CS 2401
The Advanced Encryption Standard has a fixed block size of ________bits and a key size of _______ , ________ and _________ bits Select one: a. 256, 128, 192, 256 b. 128, 128, 192 and 256 c. 192, 128, 192, 256 d. None of the above
128, 128, 192 and 256
4. A ------- is a path that begins and ends at the same node whereas a --------------- is a circuit with no node (other than the starting node) included more than once Select one: a. Cycle, Circuit b. Circuit, Cycle c. Valid, Invalid d. None of the above
Circuit, Cycle
Boundary testing and Control-flow testing are criteria for ? Select one: a. Unit Testing b. Test Coverage c. Code Coverage d. None of the above
Code Coverage
On the Ordinal Cohesion Scale, rate the following in the Lowest to Highest order of cohesion. Select one: a. Logical , Coincidental, Sequential, Temporal, Functional b. Coincidental, Sequential, Functional, Temporal, Logical c. Coincidental, Logical, Temporal, Sequential, Functional d. Logical, Sequential, Coincidental, Temporal, Functional
Coincidental, Logical, Temporal, Sequential, Functional
Which of the following is not an issue to consider when reverse engineering? Select one: a. Abstraction Level b. Completeness c. Connectivity d. Directionality
Connectivity
Hiding the object state , so that it can be observed or affected only via object's methods is known as ----------? Select one: a. Classification b. Encapsulation c. Objectification d. None of the above
Encapsulation
A Test, is an erroneous hardware or software element of a system that can cause the system to fail. Select one: True False
False
Acceptance tests are normally conducted by the developer? Select one: True False
False
Boundary value analysis can only be used to do white-box testing. Select one: True False
False
Cohesion is of two types, Internal and Syntactic. Select one: True False
False
Cyclomatic complexity measures software complexity from the machines viewpoint in terms of how the size of the input data affects an algorithms usage of computational resources (usually running time or memory) Select one: True False
False
Cyclomatic complexity of graph G equals #edges + #nodes - 2 V(G) = e + n - 2 Select one: True False
False
For a strongly connected graph a real edge is created to connect the END node to the BEGIN node Select one: True False
False
If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the Pub-Sub design pattern. Select one: True False
False
In the RSA system, the receiver does as follows: Randomly select two large prime numbers p and q, which always must be kept secret. Select an integer number E, known as the public exponent, such that (p - 1) and E have no common divisors, and (q - 1) and E have no common divisors. Determine the private exponent, D, such that (ExD - 1) is exactly divisible by both (p - 1) and (q - 1). In other words, given E, we choose D such that the integer remainder when ExD is divided by (p - 1)x(q - 1) is 1. Determine the product n = pxq, known as public modulus. Release publicly the public key, which is the pair of numbers n and E, K + = (n, E). Keep secret the private key, K - = (n, D). The above events are mentioned in the correct order as they are performed while writing the algorithm. Select one: True False
False
In the RSA system, the receiver does as follows: Randomly select two large prime numbers p and q, which always must be kept secret. Select an integer number E, known as the public exponent, such that (p 1) and E have no common divisors, and (q 1) and E have no common divisors. Determine the private exponent, D, such that (ED 1) is exactly divisible by both (p 1) and (q 1). In other words, given E, we choose D such that the integer remainder when ED is divided by (p 1)(q 1) is 1. Determine the product n = pq, known as public modulus. Release publicly the public key, which is the pair of numbers n and E, K = (n, E). Keep secret the private key, K = (n, D). The above events are mentioned in the correct order as they are performed while writing the algorithm. Select one: True False
False
Is the following diagram about cohesion true? Select one: True False
False
Objects are abstractions that specify the state and behavior of different collections of objects. Select one: True False
False
Objects coupling is indirectly proportional to the number of different messages the object sends to other objects. Select one: True False
False
Software engineering umbrella activities are only applied during the initial phases of software development projects. Select one: True False
False
Software is a product and can be manufactured using the same technologies used for other engineering artifacts? Select one: True False
False
Symmetric cryptosystems are also known as Public Key systems Select one: True False
False
The only time reengineering enters into work with a legacy system is when it components will be implemented as objects. Select one: True False
False
The size estimate for a software product to be built must be based on a direct measure like LOC. Select one: True False
False
These documents record the process of development and maintenance. Plans, schedules, process quality documents and organizational and project standards are process documentation. This is called as Product Documentation Select one: True False
False
This is the process of preparing the document for professional printing. It is supported by desktop-publishing packages, artwork packages and type styling programs. This process is Document Polishing Select one: True False
False
Cohesion is a qualitative indication of the degree to which a module Select one: a. cannot be written more compactly. b. Focuses of just one thing. c. is able to complete its function in a timely manner. d. is connected to other modules and the outside world.
