CSI 3060

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

"Become a Member of the Video Store and Rent Videotape" could be a name for a use case

False

"Become a Member of the Video Store and Rent Videotape" could be a name for a use case.

False

"Verify Credit Card" can never be a name of a use case.

False

A foreign key need to be unique.

False

A good database design divides your information into subject-based tables to increase redundant data.

False

A query language allows a user to specify a task by specifying how the task will be accomplished.

False

A schema is a view of the database used by one or more systems or users.

False

A secondary key is a field or combination of fields that uniquely identifies a particular member of an entity.

False

A system is reliable if it supports business requirements and meets user needs.

False

An application is a static entity.

False

An information system does not need applications to perform a task.

False

Input/Output devices are software that allows real-world users to interact with the virtual world of the information system.

False

Role and actor refer to two different things.

False

The application flow fulfills only functional requirements.

False

The database designer must determine where independency is within the data.

False

The example of "Checkout Groceries" relates to the real system

False

The example of "Checkout Groceries" relates to the real system.

False

The example of "Purchase Groceries" relates to an information system

False

The example of "Purchase Groceries" relates to an information system.

False

The objects don't have a behavior (operations) and/or attributes.

False

The physical model concentrates on the data requirements and the data to be stored independent of physical considerations.

False

The user interface is responsible for translating real-world messages into imaginary ones.

False

Use case modeling cannot be used for gathering requirements.

False

Use cases describe how a system accomplishes

False

Use cases describes how a system accomplishes.

False

Goal decides the relevance of activities in a use case.

True

The cashier interacts with the supermarket's Point-of-Sale system by sending and receiving "messages."

True

The flow of an application is decided by control objects.

True

The goal of the primary actor is specified by the name of the use case

True

The goal of the primary actor is specified by the name of the use case.

True

The most notable boundary object is the user interface.

True

The school system includes entities named STUDENT, COURSE, INSTRUCTOR, and ADVISOR.

True

Usually more than one solution can satisfy the same problem. Therefore, design must select between alternate solutions.

True

A ________ is what the successful completion of a use case achieves. A) system objective B) behavior C) goal D) scenario

C) goal

The messages that are received by the user interface layer and transmitted to the application are classified as ________. A) GUI B) output C) input D) DOS

C) input

A use case's ________ is its goal. It must be active, concise, and decisive. A) location B) address C) name D) actor

C) name

Resource editors are responsible for managing ________, including alternate texts for multilingual applications. A) applications B) operating systems C) non-code building blocks of the software D) databases

C) non-code building blocks of the software

Use cases are not effective in capturing the ________ requirements. A) functional B) business C) non-functional D) system

C) non-functional

A ________ is an ordered sequence of interactions between the actor(s) and the system to accomplish a goal. A) goal B) system C) scenario D) system boundary

C) scenario

Interpreters execute the instructions each and every time the program is run without ________. A) storing the instructions B) running the program C) storing the translation as an executable D) saving the program

C) storing the translation as an executable

Use case modeling is a set of ________ that, when taken together, describe the behavior of a system. A) diagrams B) flows C) use cases D) systems

C) use cases

Good coding standards can make it less likely that bugs ________. A) are reduced B) are completely eliminated C) will creep into the code D) will produce more bugs

C) will creep into the code

CMM:

Capability Maturity Model

A(n) ________ is an application that gathers the necessary modules into a package for installation on a target machine and allows the user to customize the installation. A) builder B) virtual machine C) code editor D) installer

D) installer

The goal of the primary actor is specified by the ________ of the use case. A) scenario B) system C) length D) name

D) name

Component testing is contingent upon a ________. A) monolithic application B) one-component application C) component-based architecture D) none of the above

D) none of the above

A data model is a relational database that is designed for query and analysis rather than for transaction processing.

False

A database is maintained and queried using the data mapping language (DML).

False

A debugger allows you to examine the program from outside.

False

A field might have one or dozens of fields, depending on what information is needed.

False

A record retention policy states your business's process for managing documents from retention to creation or disposal.

False

A successful information system requires training for all users, and managers, but not IT staff members.

False

A use case model consists of only one-use case

False

A use case model consists of only one-use case.

False

After risks are identified and controlled, they must be assessed.

