototyping d. Reverse engineering

Prototyping

___________ algorithm is based upon factorizing a number n into its Prime Factors. Select one: a. Logarithm Problem b. Symmetric Algorithm c. RSA Algorithm d. None of the above

RSA Algorithm

The term ____________is often used to describe modifying the design and/or implementation of a software module without changing its external behavior, and is sometimes informally referred to as cleaning it up. Select one: a. Designing b. Factoring c. Refactoring d. Polymorphism

Refactoring

---------------cohesion is difficult to automate Select one: a. Syntactic b. Semantic c. Internal d. None of the above

Semantic

7. Look at the two diagrams and identify them. Select one: a. UML, State b. Context, State c. State , Context d. None of the above

State , Context

Look at the two diagrams and identify them. Select one: a. UML, State b. Context, State c. State , Context d. None of the above

State , Context

The developer should not create a software artifact (a system requirement, a UML diagram, or source code) unless they know how it will be tested. This kind of development is known as ? Select one: a. Object Oriented Development b. Agile Development c. Test Driven Development d. Extreme Programming

Test Driven Development

-------------------measures the degree to which the specification or code of a software program has been exercised by tests. -------------------measures the degree to which the source code of a program has been tested. Select one: a. Test coverage, Code coverage b. Code coverage, Test coverage c. Acceptance Test, Unit Test d. Unit Test, Acceptance Test

Test coverage, Code coverage

2. -------------------measures the degree to which the specification or code of a software program has been exercised by tests. -------------------measures the degree to which the source code of a program has been tested. Select one: a. Test coverage, Code coverage b. Code coverage, Test coverage c. Acceptance Test, Unit Test d. Unit Test, Acceptance Test

Test coverage, Code coverage

7. -------------------measures the degree to which the specification or code of a software program has been exercised by tests. -------------------measures the degree to which the source code of a program has been tested. Select one: a. Test coverage, Code coverage b. Code coverage, Test coverage c. Acceptance Test, Unit Test d. Unit Test, Acceptance Test

Test coverage, Code coverage

Which of the following statements about the given diagram clipping are true? (more than one answer) Select one or more: a. B inherits all of A's associations b. A inherits all of B's associations c. A can execute the same use cases as B d. B can execute the same use cases as A.

The correct answers are: B inherits all of A's associations, B can execute the same use cases as A.

The association between an actor and a use case is ( more than one answer) Select one or more: a. Is modeled with a dashed line b. Is modeled with a directed line with an arrowhead c. Is an undirected continuous line d. Is binary

The correct answers are: Is an undirected continuous line, Is binary

The association between an actor and a use case is (more than one answer) Select one or more: a. Is modeled with a dashed line b. Is modeled with a directed line with an arrowhead c. Is an undirected continuous line d. Is binary

The correct answers are: Is an undirected continuous line, Is binary

To prioritize the work on use cases, we use Select one: a. Product Matrix b. Process Matrix c. Traceability Matrix d. None of the above

Traceability Matrix

A design pattern is a way of reusing abstract knowledge about a problem and its solution. Pattern descriptions usually make use of object-oriented characteristics such as inheritance and polymorphism. Select one: True False

True

A use case represents an activity that an actor can perform on the system and what the system does in response. Select one: True False

True

Acceptance Tests are the test specified by the customer, written during the requirements analysis. Select one: True False

True

An actor is any entity (human, physical object, or another system) external to the system-to-be that interacts with the system-to-be. Select one: True False

True

An interface is a set of functional properties (services) that a software object provides or requires. Select one: True False

True

Because Use Cases represent recipes for user achieving 'goals', each use case name must include a 'verb' capturing the goal achievement. Select one: True False

True

Because Use Cases represent recipes for user achieving 'goals', each use case name must include a 'verb' capturing the goal achievement. True or False? Select one: True False

True

Documentation standards may be process standards, defining how documents should be produced, product standards, defining document organization or document interchange standards. Select one: True False

True

Domain modeling determines how elements of system-to-be interact (internal behavior) to produce the external behavior. Select one: True False