Focuses of just one thing.
The correct order for all requirement engineering techniques is Select one: a. Analysis, Gathering, Specifications b. Gathering, Specifications, Analysis c. Gathering, Analysis, Specifications d. Analysis, Specifications, Gathering
Gathering, Analysis, Specifications
A popular approach to micro-level design is known as responsibility-driven design (RDD). We know the types of responsibilities that objects can have: Type 1 responsibility (knowing): Memorizing data or references, such as data values, data collections, or references to other objects, represented as a _____________. Type 2 responsibility (doing): Performing computations, such as data processing, control of physical devices, etc., represented as a ____________ Type 3 responsibility (communicating): Communicating with other objects, represented as __________ sending (method invocation). Select one: a. Message, Method, Property b. Property, Method, Message c. Method, Property, Message d. Property, Message, Method
Property, Method, Message
Concept Maps, while representing knowledge about the problem domain, are expressed in terms of 'concepts' and -------, and are used to represent knowldge, beliefs, feelings etc. Select one: a. Problems b. Propositions c. Adverbs d. Verbs
Propositions
Concept Maps, while representing knowledge about the problem domain, are expressed in terms of 'concepts' and -------, and are used to represent knowledge, beliefs, feelings etc. Select one: a. Problems b. Propositions c. Adverbs d. Verbs
Propositions
Which of the following activities is not part of the software reengineering process model? Select one: a. Forward Engineering b. Inventory Analysis c. Prototyping d. Reverse engineering
Prototyping
___________ algorithm is based upon factorizing a number n into its Prime Factors. Select one: a. Logarithm Problem b. Symmetric Algorithm c. RSA Algorithm d. None of the above
RSA Algorithm
The term ____________is often used to describe modifying the design and/or implementation of a software module without changing its external behavior, and is sometimes informally referred to as cleaning it up. Select one: a. Designing b. Factoring c. Refactoring d. Polymorphism
Refactoring
---------------cohesion is difficult to automate Select one: a. Syntactic b. Semantic c. Internal d. None of the above
Semantic
7. Look at the two diagrams and identify them. Select one: a. UML, State b. Context, State c. State , Context d. None of the above
State , Context
Look at the two diagrams and identify them. Select one: a. UML, State b. Context, State c. State , Context d. None of the above
State , Context
The developer should not create a software artifact (a system requirement, a UML diagram, or source code) unless they know how it will be tested. This kind of development is known as ? Select one: a. Object Oriented Development b. Agile Development c. Test Driven Development d. Extreme Programming
Test Driven Development
-------------------measures the degree to which the specification or code of a software program has been exercised by tests. -------------------measures the degree to which the source code of a program has been tested. Select one: a. Test coverage, Code coverage b. Code coverage, Test coverage c. Acceptance Test, Unit Test d. Unit Test, Acceptance Test
Test coverage, Code coverage
2. -------------------measures the degree to which the specification or code of a software program has been exercised by tests. -------------------measures the degree to which the source code of a program has been tested. Select one: a. Test coverage, Code coverage b. Code coverage, Test coverage c. Acceptance Test, Unit Test d. Unit Test, Acceptance Test
Test coverage, Code coverage
7. -------------------measures the degree to which the specification or code of a software program has been exercised by tests. -------------------measures the degree to which the source code of a program has been tested. Select one: a. Test coverage, Code coverage b. Code coverage, Test coverage c. Acceptance Test, Unit Test d. Unit Test, Acceptance Test
Test coverage, Code coverage
Which of the following statements about the given diagram clipping are true? (more than one answer) Select one or more: a. B inherits all of A's associations b. A inherits all of B's associations c. A can execute the same use cases as B d. B can execute the same use cases as A.
The correct answers are: B inherits all of A's associations, B can execute the same use cases as A.