False

Airline reservations is a narrow domain

False

Airline reservations is a narrow domain.

False

Coding depends on user requirements and is completely independent of design.

False

Compilers translate the human-readable code in high-level languages into machine languages and require the programmer to know how the computer works.

False

Control objects can destroy other objects if that is what the application must do.

False

DCL is used to update the database with new records.

False

Database administration involves data design, management, security, access, but not backup.

False

Design is the Path from Concept to Problem.

False

Design takes into account only functional requirements.

False

During the systems analysis phase, a physical model of the system was created.

False

In integration testing the focus is on individual components, while in component testing every component has to be tested again once a new component is integrated into the whole.

False

In the example of "Checkout Groceries," the primary actor is the cashier

False

In the example of "Checkout Groceries," the primary actor is the cashier.

False

In the example of "Purchase Groceries," the primary actor is the cashier.

False

In the real world, absolute security is a realistic goal.

False

Interpreters and compilers both translate the human-readable code in high-level languages into machine languages in the same manner.

False

Once data is entered, the company should store source documents in a safe location for ever.

False

Programming requires a single tool to achieve its goals.

False

RDBMS stands for Related Data Build Management System.

False

Role and actor refer to two different things

False

Sounds are not part of visual interface.

False

Structure diagram describes the interaction between the objects in the system

False

Structure diagram describes the interaction between the objects in the system.

False

System testing is the same as acceptance testing.

False

Testing is the first defense in assuring software quality.

False

The CREATE SCHEMA DDL command is used to create a table.

False

The DELETE TABLE DDL command is used to remove a table from the database.

False

The DROP command deletes rows from a table individually or in groups.

False

The key to database and application tuning is design, not performance.

False

The purpose of the model is to improve software quality, increase development time, and cut costs.

False

The syntax of programming languages is strict and demanding but they don't handle some abstract concepts.

False

Use case modeling cannot be used for gathering requirements

False

6) Use cases are not inherently object-oriented.

True

A DBMS provides an interface between a database and users who need to access the data.

True

A common field is an attribute that appears in more than one entity.

True

A comprehensive test plan should include scenarios for every possible situation the program could encounter.

True

A database table is defined using the data definition language (DDL).

True

A deployment diagram is very similar to class and component diagrams, except that it depicts the relationship between nodes.

True

A deployment diagram models the relationships between software components and computing "nodes" such as servers, workstations, and networks.

True

A domain is a collection of current and future of software applications that share a set of common characteristics.

True

A system is maintainable if it is flexible, scalable, and easily modified.

True

A use case aims to achieve a specific goal by following a set of steps called a scenario

True

A use case aims to achieve a specific goal by following a set of steps called a scenario.

True

A use case describes what a system does as viewed from the outside

True

A use case describes what a system does as viewed from the outside.

True

Activity diagram is a general-purpose diagram for visualizing and verifying a logical flow

True

Activity diagram is a general-purpose diagram for visualizing and verifying a logical flow.

True

Actor is a role that any user who has been given the part can play

True

Actor is a role that any user who has been given the part can play.

True

An actor is an entity outside the system that interacts with the system to achieve a specific goal.

True

Any field that is not a primary key or a candidate key is called a non-key field.

True

Application design starts with identifying the generic components of the solution.

True

Application security involves the identification of system users and consideration of user-related security issues.

True

Attackers break into a system to cause damage, steal information, or gain recognition.

True

Cardinality describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.

True

Component testing is not a replacement for unit testing, but follows a similar tactic and should start when unit testing stops.

True

Components of a use case are tightly integrated and cannot be understood properly without each other.

True

DBMS is software system used to store, retrieve, and run queries on data.

True

Database design involves classifying data and identifying interrelationships.

True

Database includes a fault diagnosability infrastructure for preventing, detecting, diagnosing, and resolving database problems.

True

Database security is creating and enforcing policies and practices of auditing and accountability for inappropriate or unauthorized actions.

True

Design is an evolution from a conceptual solution to a concrete one.

True

Design must produce a builder's view of the system.

True

Domain concepts define behavior and the structure of a domain

True

Domain concepts define behavior and the structure of a domain.

True

Domain expert is a knowledgeable person working in a domain.

