CSCI441_FianlPrep

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In UML notation, which of the following represents the public visibility of an attribute or method? - + # *

+

Suppose a project has four user stories, each story has 3, 5, 7, and 6 user story points, respectively. What is the total size of this project?

21

If I want to add a new column Floor into the existing table Apartment, which of the following is correct? ADD Floor INTEGER into Table Apartment; CHANGE TABLE Apartment ADD Floor INTEGER; ALTER TABLE Apartment ADD Floor INTEGER; UPDATE TABLE Apartment ADD Floor INTEGER;

ALTER TABLE Apartment ADD Floor INTEGER;

There are four software development methodologies. Which of the following one is not one of four mentioned in testbook? AOD ASD OOAD SAD

AOD

____________________ is a special case of equivalence testing that focuses on the boundary values of input parameters. Control Flow Testing Boundary Testing Equivalence Testing State-based Testing

Boundary Testing

Database use which of the following architectural style? Pipe-and-Filter Central Repository REST MVC

Central Repository

In "Safe Home Access Control" case study, for use case "Inspect Access History", which of the following will be assign the responsibility for "Retrieve the record from Database Connection"? Database Connection Page Maker Database Controller

Controller

In MVC architecture, which part takes input and figure out what it means to the model? View Model Controller

Controller

Write the SQL command that delete a row from the table. (One word)

DELETE

Which of the following is NOT a software design issue? Design for change Design for reuse Design for security Design for cheap

Design for cheap

Which of the following type of requirement is highly wanted but not mandatory? Optional essential Future Desirable

Desirable

Which stakeholder will be most interested in the requested functionalities? End users customers architects developers

End users

A design is object-oriented when each activity of the system is performed by exactly one unit, and when inputs and outputs of each unit are well defined. True False

False

An actor associate with a person. True False

False

Complex means complicated True False

False

In PHP, "5.0" === 5 results true True False

False

In safe home access case study, If I test the logger, deviceCotrl classes first, I am using Top-Down Integration Testing True False

False

Systematic approach can guarantee 100% coverage of usage scenarios in acceptance test True False

False

The domain model notation is standardized by UML, so is class diagram. True False

False

in PHP, 5+"2 things" results "52 things" True False

False

PHP is a server-side scripting language whose scripts are embedded in _______________ documents

HTML

With SQL, how can you insert "Doe" as the "LastName" in the "Persons" table? INSERT INTO Persons ('Doe') INTO LastName INSERT ('Doe') INTO Persons (LastName) INSERT INTO Persons (LastName) VALUES ('Doe') INSERT Persons (LastName) VALUES ('Doe')

INSERT INTO Persons (LastName) VALUES ('Doe')

Which of the following is known as the law of diminishing returns Simple software costs more money Computer chip performance will double every 18 month Simpler software costs less money Improving accuracy of estimation beyond a certain point requires huge cost and effort

Improving accuracy of estimation beyond a certain point requires huge cost and effort

Which type of the following risk must be avoid? Intolerable As low as reasonably practical acceptable all of the above

Intolerable

Which of the following event and Guard condition cause the transition from Accepting to Unlocked ? Invalid Key, numOfAttempts > maxNumOfAttemps Valid Key, numOfAttempts <= maxNumOfAttemps Valid Key, numOfAttempts <= maxNumOfAttemps Invalid Key, numOfAttempts <= maxNumOfAttemps

Invalid Key, numOfAttempts > maxNumOfAttemps

PHP syntax is similar to that of _____________ Python Java JavaScript Ruby

JavaScript

In use case "Unlock", (in case study "Safe Home Access Control"), which of the following is the secondary actor? The goal for this use case is "To disarm the lock and enter, get space lighted up" Tenant LockDevice LightSwitch Landlord

LockDevice LightSwitch

Which of the following are important design principle at local object level Less Message Principle Low Coupling Principle Expert Doer Principle Low Cohesion Principle

Low Coupling Principle Expert Doer Principle

Which of the following is NOT a category for the concepts in domain modeling of "Safe Home Access Control"? Boundary Control Entity None of the above

None of the above

In use case "Inspect Access History" in "Safe Home Access Control" case study, which of the following has no association with concept "PageMaker"? Notifier Controller DataBaseConnection InterfacePage

Notifier

Which SQL keyword is used to sort the result-set? ORDER SORT BY SORT ORDER BY

ORDER BY

Which of the following type of communication between Objects sending untargeted messages? via a shared element One-to-many none of the above One-to-one

One-to-many

Which of the following is NOT a proposition in Concept Map of "Home Access Control" case study? Open the door , please. Tenant enters the key The key is not valid Tenant wishes the door opened

Open the door , please.