The association between an actor and a use case is ( more than one answer) Select one or more: a. Is modeled with a dashed line b. Is modeled with a directed line with an arrowhead c. Is an undirected continuous line d. Is binary
The correct answers are: Is an undirected continuous line, Is binary
The association between an actor and a use case is (more than one answer) Select one or more: a. Is modeled with a dashed line b. Is modeled with a directed line with an arrowhead c. Is an undirected continuous line d. Is binary
The correct answers are: Is an undirected continuous line, Is binary
To prioritize the work on use cases, we use Select one: a. Product Matrix b. Process Matrix c. Traceability Matrix d. None of the above
Traceability Matrix
A design pattern is a way of reusing abstract knowledge about a problem and its solution. Pattern descriptions usually make use of object-oriented characteristics such as inheritance and polymorphism. Select one: True False
True
A use case represents an activity that an actor can perform on the system and what the system does in response. Select one: True False
True
Acceptance Tests are the test specified by the customer, written during the requirements analysis. Select one: True False
True
An actor is any entity (human, physical object, or another system) external to the system-to-be that interacts with the system-to-be. Select one: True False
True
An interface is a set of functional properties (services) that a software object provides or requires. Select one: True False
True
Because Use Cases represent recipes for user achieving 'goals', each use case name must include a 'verb' capturing the goal achievement. Select one: True False
True
Because Use Cases represent recipes for user achieving 'goals', each use case name must include a 'verb' capturing the goal achievement. True or False? Select one: True False
True
Documentation standards may be process standards, defining how documents should be produced, product standards, defining document organization or document interchange standards. Select one: True False
True
Domain modeling determines how elements of system-to-be interact (internal behavior) to produce the external behavior. Select one: True False
True
Domain models represents real - world concepts, not the software components. Select one: True False
True
End-users use the software to assist with some task. This may be flying an aircraft, managing insurance policies, writing a book, etc. They want to know how the software can help them. They are not interested in computer or administration details. Select one: True False
True
Equivalence testing divides the input domain into classes of data from which test cases can be derived to reduce the total number of test cases that must be developed. Select one: True False
True
For an input parameter specified as a Boolean value, partition the value space into one valid and one invalid equivalence class. Select one: True False
True
Indirect communication is usually used when an object cannot or does not want to know the identity of the object whose method it calls. Select one: True False
True
Kerckhoffs Principle states that a cryptosystem should remain secure even if everything about it other than the key is public knowledge. The security of a systems design is in no way dependent upon the secrecy of the design, in and of itself. Select one: True False
True
Organizations are often fronted by a point-of-contact person. A common pattern is to have a specialized worker to take orders from the clients and orchestrate the workings of the workers inside the system. This type of object is known as Controller. Select one: True False
True
Product documentation is used after the system is operational but is also essential for management of the system development. Select one: True False
True
Software Architecture is a phase of software development Select one: True False
True
System Sequence Diagrams considered interactions between the actors.Object Sequence Diagrams consider interactions between the objects. Select one: True False
True
The final outcome of requirement engineering is a Requirement Specification Document? Select one: True False
True
The four basic steps in software project estimation are: Estimate the size of the development product. { either Lines of Code (LOC) or Function Points (FP)} Estimate the effort in person-months or person-hours. Estimate the schedule in calendar months. Estimate the project cost in dollars (or local currency) Select one: True False
True
The four basic steps in software project estimation are: Estimate the size of the development product. {either Lines of Code (LOC) or Function Points (FP)} Estimate the effort in person-months or person-hours. Estimate the schedule in calendar months. Estimate the project cost in dollars (or local currency) True or False? Select one: True False
True
The job of the requirements engineer is to categorize all stakeholder information in a way that allows decision makers to choose an internally consistent set of requirements. Select one: True False
True
The observer pattern , separates the display of the state of an object from the object itself and allows alternative displays to be provided. When the object state changes, all displays are automatically notified and updated to reflect the change. Select one: True False
True
The unit to be tested is also known as the fixture. Select one: True False
True
This traceability property is critical for a good development method (process), because the design elaboration progresses systematically, without great leaps that are difficult to grasp and/or follow. Select one: True False
True
We call a function f a trapdoor function if f is easy to compute, but f -1 is very hard, indeed impossible for practical purposes. Select one: True False
True
Which of the following statements characterize use cases? Select one: a. Use cases specify the procedural process within a system b. Use cases are suitable for modeling interfaces between two systems c. Use cases specify the functionalities and the behavior that the system which is being developed should have. d. None of the above
Use cases specify the functionalities and the behavior that the system which is being developed should have.