True

Every piece of information should be traceable back to the input data that produced it.

True

Goal decides the relevance of activities in a use case

True

If the customer finds all desired items, brings them to the checkout counter, pays for them, and carries them out, then a normal flow has occurred.

True

Implementation transforms the abstract concepts of analysis and the detailed specifications of design into an actual product that people use.

True

In OLTP systems, performance requirements require that historical data be frequently moved to an archive.

True

In a database, we save data into rows and columns into a series of tables.

True

In component testing the focus is on individual components, while in integration testing every component has to be tested again once a new component is integrated into the whole.

True

In databases, null values are not equivalent to zero.

True

In software development, unit is the smallest piece of code that has an identity.

True

In the "Checkout Groceries" system, if an item does not have a label to scan and the cashier asks a sales manager to identify the code, an alternate flow has occurred

True

In the "Checkout Groceries" system, if an item does not have a label to scan and the cashier asks a sales manager to identify the code, an alternate flow has occurred.

True

Normalization is the process of creating table designs by assigning specific fields or attributes to each table in the database.

True

Physical design modeling defines the services that an object must provide, hence, creating a precise scope for coding.

True

SQL is a standard language for database access.

True

Schema is the complete definition of a database, including descriptions of all fields, tables, and relationships.

True

Source code editors have features specifically designed to simplify and speed up the input of source code.

True

The Point-of-Sale system interacts with the bank to validate a credit card.

True

The SQL command used to populate tables is the INSERT command.

True

The behavior of displayers can be dynamic or non-dynamic.

True

The deployment diagram is about how the software is configured in relation to hardware

True

The language must support the concepts that lie at the foundation of the development methodologies.

True

The risk management process is iterative, and it means risks are constantly identified, assessed, and controlled.

True

The system design specification serves as a blueprint for constructing the new system.

True

The user interface must guide users through the steps necessary to accomplish meaningful tasks.

True

Use a case diagram as a visual meta-model.

True

Use case diagram is a visual meta-model

True

Use cases are not inherently object-oriented

True

Use cases are useful for communicating upstream with stakeholders as well as exchanging information downstream with designers and programmers.

True

Vulnerability is a security weakness or soft spot, and an exploit is an attack that takes advantage of vulnerability.

True

Whenever source documents pass between departments, the transfer should be recorded.

True

in the beginning, software development was all about coding, but today coding is a very small and insignificant part of software development.

True

Name the two commonly used encryption techniques.

Private key encryption and public-key encryption.

____ employs a user interface that guides the users, step-by-step, through simple forms or pages.

A wizard

The actor can be a human or other ________ system. A) internal B) future C) past D) external

D) external

In CUSTOMER table the postal code field would be used as a --------------. A) Primary key B) secondary key C) Candidate key D) All of the above

B) secondary key

Testing is a part of ________. A) software measurement B) software quality assurance C) software development D) both B & C

B) software quality assurance

Displayers provide ________ information. A) textual B) textual and pictorial C) pictorial D) input and output

B) textual and pictorial

A(n) ________ is composed of steps that are conditional. A) Alternate flow B) Sub-flow C) Normal flow D) Exception flow

A) Alternate flow

-------------- is a hostile act that targets the system, or the company itself. A) Attack B) Authorization C) Risk D) All of the above

A) Attack

________ classes control the interaction between the system or application and entities outside the system. A) Boundary B) Utility C) Stereotype D) None of the above

A) Boundary

High-quality software cannot result from low-quality code because code is ________. A) the brick and the mortar of a software product B) too easy C) too difficult D) irrelevant

A) the brick and the mortar of a software product

------------------- describes all data elements included in the logical design. A) Data Dictionary B) Table C) Primary key D) Scalability

A) Data Dictionary

----------------- policies and procedures protect data from loss or damage, which is a vital goal in every organization. A) Data security B) Data encryption C) Data decryption D) All of the above

A) Data security

________ is all about creating something new and selecting the best possible solution. A) Design B) Analysis C) Implementation D) A requirement

A) Design

________ objects are those objects that are needed to build the solution. A) Design B) Real C) Multiple D) Concrete

A) Design

________ are those events that prevent certain steps, or the entire use case, from completing successfully. A) Exception flows B) Normal flows C) Sub-flows D) Alternate flows