True

Domain models represents real - world concepts, not the software components. Select one: True False

True

End-users use the software to assist with some task. This may be flying an aircraft, managing insurance policies, writing a book, etc. They want to know how the software can help them. They are not interested in computer or administration details. Select one: True False

True

Equivalence testing divides the input domain into classes of data from which test cases can be derived to reduce the total number of test cases that must be developed. Select one: True False

True

For an input parameter specified as a Boolean value, partition the value space into one valid and one invalid equivalence class. Select one: True False

True

Indirect communication is usually used when an object cannot or does not want to know the identity of the object whose method it calls. Select one: True False

True

Kerckhoffs Principle states that a cryptosystem should remain secure even if everything about it other than the key is public knowledge. The security of a systems design is in no way dependent upon the secrecy of the design, in and of itself. Select one: True False

True

Organizations are often fronted by a point-of-contact person. A common pattern is to have a specialized worker to take orders from the clients and orchestrate the workings of the workers inside the system. This type of object is known as Controller. Select one: True False

True

Product documentation is used after the system is operational but is also essential for management of the system development. Select one: True False

True

Software Architecture is a phase of software development Select one: True False

True

System Sequence Diagrams considered interactions between the actors.Object Sequence Diagrams consider interactions between the objects. Select one: True False

True

The final outcome of requirement engineering is a Requirement Specification Document? Select one: True False

True

The four basic steps in software project estimation are: Estimate the size of the development product. { either Lines of Code (LOC) or Function Points (FP)} Estimate the effort in person-months or person-hours. Estimate the schedule in calendar months. Estimate the project cost in dollars (or local currency) Select one: True False

True

The four basic steps in software project estimation are: Estimate the size of the development product. {either Lines of Code (LOC) or Function Points (FP)} Estimate the effort in person-months or person-hours. Estimate the schedule in calendar months. Estimate the project cost in dollars (or local currency) True or False? Select one: True False

True

The job of the requirements engineer is to categorize all stakeholder information in a way that allows decision makers to choose an internally consistent set of requirements. Select one: True False

True

The observer pattern , separates the display of the state of an object from the object itself and allows alternative displays to be provided. When the object state changes, all displays are automatically notified and updated to reflect the change. Select one: True False

True

The unit to be tested is also known as the fixture. Select one: True False

True

This traceability property is critical for a good development method (process), because the design elaboration progresses systematically, without great leaps that are difficult to grasp and/or follow. Select one: True False

True

We call a function f a trapdoor function if f is easy to compute, but f -1 is very hard, indeed impossible for practical purposes. Select one: True False

True

Which of the following statements characterize use cases? Select one: a. Use cases specify the procedural process within a system b. Use cases are suitable for modeling interfaces between two systems c. Use cases specify the functionalities and the behavior that the system which is being developed should have. d. None of the above

Use cases specify the functionalities and the behavior that the system which is being developed should have.

Analysis phase is concerned about the ________ aspect of software engineering where as Design is more focused on __________ aspect. Select one: a. When, What b. How, What c. What, How d. What, When

What, How

In UML diagrams, relationship between object and component parts is represented by Select one: a. ordination b. aggregation c. segregation d. increment

aggregation

Software reengineering process model includes restructuring activities for which of the following work items? Select one: a. Code b. Documentation c. Data d. all of the above

all of the above

Process models are described as agile because they ? Select one: a. eliminate the need for cumbersome documentation b. emphasize maneuverability and adaptability c. do not waste development time on planning activities d. make extensive use of prototype creation

emphasize maneuverability and adaptability

Coupling is a qualitative indication of the degree to which a module Select one: a. can be written more compactly b. focuses on just one thing c. is able to complete its function in a timely manner d. is connected to other modules and outside world

is connected to other modules and outside world

Coupling is a qualitative indication of the degree to which a module Select one: a. can be written more compactly. b. can be written more compactly. c. is able to complete its function in a timely manner. d. is connected to other modules and the outside world.

is connected to other modules and the outside world.