Analysis phase is concerned about the ________ aspect of software engineering where as Design is more focused on __________ aspect. Select one: a. When, What b. How, What c. What, How d. What, When
What, How
In UML diagrams, relationship between object and component parts is represented by Select one: a. ordination b. aggregation c. segregation d. increment
aggregation
Software reengineering process model includes restructuring activities for which of the following work items? Select one: a. Code b. Documentation c. Data d. all of the above
all of the above
Process models are described as agile because they ? Select one: a. eliminate the need for cumbersome documentation b. emphasize maneuverability and adaptability c. do not waste development time on planning activities d. make extensive use of prototype creation
emphasize maneuverability and adaptability
Coupling is a qualitative indication of the degree to which a module Select one: a. can be written more compactly b. focuses on just one thing c. is able to complete its function in a timely manner d. is connected to other modules and outside world
is connected to other modules and outside world
Coupling is a qualitative indication of the degree to which a module Select one: a. can be written more compactly. b. can be written more compactly. c. is able to complete its function in a timely manner. d. is connected to other modules and the outside world.
is connected to other modules and the outside world.
LOC-based estimation techniques require problem decomposition based on Select one: a. information domain values b. project schedule c. software functions d. process activities
software functions
Software architecture focuses on ---------------requirements and decomposition of ----------------------requirements. Select one: a. Functional , Non Functional b. Non Functional, Functional c. Behavioral, Contextual d. Contextual, Behavioral
Non Functional, Functional
The term FURPS refers to Select one: a. Functional system properties b. Non functional system properties c. Both a and b d. None of the above
Non functional system properties
An --------------- is a software packaging of data and code together into a unit within a running computer program. Select one: a. Method b. Function c. Object d. Class
Object
Concept Maps, while representing knowledge about the problem domain, are expressed in terms of 'concepts' and -------, and are used to represent knowldge, beliefs, feelings etc. Select one: a. Problems b. Prepositions c. Adverbs d. Verbs
Prepositions
Initiating actor is the --------------actor where as participating actor is the --------------- actor. Select one: a. Secondary, Primary b. Primary , Secondary c. None of the above
Primary , Secondary
'Velocity' of the development team ( in effort estimation ) is defined are the -----------? Select one: a. Duration needed to develop the system b. Effort needed to develop the system c. Productivity of the team d. Speed of the team
Productivity of the team
A popular approach to micro-level design is known as responsibility-driven design (RDD). We know the types of responsibilities that objects can have: Type 1 responsibility (knowing): Memorizing data or references, such as data values, data collections, or references to other objects, represented as a _____________. Type 2 responsibility (doing): Performing computations, such as data processing, control of physical devices, etc., represented as a ____________ Type 3 responsibility (communicating): Communicating with other objects, represented as __________ sending (method invocation). Select one: a. Message, Method, Property b. Property , Method, Message c. Method, Property, Message d. Property, Message, Method
Property , Method, Message
Methods that are even more aggressive in terms of short iterations and heavy user involvement are often characterized as -------------? Select one: a. Complex b. Agile c. Iterative d. Incremental
Agile
The result of the requirements engineering elaboration task is an analysis model that defines which of the following problem domain(s)? Select one: a. Information b. Functional c. Behavioral d. All of the above
All of the above
Decomposing a problem into simpler ones is common when dealing with complex problems. This is known as -------? Select one: a. Divide and conquer b. Modularity c. Only A d. Only B e. Both A and B
Both A and B
Reverse engineering of data focuses on? Select one: a. Database Structures b. Internal data Structures c. Both a and b d. None of the above
Both a and b
Selects elements from the edges of the equivalence class, or outliers such as- zero, min/max values, empty set, empty string, and null, confusion between > and >=, etc. This type of testing is known as Select one: a. Test Coverage b. Boundary Testing c. Unit Testing d. Integration Testing
Boundary Testing
Selects elements from the edges of the equivalence class, or outliers such as- zero, min/max values, empty set, empty string, and null, confusion between > and >=, etc. This type of testing is known as--- Select one: a. Test Coverage b. Boundary Testing c. Unit Testing d. Integration Testing
Boundary Testing
Consider the following diagram . Which of the following is true for the image? Select one: a. If an instance of A is deleted, the contained instances of B are not affected. b. If an instance of B is deleted, all contained instances of A are also deleted. c. If an instance of A is deleted, all contained instances of B are also deleted. d. None of the above
If an instance of A is deleted, all contained instances of B are also deleted.
Consider the following diagram: Which of the following is true for the image? Select one: a. If an instance of A is deleted, the contained instances of B are not affected. b. If an instance of B is deleted, all contained instances of A are also deleted. c. If an instance of A is deleted, all contained instances of B are also deleted. d. None of the above
If an instance of A is deleted, all contained instances of B are also deleted.