A) Exception flows

Utility classes are also called ________. A) service classes B) control classes C) boundary classes D) superclasses

A) service classes

Design aims to arrive at the ________ of the system development. A) specifications B) boundaries C) goals D) objectives

A) specifications

Which of the following is NOT a design class? A) standard B) control C) boundary D) utility

A) standard

The choice of the programming language depends on many factors, including ________. A) technology B) personnel C) computers D) routers

A) technology

Design extends modeling from ________. A) concrete to conceptual B) physical to logical C) conceptual to concrete D) radical to mainstream

C) conceptual to concrete

Labels, graphs, and pictures are examples of ________. A) containers B) selectors C) displayers D) editors

C) displayers

Business concepts are discovered during ________. A) behavioral modeling B) decision making C) domain analysis D) requirements gathering

C) domain analysis

A software application is a ________ entity. A) static B) progressive C) dynamic D) controlled

C) dynamic

The main window of a word-processing application is an example of a(n) ________. A) displayer B) visual control C) editor D) container

C) editor

Name and explain the risk control strategies.

- Avoidance eliminates the risk by adding protective safeguards - Mitigation reduces the impact of risk by careful planning and preparation - Transference shifts the risk to another asset or party, such as an insurance company. - Acceptance means that nothing is done. Companies usually accept a risk only when the protection clearly is not worth the expense.

Explain the elements of the system security

- Confidentiality, protects information from unauthorized disclosure and safeguards privacy. - Integrity, prevents unauthorized users from creating, modifying, or deleting information. - Availability, ensures that authorized users have timely and reliable access to necessary information.

Name and explain shortly the three interactive tasks in risk management

- Risk identification analyzes the organization's assets, threats, and vulnerabilities. - Risk assessment measures risk likelihood and impact - Risk control develops safeguards that reduce risks and their impact.

Name the different types of checking

- Unit testing - Component testing - Integration testing - System testing - Acceptance testing Only need to remember 2 or 3

Describe various flows in the narrative of a use case.

1- Normal flow is the best-case scenario that results in the successful completion of the use case. 2- Alternate flow, which is present only if conditional steps are needed. 3- Sub-flows if steps in the normal flow contain sub-steps. 4-Exceptions, which describe what may prevent the completion of one step or the entire use case.

What is a database?

A database is an organized collection of structured information, or data, typically stored electronically in a computer system.

Identify the four components of a use case and tell how they affect each other. Answer:

A use case has four well-defined components: a goal as the successful outcome of the use case; stakeholders whose interests are affected by the outcome, including actor(s) who interact with the system to achieve the goal; a system that provides the required services for the actors; and a step-by-step scenario that guides both the actor(s) and the system toward the finish line.

What does the scalability of a DBMS?

A system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Explain the following concepts: A) Primary key B) Foreign key C) Candidate key D) Nonkey

A) Primary key: A field or combination of fields that uniquely identifies a particular member of an entity. B) Foreign key: A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables. C) Candidate key: Any field that can serve as a primary key is called a candidate key. D) Nonkey: Any field that is not a primary key or a candidate key is called a nonkey field.

Explain the following concepts: A) Table B) SQL C) Normalization D) Referential Integrity

A) Table: Tables are the basic unit of data storage in an Oracle Database. Data is stored in rows and columns. B) SQL: A programming language used by nearly all relational databases to query, manipulate, and define data, and to provide access control. C) Normalization: The process of creating table designs by assigning specific fields or attributes to each table in the database. D) Referential Integrity: it is for data validity check. A set of rules that avoids data inconsistency and quality problems. It involves applying a set of rules that can help identify and correct inherent problems and complexities in table designs.

