CSCI441_FianlPrep
In UML notation, which of the following represents the public visibility of an attribute or method? - + # *
+
Suppose a project has four user stories, each story has 3, 5, 7, and 6 user story points, respectively. What is the total size of this project?
21
If I want to add a new column Floor into the existing table Apartment, which of the following is correct? ADD Floor INTEGER into Table Apartment; CHANGE TABLE Apartment ADD Floor INTEGER; ALTER TABLE Apartment ADD Floor INTEGER; UPDATE TABLE Apartment ADD Floor INTEGER;
ALTER TABLE Apartment ADD Floor INTEGER;
There are four software development methodologies. Which of the following one is not one of four mentioned in testbook? AOD ASD OOAD SAD
AOD
____________________ is a special case of equivalence testing that focuses on the boundary values of input parameters. Control Flow Testing Boundary Testing Equivalence Testing State-based Testing
Boundary Testing
Database use which of the following architectural style? Pipe-and-Filter Central Repository REST MVC
Central Repository
In "Safe Home Access Control" case study, for use case "Inspect Access History", which of the following will be assign the responsibility for "Retrieve the record from Database Connection"? Database Connection Page Maker Database Controller
Controller
In MVC architecture, which part takes input and figure out what it means to the model? View Model Controller
Controller
Write the SQL command that delete a row from the table. (One word)
DELETE
Which of the following is NOT a software design issue? Design for change Design for reuse Design for security Design for cheap
Design for cheap
Which of the following type of requirement is highly wanted but not mandatory? Optional essential Future Desirable
Desirable
Which stakeholder will be most interested in the requested functionalities? End users customers architects developers
End users
A design is object-oriented when each activity of the system is performed by exactly one unit, and when inputs and outputs of each unit are well defined. True False
False
An actor associate with a person. True False
False
Complex means complicated True False
False
In PHP, "5.0" === 5 results true True False
False
In safe home access case study, If I test the logger, deviceCotrl classes first, I am using Top-Down Integration Testing True False
False
Systematic approach can guarantee 100% coverage of usage scenarios in acceptance test True False
False
The domain model notation is standardized by UML, so is class diagram. True False
False
in PHP, 5+"2 things" results "52 things" True False
False
PHP is a server-side scripting language whose scripts are embedded in _______________ documents
HTML
With SQL, how can you insert "Doe" as the "LastName" in the "Persons" table? INSERT INTO Persons ('Doe') INTO LastName INSERT ('Doe') INTO Persons (LastName) INSERT INTO Persons (LastName) VALUES ('Doe') INSERT Persons (LastName) VALUES ('Doe')
INSERT INTO Persons (LastName) VALUES ('Doe')
Which of the following is known as the law of diminishing returns Simple software costs more money Computer chip performance will double every 18 month Simpler software costs less money Improving accuracy of estimation beyond a certain point requires huge cost and effort
Improving accuracy of estimation beyond a certain point requires huge cost and effort
Which type of the following risk must be avoid? Intolerable As low as reasonably practical acceptable all of the above
Intolerable
Which of the following event and Guard condition cause the transition from Accepting to Unlocked ? Invalid Key, numOfAttempts > maxNumOfAttemps Valid Key, numOfAttempts <= maxNumOfAttemps Valid Key, numOfAttempts <= maxNumOfAttemps Invalid Key, numOfAttempts <= maxNumOfAttemps
Invalid Key, numOfAttempts > maxNumOfAttemps
PHP syntax is similar to that of _____________ Python Java JavaScript Ruby
JavaScript
In use case "Unlock", (in case study "Safe Home Access Control"), which of the following is the secondary actor? The goal for this use case is "To disarm the lock and enter, get space lighted up" Tenant LockDevice LightSwitch Landlord
LockDevice LightSwitch
Which of the following are important design principle at local object level Less Message Principle Low Coupling Principle Expert Doer Principle Low Cohesion Principle
Low Coupling Principle Expert Doer Principle
Which of the following is NOT a category for the concepts in domain modeling of "Safe Home Access Control"? Boundary Control Entity None of the above
None of the above
In use case "Inspect Access History" in "Safe Home Access Control" case study, which of the following has no association with concept "PageMaker"? Notifier Controller DataBaseConnection InterfacePage
Notifier
Which SQL keyword is used to sort the result-set? ORDER SORT BY SORT ORDER BY
ORDER BY
Which of the following type of communication between Objects sending untargeted messages? via a shared element One-to-many none of the above One-to-one
One-to-many
Which of the following is NOT a proposition in Concept Map of "Home Access Control" case study? Open the door , please. Tenant enters the key The key is not valid Tenant wishes the door opened
Open the door , please.
