CSC151 Exam II

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

30 (SKIP)

(SKIP)

List of four phases in the problem-solving process

1. Understand the problem 2. Get an idea of how the algorithm will solve that problem 3. Formulate algorithm and represented as a program 4. Evaluate the program for accuracy

Which of the following appears to be the most functionally cohesive?

A module that only records deposits to checking accounts

The 4 layers of software for controlling communication on The Internet:

Application, transport, network, link

Languages that use mnemonics instead of machine language to represent a program

Assembly

______ testing to see if the software system meets the requirements identified during the original analysis.

Black box

_______ testing to see if the system performs in a timely manner

Black box

_____ is compatible with wireless.

CSMA/CA (True)

_________ dictates that each message be broadcast to all the machines on the bus, keeping only those address to itself.

CSMA/CD; (TRUE)

A collection of connected computers in a single building or building complex

LAN

An assertion at a point in a loop that is true every time that point in the loop is reached

Loop invariant

A network of computers that is intermediate in size often spending a local community

MAN

___________ are made up of linked computers connected for the purpose of transferring data from machine to machine.

Networks

An instance of the class

Object

A network whose internal operation is based on designs that are in the public domain

Open

Which of the following is NOT a legal technique for protecting the property rights of a software developer?— ____ (copyright law, software license, and software patent are legal techniques to protect the property rights of a software developer)

Open-source software

Information to be sent over the Internet is broken down into more manageable sized components called ___________. Each is numbered and contains information for making sure it reaches its destination.

Packet

The following statement represents... Errors in a software system tend to be concentrated in relatively small areas.

Pareto principle

A technique of obtaining information by simply asking for it. It is a play on words and is often carried out through email

Phishing

Conditions that must be satisfied at the end of the program

Postconditions

A software unit that acts as an intermediary between a client and a server with a goal of shielding the client from adverse actions of the server

Proxy Server

______ is a notational system in which ideas can be expressed informally during the algorithm development process.

Pseudocode

Functions are program units that are similar to procedures except that a value is transferred back to the calling program unit as "the value of the function."

TRUE

The unique address that contains the information needed buy a browser to contact the proper server and request the desired document

URL

______ is where the Internet infrastructure is used to provide voice communication similar to that of traditional telephone system.

Voice Over Internet Protocol (voip)

A network of computers that spans a great distance, perhaps in neighboring communities are on opposite sides of the world

WAN

Which the following software engineering methodologies is the most rigid

Waterfall model

A program written by Tim Berners-Lee based on hypertext and hypermedia

World Wide Web

A translator that converts a single instruction from a high-level language to machine language and executes it before converting the next instruction

interpreter

An _____ is an ordered set of unambiguous, executable steps that defines a terminating process.

algorithm

The use of design patterns in software engineering was adopted from what other field

architecture

A common data structure that is a block of elements of the same type as a one dimensional list, a two dimensional tables with rows and columns, or tables with higher dimensions

array

Examples of primitive datatypes: integer, Boolean, character, float,,, NOT string Programs that convert the mnemonic expressions into machine language expressions

assemblers

All of the following are ________________: IMAP, MIME, POP3, SMTP (NOT SNAP)

associated with email

All of the following are _____________: UDP, IP, TCP (NOT ODP)

associated with the Internet

A technique used to make sure that a person is who he/she says he/she is

authentication

Which of the following is a form of glass box testing

basis path testing

A device that looks at the destination address that accompanies each message and forward a message across the connection only when that message is destined for a computer on the other side

bridge

A package containing a party's name and that party's public key

certificate

A blueprint of an object

class

A network whose internal operation is based on designs that are owned and controlled by a particular entity such as an individual or a corporation

closed

A translator that converts an entire source program into an object (executable) program

compiler

Special methods defined within a class that are executed automatically when an object is constructed from the class

constructors???

The paradigm that asks a programmer to describe the problem to be solved rather than an algorithm to be followed

declarative paradigm

A process of overloading a computer with messages

denial of service (DoS)

If a class diagram indicates a one-to-one relationship between class X and class Y, then

each object of type X will be associated with only one object of type Y.