Which of the following is NOT an interpreted language? A) UML B) Visual Basic C) all scripting languages D) JavaScript

A) UML

Coding standards are most essential when ________. A) a team is involved in coding, debugging, and maintenance B) individual programmers work on unique programs C) analyst and designer don't get along D) designers don't appreciate programmers

A) a team is involved in coding, debugging, and maintenance

Which of the following is NOT a phase of software testing? A) alpha B) unit C) integration D) acceptance

A) alpha

The user interface is primarily ________ that makes the interaction between two different worlds of human and machine possible. A) an interpreter B) a device C) a use case D) an information system

A) an interpreter

Use case modeling represents the ________ of a system. A) behavior B) condition C) technology D) heart and soul

A) behavior

Finding ________ is part of everyone's expectations from testing. A) bugs B) answers C) solutions D) debuggers

A) bugs

Walkthrough and inspection are two types of ________. A) code review B) coding standards C) debuggers D) installers

A) code review

When developing an information system, design helps the ________ modeling of the solution. A) concrete B) abstract C) conceptual D) behavioral

A) concrete

A use case is a ________ that formalizes the interaction between stakeholders and the system. A) contract B) procedure C) programming language D) system policy

A) contract

Builders ________ required binary modules, and linkers ________ them. A) create, connect B) acquire, separate C) create, separate D) acquire, connect

A) create, connect

In a relational database, referential integrity means that a ----------------- value cannot be entered in one table unless it matches an existing primary key in another table. A) foreign key B) primary key C) secondary key D) candidate key

A) foreign key

The design phase of system development deals with the question of _________ to build the system. A) how B) where C) when D) why

A) how

The process of development starts with gathering requirements and concludes with ________. A) implementation B) analysis C) design D) programming

A) implementation

Activity diagram is a general-purpose diagram for visualizing and verifying a -----------------. A) logical flow B) alternate flow C) Both of the above D) None of the above

A) logical flow

The manner in which the user interface guides users through the flow of the application is called ________. A) navigation B) the layout C) workflow D) a guideline

A) navigation

Assemblers expect the code to have a ________ relationship to the machine language. A) one-to-one B) one-to-many C) many-to-one D) many-to-many

A) one-to-one

Which of the following is NOT a major component of application software? A) operating system B) user interface C) persistence D) entity objects

A) operating system

The messages sent from an application to a user are classified as ________. A) output B) input C) GUI D) DOS

A) output

A use case describes what a system does as viewed from ________ the system. A) outside B) inside C) within D) the bottom of

A) outside

An actor is identified by a unique name which describes a unique ________. A) role B) person C) goal D) scenario

A) role

The primary candidates for becoming actors are domain concepts classified as ________. A) roles B) business rules C) clients D) people

A) roles

A product passes acceptance testing when ________. A) the people who have paid for its development accept it B) the product is accepted without testing C) the machine is acceptable to the user D) the process is acceptable to the client

A) the people who have paid for its development accept it

The only visible component of application software is ________. A) the user interface B) persistence C) a business rule D) utility

A) the user interface

Application design revisit ________ and re-examine them from the viewpoint of design. A) use cases B) utility classes C) activity diagrams D) interface objects

A) use cases

Use cases describe ________ a system accomplishes. A) what B) how C) when D) where

A) what

What is Actor Generalization? Give 2 examples.

Actor Generalization is the abstracting actors into one higher level. The actor that is the outcome of generalization is called an abstract actor. 1. Customer (Private Customer and Corporate Customer) 2. Administrative staff (billing clerk, registration clerk, and appointment clerk)

The analyst must provide an _______ that records the source of each data item and when it entered the system.

Audit trail

--------------- eliminates the risk by adding protective safeguards. A) Mitigation B) Avoidance C) Transference D) Acceptance

B) Avoidance

--------------- is the process of putting the new information system online and retiring the old system. A) Installation B) Changeover C) Training D) All of the above

B) Changeover

-----------------is a territory with shared concepts and rules. A) Analysis B) Domain C) Requirement D) All of the above

B) Domain

The ________ approach enables users to interact with the computer through real-world metaphors. A) user friendly B) Graphical User Interface (GUI) C) real-time D) applet programming

B) Graphical User Interface (GUI)

JDBC enables ------------------- to exchange data with any database that uses SQL statements and is JDBC-compliant. A) Database B) Java applications C) Bothe a the above D) None of the above

B) Java applications

A(n) ________ is the best-case scenario for a use case. A) Alternate flow B) Normal flow C) Sub-flow D) Exception flow

B) Normal flow

A ------------ is a field or combination of fields that uniquely identifies a particular member of an entity. A) Foreign key B) Primary key C) Secondary key D) None of the above

B) Primary key

----------------- means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise. A) Cardinality B) Scalability C) Both of the above D) None of the above