LOC-based estimation techniques require problem decomposition based on Select one: a. information domain values b. project schedule c. software functions d. process activities

software functions

Software architecture focuses on ---------------requirements and decomposition of ----------------------requirements. Select one: a. Functional , Non Functional b. Non Functional, Functional c. Behavioral, Contextual d. Contextual, Behavioral

Non Functional, Functional

The term FURPS refers to Select one: a. Functional system properties b. Non functional system properties c. Both a and b d. None of the above

Non functional system properties

An --------------- is a software packaging of data and code together into a unit within a running computer program. Select one: a. Method b. Function c. Object d. Class

Object

Concept Maps, while representing knowledge about the problem domain, are expressed in terms of 'concepts' and -------, and are used to represent knowldge, beliefs, feelings etc. Select one: a. Problems b. Prepositions c. Adverbs d. Verbs

Prepositions

Initiating actor is the --------------actor where as participating actor is the --------------- actor. Select one: a. Secondary, Primary b. Primary , Secondary c. None of the above

Primary , Secondary

'Velocity' of the development team ( in effort estimation ) is defined are the -----------? Select one: a. Duration needed to develop the system b. Effort needed to develop the system c. Productivity of the team d. Speed of the team

Productivity of the team

A popular approach to micro-level design is known as responsibility-driven design (RDD). We know the types of responsibilities that objects can have: Type 1 responsibility (knowing): Memorizing data or references, such as data values, data collections, or references to other objects, represented as a _____________. Type 2 responsibility (doing): Performing computations, such as data processing, control of physical devices, etc., represented as a ____________ Type 3 responsibility (communicating): Communicating with other objects, represented as __________ sending (method invocation). Select one: a. Message, Method, Property b. Property , Method, Message c. Method, Property, Message d. Property, Message, Method

Property , Method, Message

Methods that are even more aggressive in terms of short iterations and heavy user involvement are often characterized as -------------? Select one: a. Complex b. Agile c. Iterative d. Incremental

Agile

The result of the requirements engineering elaboration task is an analysis model that defines which of the following problem domain(s)? Select one: a. Information b. Functional c. Behavioral d. All of the above

All of the above

Decomposing a problem into simpler ones is common when dealing with complex problems. This is known as -------? Select one: a. Divide and conquer b. Modularity c. Only A d. Only B e. Both A and B

Both A and B

Reverse engineering of data focuses on? Select one: a. Database Structures b. Internal data Structures c. Both a and b d. None of the above

Both a and b

Selects elements from the edges of the equivalence class, or outliers such as- zero, min/max values, empty set, empty string, and null, confusion between > and >=, etc. This type of testing is known as Select one: a. Test Coverage b. Boundary Testing c. Unit Testing d. Integration Testing

Boundary Testing

Selects elements from the edges of the equivalence class, or outliers such as- zero, min/max values, empty set, empty string, and null, confusion between > and >=, etc. This type of testing is known as--- Select one: a. Test Coverage b. Boundary Testing c. Unit Testing d. Integration Testing

Boundary Testing

Consider the following diagram . Which of the following is true for the image? Select one: a. If an instance of A is deleted, the contained instances of B are not affected. b. If an instance of B is deleted, all contained instances of A are also deleted. c. If an instance of A is deleted, all contained instances of B are also deleted. d. None of the above

If an instance of A is deleted, all contained instances of B are also deleted.

Consider the following diagram: Which of the following is true for the image? Select one: a. If an instance of A is deleted, the contained instances of B are not affected. b. If an instance of B is deleted, all contained instances of A are also deleted. c. If an instance of A is deleted, all contained instances of B are also deleted. d. None of the above

If an instance of A is deleted, all contained instances of B are also deleted.


Conjuntos de estudio relacionados

LEARNSMART CHAPTER 3 INQUIRY INTO LIFE 14TH EDITION

View Set

Rise Up (Customer Service Class)

View Set

Gastrointestinal Assessment & Stomach Disorders

View Set

Histograms, Frequency Polygons, and Ogives

View Set

DRIVER ED FINAL STUDY GUIDE PT 2

View Set