SQL stands for Structured ____________ Language
Query
Which of the following is the role of the customer in a software project? Requires a computer system to achieve some business goals Understand how the system-to-be interact with the user or the environment and design the software-to-be Implement the software-to-be designed by the software engineer
Requires a computer system to achieve some business goals
A popular approach to micro-level design is known as RDD. What RDD stands for? Responsibility-detected design Relationship-detected design Responsibility-driven design Relationship-driven design
Responsibility-driven design
With SQL, how do you select all the columns from a table named "Persons"? SELECT # from Persons SELECT All From Persons SELECT * from Persons SELECT Persons
SELECT * from Persons
"Grass is green" is a proposition True False
True
"To see if some parts already exit and can be reused" is one of the reasons to decompose the system. True False
True
"User stories" is a preferred tool in agile methods True False
True
A test is a finite collection of test cases. True False
True
All the concepts from domain model should be able to trace to class diagram. True False
True
An object hides its states (attributs). The attributes are accessible only through the object's interface. True False
True
Analysis dealt with what is needed for our system while design determines how the elements of the system work and interact. True False
True
Assume that LightController is a child class of HouseholdDeviceController, Then the LightController inherite all public methods in HoursholdDeviceController class, except contructors. True False
True
Database system = database management system + data (+ applications). True False
True
Entities and Relationships in the E-R Model are represented as relations(tabular data) in the Relational Model True False
True
In PHP, every variable name starts with $, on both declaration and usage. True False
True
In case study "Safe Home Access Control", one subsystem architectural style is Tiered Architecture. True False
True
In software engineering process, the analysis phase is concerned with "what" aspect while the design phase is concerned with "how" aspect. True False
True
In use case analysis, we consider the system as a "black box' while in domain modling, we consider the system as a "transparent box" True False
True
Inheritance relation is static, it is defined at compile time True False
True
It is unethical to leave a customer with working code, but without any documentation True False
True
Our goal is to find faults as cheaply and quickly as possible True False
True
PHP array can have mixed kinds of elements. True False
True
PHP compound statements cannot be blocks True False
True
Polymorphism allows avoiding explicit conditionals when you have objects whose behavior varies depending on their types. True False
True
Requirements are categorized into funtional requirements and non-functional requirements True False
True
The "first tier" use cases represent meaningful services provided by the system to an actor. The "second tier" use cases represent elaborations or sub-services of the main services. True False
True
The highest-priority use cases will be elaborated, implemented, and delivered the first. True False
True
The key characteristic of object-orientation is the concept of responsibility that an object has towards other objects. Responsibilities characterize the whole system design True False
True
The object-oriented approach starts by breaking up the whole program into software objects with specialized roles and creating a division of labor True False
True
How can you change "Zeng" into "Zheng" in the "LastName" column in the Persons table? MODIFY Persons SET LastName='Zeng' WHERE LastName='Zheng' MODIFY Persons SET LastName='Zeng' INTO LastName='Zheng' UPDATE Persons SET LastName='Zeng' INTO LastName='Zheng' UPDATE Persons SET LastName='Zeng' WHERE LastName='Zheng'
UPDATE Persons SET LastName='Zeng' WHERE LastName='Zheng'
Which of the followingsoftware method fit the description: "Unidirectional. Finish this step then move to next" Waterfall Iterative + Incremental Agile
Waterfall
Which of the following is an use case in the UML representation of an ATM project? Customer Withdraw Cash Money Transaction record
Withdraw Cash
An _________________ is the triggering of an interaction with system-to-be.
action
What is the relationship between KeyStorage and Key classes in Safe Home Access class diagram? is-a aggregation inheritance has-a
aggregation
Which of the following method has most heavy customer involvement? waterfall unified process agile
agile
In case study "Safe Home Access System" , which of the following is a subsystem? subsystem for device control subsystem for administration subsystem for remote data access all of the above
all of the above
Match the components with the layer in layered architecture style for "Safe Home Access Control" case study. User interface -> User Interface Layer User authentication -> Domain logic layer Control of sensors and devices -> Domain logic layer Archiving -> Technical service layer
answers on other side
THE schema of a SQL table is the table name and its _____________________
attributes
Testing shows the presence, not the absence of __________________.