B) Scalability

________ are an example of manipulators. A) Icons B) Scroll bars C) Menus D) Buttons

B) Scroll bars

________ are those entities whose interests are affected by the success or the failure of the use case. A) Viewers B) Stakeholders C) Programmers D) Clients

B) Stakeholders

The user interface is a layer of ________ objects that manage interaction with the user. A) control B) boundary C) utility D) virtual

B) boundary

The ________ bundles the complex series of requests to the entity objects into a common workflow that is easily accessed by the boundary objects. A) persistence object B) control object C) utility object D) encapsulate object

B) control object

Design defines the services that an object must provide and, as a result, ________. A) creates coding automatically B) creates a precise scope for coding C) complements analysis D) we don't really need coding

B) creates a precise scope for coding

To create initial use cases you start with ________. A) counting actors B) domain analysis C) looking into problem space D) looking into solution space

B) domain analysis

Sensitive data can be coded, in a process of ----------------. A) decryption B) encryption C) none of the above D) both of the above

B) encryption

We can combine actors at the same time through ________. A) specialization B) generalization C) both A & B D) neither A nor B

B) generalization

Which of the following is NOT one of the factors in choosing the programming language? A) proprietary languages needed for certain products B) legacy systems C) organizational environment D) methodology

B) legacy systems

Hyperlinks are widely used as ________. A) selectors B) navigators C) containers D) editors

B) navigators

ode review is an important activity in software development, but it is often ________. A) expensive B) neglected C) guided by user requirements D) not productive

B) neglected

A context diagram describes the interaction of ________ entities with the system. A) inside B) outside C) both A & B D) neither A or B

B) outside

The idea behind virtual machines is ________, since the applications can run on any platform that supports the virtual machine. A) platform dependence B) platform independence C) machine independence D) machine dependence

B) platform independence

Which of the following is an appropriate name for a use case? A) manage patient B) refer patient C) patient management D) all of the above

B) refer patient

A ------------is an internal or external entity that could endanger an asset. A) risk B) threat C) None of them D) Both of them

B) threat

The ________ is where the interaction between the user and the application takes place. A) requirements phase B) user interface C) system level D) application

B) user interface

A field is called --------------. A) Attribute B) Column C) Both of the above D) None of the above

C) Both of the above

________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above

C) Control

------------- is software system used to store, retrieve, and run queries on data. A) ODBC B) JDBC C) DBMS D) All of the above

C) DBMS

In software engineering, ----------------- is the process of analyzing related software systems in a domain to find their common and variable parts. A) System design B) Requirement gathering C) Domain analysis D) logical design

C) Domain analysis

________ is a set of activities that transform the abstract concepts of analysis and the detailed specification of design into an actual product that people use. A) Analysis B) Design C) Implementation D) Programming

C) Implementation

----------------------- involves applying a set of rules that can help identify and correct inherent problems and complexities in table designs. A) Globalization B) Interstation C) Normalization D) Identification

C) Normalization

------------------ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data. A) CASE B) ERD C) ODBC D) DBMS

C) ODBC

A -------------------- is a view of the database used by one or more systems or users. A) Table B) Schema C) Subschema D) All of the above

C) Subschema

A ----------- contains a set of related records that store data about a specific entity. A) Column B) Row C) Table D) Database

C) Table

The task of ________ is to provide solutions to the users of an information system. A) a utility program B) an operating system C) application software D) an interface

C) application software

A deployment diagram is used ________. A) to visualize the static aspect of the physical nodes and their relationships B) to specify they physical nodes' details for construction C) both A & B D) neither A or B

C) both A & B

Software testing must provide answers to ________. A) verification B) validation C) both A & B D) neither A or B

C) both A & B

System testing is ________. A) conducted when all components of a system or subsystem are in place B) a kind of "dress rehearsal" before it is shown to the paying clients C) both A & B D) neither A or B

C) both A & B

Design must produce a(n) ________ view of the system. A) owner's B) user's C) builder's D) client's

C) builder's

Syntax errors are detected by ________. A) virtual machines B) interpreters C) code editors D) compliers