SQL stands for Structured ____________ Language

Query

Which of the following is the role of the customer in a software project? Requires a computer system to achieve some business goals Understand how the system-to-be interact with the user or the environment and design the software-to-be Implement the software-to-be designed by the software engineer

Requires a computer system to achieve some business goals

A popular approach to micro-level design is known as RDD. What RDD stands for? Responsibility-detected design Relationship-detected design Responsibility-driven design Relationship-driven design

Responsibility-driven design

With SQL, how do you select all the columns from a table named "Persons"? SELECT # from Persons SELECT All From Persons SELECT * from Persons SELECT Persons

SELECT * from Persons

"Grass is green" is a proposition True False

True

"To see if some parts already exit and can be reused" is one of the reasons to decompose the system. True False

True

"User stories" is a preferred tool in agile methods True False

True

A test is a finite collection of test cases. True False

True

All the concepts from domain model should be able to trace to class diagram. True False

True

An object hides its states (attributs). The attributes are accessible only through the object's interface. True False

True

Analysis dealt with what is needed for our system while design determines how the elements of the system work and interact. True False

True

Assume that LightController is a child class of HouseholdDeviceController, Then the LightController inherite all public methods in HoursholdDeviceController class, except contructors. True False

True

Database system = database management system + data (+ applications). True False

True

Entities and Relationships in the E-R Model are represented as relations(tabular data) in the Relational Model True False

True

In PHP, every variable name starts with $, on both declaration and usage. True False

True

In case study "Safe Home Access Control", one subsystem architectural style is Tiered Architecture. True False

True

In software engineering process, the analysis phase is concerned with "what" aspect while the design phase is concerned with "how" aspect. True False

True

In use case analysis, we consider the system as a "black box' while in domain modling, we consider the system as a "transparent box" True False

True

Inheritance relation is static, it is defined at compile time True False

True

It is unethical to leave a customer with working code, but without any documentation True False

True

Our goal is to find faults as cheaply and quickly as possible True False

True

PHP array can have mixed kinds of elements. True False

True

PHP compound statements cannot be blocks True False

True

Polymorphism allows avoiding explicit conditionals when you have objects whose behavior varies depending on their types. True False

True

Requirements are categorized into funtional requirements and non-functional requirements True False

True

The "first tier" use cases represent meaningful services provided by the system to an actor. The "second tier" use cases represent elaborations or sub-services of the main services. True False

True

The highest-priority use cases will be elaborated, implemented, and delivered the first. True False

True

The key characteristic of object-orientation is the concept of responsibility that an object has towards other objects. Responsibilities characterize the whole system design True False

True

The object-oriented approach starts by breaking up the whole program into software objects with specialized roles and creating a division of labor True False

True

How can you change "Zeng" into "Zheng" in the "LastName" column in the Persons table? MODIFY Persons SET LastName='Zeng' WHERE LastName='Zheng' MODIFY Persons SET LastName='Zeng' INTO LastName='Zheng' UPDATE Persons SET LastName='Zeng' INTO LastName='Zheng' UPDATE Persons SET LastName='Zeng' WHERE LastName='Zheng'

UPDATE Persons SET LastName='Zeng' WHERE LastName='Zheng'

Which of the followingsoftware method fit the description: "Unidirectional. Finish this step then move to next" Waterfall Iterative + Incremental Agile

Waterfall

Which of the following is an use case in the UML representation of an ATM project? Customer Withdraw Cash Money Transaction record

Withdraw Cash

An _________________ is the triggering of an interaction with system-to-be.

action

What is the relationship between KeyStorage and Key classes in Safe Home Access class diagram? is-a aggregation inheritance has-a

aggregation

Which of the following method has most heavy customer involvement? waterfall unified process agile

agile

In case study "Safe Home Access System" , which of the following is a subsystem? subsystem for device control subsystem for administration subsystem for remote data access all of the above

all of the above

Match the components with the layer in layered architecture style for "Safe Home Access Control" case study. User interface -> User Interface Layer User authentication -> Domain logic layer Control of sensors and devices -> Domain logic layer Archiving -> Technical service layer

answers on other side

THE schema of a SQL table is the table name and its _____________________

attributes

Testing shows the presence, not the absence of __________________.