bugs
Which of the following is NOT a concept in case study "Personal Investment Assistant"? ask price price quote last trade can be
can be
Which of the following is the lowest level in hierarchy of software system scope levels (compare with other three)? classes packages product line subsystem
classes
Contracts express any important ______________________ about the attributes in the domain model
conditions
Black box testing normally conducted by who and for what testing? customer, unit programmer, unit customer, acceptance programmer, acceptance
customer, acceptance
Software architecture is a set of high-level ____________ that determines the structure of the solution.
decisions
Which of the following is the best name for a getter method for attribute lightIntensity? getlightIntensity() GetLightIntensity() getLightIntensity() getIntensity()
getLightIntensity()
Which of the following is the UML notation for is-a relationship? hollow triangle filled triangle filled diamond hollow diamond
hollow triangle
In object oriented programming, objects communicate each other by sending __________________
messages
The driver and stub are also known as ________________ objects, because they pretend to be the objects they are simulating.
mock
Which of the following are in PHP/MySQL interface? mysql_query mysql_fetch_array mysql_select_db mysql_connect
mysql_query mysql_fetch_array mysql_select_db mysql_connect
Which of the following is NOT in a detailed use case? primary actor secondary actor related requirements none of the above
none of the above
In author's implementation, given a key, KeyStorage returns a value of a valid key. If the return value is __________________, the key is invalid.
null
In the "Safe Home Access Control" case study, match the actors and their goals To retire an existing user account and disable access -> Landlord To configure the device activation preference -> Tenant To control the lightbulb -> LightSwitch To control the physical lock mechanism -> LockDevice
other side
Match the following concepts in Home Access Model InterfacePage -> boundary DatabaseConnection -> boundary Archiver -> entity SearchRequest -> boundary
other side
Match the following for a detailed use case "Inspect Access History" Goal -> to examine the access history for a particular door. postcondition -> none Primary Actor -> Tenant Secondary actor -> Database
other side
Match the responsibilities and concepts in domain model of "Safe Home Access Control" case study Coordinate actions of all concepts associated with a use case, a logical grouping of use cases, or the entire system and delegate the work to other concepts. -> Controller Container for user's authentication data, such as pass-code, timestamp, door identification, etc. -> Key Verify whether or not the key-code entered by the user is valid. -> KeyChecker Block the input to deny more attempts if too many unsuccessful attempts. -> Controller
other side
Match the responsibility type and its representation in software design. Memorizing data or references, such as data values, data collections, or references to other objects -> property Performing computations, such as data processing, control of physical devices, etc -> method Communicating with other objects -> message sending
other side
In Pipe-and-Filter architecture, which of the following is the connector? pipe filter no such a architectural style neither pipe nor filter
pipe
Which of the following is NOT an attribute of Key concept in "Safe Home Access Control" domain model? userIdCode price doorLocation timeStamp
price
Which of the following is not a key concern of software architecture? project timeline conceptual integrity break the system up into the pieces Cross-cutting concerns
project timeline
Which of the following is used to identify a concept when building a domain model? noun name responsibility verb
responsibility
Browser requests a PHP file (dynamic content): server reads it, runs any ________________ code inside it, then sends result across the network
script
A use case may have different scenarios, the main ___________ scenario and the alternate ones. A system sequence diagram may represent one of those scenarios in entirety, or a subpart of a scenario.
success
It is essential to document the alternative solutions that were considered in the design process, identify all the__________________ encountered, and explain why the alternatives were abandoned
tradeoffs
The traceability matrix of domain model traces the domain concepts to the _____________________ from which they were derived.
use cases
Agile software development introduced a light way to model requirements in the form of ___________________ problem descriptions user stories documentations diagrams
user stories
In acceptance test for Safe Home Access project, which of the following input data expects to produce "pass" result? valid key of a just-added tenant on his/ her apartment an invalid key on any apartment valid key of a current tenant on someone else's apartment key of a removed tenant on his/ her previous apartment
valid key of a just-added tenant on his/ her apartment
which of the following is NOT a primitive data type in PHP? vector float string integer
vector