A primary prevention technique to filter traffic passing through a point in the network

firewall

Which of the following is a stronger form of cohesion

functional cohesion

The paradigm in which a program is viewed as an entity that accepts inputs and produces output

functional paradigm

Variables whose scopes are not restricted to a particular part of a program are called ____ variables

global

Descriptive names used to refer to memory locations. Examples are Price, ShippingCharge, and TotalCost

identifiers

Paradigm that describes the programming process to be the development of a sequence of commands that, when followed, manipulate data to produce the desired result

imperative or procedural paradigm

What is the state of software development in which the following is performed. Programming is conducted

implementation

a _____ is a repetitive structure in which a collection of statements is executed in a repetitive fashion under the direction of some control process.

loop

Another name for a procedure in the object oriented paradigm

method

An encryption scheme that involves the swapping of a common key that is widely available to many people who need to send a message to the person. That person also has a unique key that is secret and not shared. It uses that key to decrypt the messages sent by the senders.

public key encryption

A circular form of repetition in which each stage of a problem is executed as a sub task of the precious stage. (previous?) A method or function calls itself

recursion

A device that simply passes signals back-and-forth between the two original buses usually with amplification and without consideration of the meaning of the signals

repeater

Keywords that have special meaning in a program and cannot be used by the programmer for other purposes within the program

reserved words

Special purpose computers used for forwarding messages

router

The search algorithm that looks for a target by looking at the first item in the list and then repetitively looking at other items in the list until the item is found or there is nowhere else to look

sequential search

Masquerading as a party other than one's self

spoofing

A technique of solving a problem by not attempting to conquer the entire problem at once, but by viewing the problem at hand in terms of several sub problems

step-wise refinement

Which of the following is a way of testing the design of a software program

structured walkthrough

Which of the following is most likely an example of a one-to-one relationship

student ID and student

A bridge with multiple connections allowing it to connect several buses rather than just two

switch

A protocol system that was established to allow computer users to access computers from greater distances and create a terminal session. It requires the user to follow the login process of the computer

telenet

The Pareto principle is traditionally applied during which phase of software development

testing

Which of the following is NOT represented in a class diagram

the number of class instances

Copyright laws were established

to allow authors to distribute their work while maintaining certain ownership rights

A general category of programs that convert programs expresses in high-level primitives into machine language programs

translator

A ___ is software that infects a computer by inserting itself into programs that already reside in the machine.

virus

Which of the following is the oldest approach to software development

waterfall model

A _____ is an autonomous program that transfers itself through a network, taking up residence in computers and forwarding copies of itself to other computers.

worm

The portion of the program in which a variable can be referenced is called the scope of the program

True

Servers that provide an address translation services to clients

Domain Name System

Actual parameters informal parameters are two names for the same thing

FALSE

A passageway between a network and the outside network

Gateway

_____________ designing test data to ensure that each instruction is executed at least once

Glass box

The language used to develop webpages

HTML (hypertext markup language)

________ is a nonprofit corporation established to coordinate the Internet's operation.

ICANN

The protocol of the World Wide Web. It is used to transfer hypertext documents between browsers and Web servers __________

IETF (Internet engineering task force)

Which of the following is a notational system for representing object-oriented designs

UML diagrams

Natural languages are the languages that humans use and formal languages are languages such as programming languages

True

Which of the following is NOT related to the others?

Class diagram

_______________ is where huge pools of shared computers on the network can be allocated for use by clients as needed. It is the latest trend in distributed systems.

Cloud computing

____ is ensuring that a module performed a unique task in its entirety

Cohesion

____________ is the Interaction between modules

Cohesion

A statement that alters the execution sequence of the program

Control statement

__________ is passing data from one model to another

Coupling

Which of the following is the method proposed by UML for representing sequences of communication between objects?

Sequence diagram

Unwanted junk mail

Spam

A _______ is a program that enters a computer system disguised as a desirable program that is willingly imported by the victim.

Trojan Horse

An instance of a class

object

A Paradigm in which software is viewed as a collection of units each of which can be capable of performing the actions that are immediately related to itself as well as requesting actions of other objects

object oriented paradigm

Conditions that must be satisfied at the beginning of a programs execution

preconditions

A ____ is a single building block from a well-defined set of building blocks from which algorithm representations can be can constructed.

primitive

A set of instructions for performing a task it can be used as an abstract tool by other program units

procedure

A collection of primitives along with a collection of rules stating how the primitives can be combined to represent more complex ideas constitutes a

programming language


Ensembles d'études connexes