bugs

Which of the following is NOT a concept in case study "Personal Investment Assistant"? ask price price quote last trade can be

can be

Which of the following is the lowest level in hierarchy of software system scope levels (compare with other three)? classes packages product line subsystem

classes

Contracts express any important ______________________ about the attributes in the domain model

conditions

Black box testing normally conducted by who and for what testing? customer, unit programmer, unit customer, acceptance programmer, acceptance

customer, acceptance

Software architecture is a set of high-level ____________ that determines the structure of the solution.

decisions

Which of the following is the best name for a getter method for attribute lightIntensity? getlightIntensity() GetLightIntensity() getLightIntensity() getIntensity()

getLightIntensity()

Which of the following is the UML notation for is-a relationship? hollow triangle filled triangle filled diamond hollow diamond

hollow triangle

In object oriented programming, objects communicate each other by sending __________________

messages

The driver and stub are also known as ________________ objects, because they pretend to be the objects they are simulating.

mock

Which of the following are in PHP/MySQL interface? mysql_query mysql_fetch_array mysql_select_db mysql_connect

mysql_query mysql_fetch_array mysql_select_db mysql_connect

Which of the following is NOT in a detailed use case? primary actor secondary actor related requirements none of the above

none of the above

In author's implementation, given a key, KeyStorage returns a value of a valid key. If the return value is __________________, the key is invalid.

null

In the "Safe Home Access Control" case study, match the actors and their goals To retire an existing user account and disable access -> Landlord To configure the device activation preference -> Tenant To control the lightbulb -> LightSwitch To control the physical lock mechanism -> LockDevice

other side

Match the following concepts in Home Access Model InterfacePage -> boundary DatabaseConnection -> boundary Archiver -> entity SearchRequest -> boundary

other side

Match the following for a detailed use case "Inspect Access History" Goal -> to examine the access history for a particular door. postcondition -> none Primary Actor -> Tenant Secondary actor -> Database

other side

Match the responsibilities and concepts in domain model of "Safe Home Access Control" case study Coordinate actions of all concepts associated with a use case, a logical grouping of use cases, or the entire system and delegate the work to other concepts. -> Controller Container for user's authentication data, such as pass-code, timestamp, door identification, etc. -> Key Verify whether or not the key-code entered by the user is valid. -> KeyChecker Block the input to deny more attempts if too many unsuccessful attempts. -> Controller

other side

Match the responsibility type and its representation in software design. Memorizing data or references, such as data values, data collections, or references to other objects -> property Performing computations, such as data processing, control of physical devices, etc -> method Communicating with other objects -> message sending

other side

In Pipe-and-Filter architecture, which of the following is the connector? pipe filter no such a architectural style neither pipe nor filter

pipe

Which of the following is NOT an attribute of Key concept in "Safe Home Access Control" domain model? userIdCode price doorLocation timeStamp

price

Which of the following is not a key concern of software architecture? project timeline conceptual integrity break the system up into the pieces Cross-cutting concerns

project timeline

Which of the following is used to identify a concept when building a domain model? noun name responsibility verb

responsibility

Browser requests a PHP file (dynamic content): server reads it, runs any ________________ code inside it, then sends result across the network

script

A use case may have different scenarios, the main ___________ scenario and the alternate ones. A system sequence diagram may represent one of those scenarios in entirety, or a subpart of a scenario.

success

It is essential to document the alternative solutions that were considered in the design process, identify all the__________________ encountered, and explain why the alternatives were abandoned

tradeoffs

The traceability matrix of domain model traces the domain concepts to the _____________________ from which they were derived.

use cases

Agile software development introduced a light way to model requirements in the form of ___________________ problem descriptions user stories documentations diagrams

user stories

In acceptance test for Safe Home Access project, which of the following input data expects to produce "pass" result? valid key of a just-added tenant on his/ her apartment an invalid key on any apartment valid key of a current tenant on someone else's apartment key of a removed tenant on his/ her previous apartment

valid key of a just-added tenant on his/ her apartment

which of the following is NOT a primitive data type in PHP? vector float string integer

vector


संबंधित स्टडी सेट्स

Business Law - Chapter 12 consideration

View Set

python programming // exam review

View Set

Chemolithotrophs Sulfur and Iron Oxidizing bacteria

View Set

Vulnerability and Hazard Exposure

View Set

3.04 Defend, Challenge, or Qualify

View Set

Major Lines of Latitude and Longitude

View Set

Quiz 33-Chi-Square test for independence

View Set