C) code editors

By defining programming as coding that is a system of symbols and rules used to represent instructions to a computer, we are ignoring a host of other activities such as ________. A) an object-oriented approach B) design activities C) compilers and interpreters D) the programmers' skill set

C) compilers and interpreters

Name the activities in implementation

Coding - Testing- Deployment- Maintenance

______ testing extends unit testing.

Component

20) A risk manager needs a combination of ------------------. A) business knowledge, B) IT skills C) experience with security tools and techniques D) All of the above

D) All of the above

A ------------------ is a primary key that consists of two or more columns. A) composite key B) concatenated key C) combination key D) All of the above

D) All of the above

Security protects the system and keeps it ----------. A) Safe B) free from danger C) Reliable D) All of the above

D) All of the above

Which of the following is an entity? A) Student B) Course C) Advisor D) All of the above

D) All of the above

Whish of the following is a type of data security? A) password B) shielding sensitive data C) controlling user access D) All of the above

D) All of the above

Which of the following is not an entity? A) Customer B) Customer_name C) Customer_phone D) Both B and C

D) Both B and C

________ detail steps in the normal flow that consists of discrete sub-steps. A) Alternate flows B) Exception flows C) Normal flows D) Sub-flows

D) Sub-flows

A source code editor is a text editor designed specifically for ________. A) providing a quick way to run a compiler, interpreter B) creating and editing code by programmers C) providing a quick way to run a debugger D) all of the above

D) all of the above

Design takes into account ________ requirements. A) functional B) technical C) non-functional D) all of the above

D) all of the above

Major use cases are identified by analyzing business ________. A) processes B) functions C) activities D) all of the above

D) all of the above

Revision control software ________. A) is used to maintain documentation and configuration files B) is used to maintain documentation source code C) can be applied to any type of stored information or data D) all of the above

D) all of the above

The exact nature of training depends on ________. A) the nature of application B) who is using the system C) whether the application is developed in-house or for the mass market D) all of the above

D) all of the above

The purpose of the CMM model is ________. A) improve software quality B) reduce development time C) cut costs D) all of the above

D) all of the above

Which of the following is a feature of use case scenario? A) A step is a transaction. B) Steps can be repeated. C) A step can call on another use case. D) all of the above

D) all of the above

Which of the following is an example of interface containers? A) Web pages B) forms C) frames D) all of the above

D) all of the above

Which of the following is one of the UI responsibilities? A) accepting and editing user input B) producing human-intelligible output C) guiding users to accomplish tasks D) all of the above

D) all of the above

Implementation requires a range of activities including ________. A) testing B) deployment C) maintenance D) all the above

D) all the above

Which of the following is NOT one of the components of a use case? A) a goal B) actors C) a scenario D) behavior

D) behavior

"Register student" is an appropriate ________ for a use case. A) goal B) name C) scenario D) both A & B

D) both A & B

The ________ interface is the type of interface where the user types instructions to the computer in a special language. A) interactive B) real-time C) user friendly D) command-line

D) command-line

Compilers translate the human-readable code in high-level languages into machine languages without ________. A) knowing the language B) knowing the technology C) knowing the name of the programmer D) requiring the programmer to know how the computer works

D) requiring the programmer to know how the computer works

A slider that controls the sound level and the balance of various devices connected to the sound card is an example of a(n) ________. A) editor B) displayer C) container D) selector

D) selector

If you have flawed analysis and defective design, you should ________. A) write multiple codes B) start all over again C) avoid coding completely D) stop reviewing your code

D) stop reviewing your code

What does DBA stand for? What are the responsibilities of a DBA?

DBA = DataBase Administrator A DBA is responsible for DBMS management and support. DBAs are concerned with data security and integrity, preventing unauthorized access, providing backup and recovery, audit trails, maintaining the database, and supporting user needs.

What does DBMS stand for? Explain the DBMS.

DBMS = DataBase Management System It is software system used to store, retrieve, and run queries on data. A DBMS serves as an interface between an end-user and a database, allowing users to create, read, update, and delete data in the database.

________ utilities should be able to restore lost or damaged data.

Data recovery

What is happening during the deployment? Name its activities.

During the deployment, it covers all activities that make the software available for use. It consists of Release, Installation, Updating, and Adaptation.

______ is the process of reviewing the program code to spot logic errors, which produce incorrect results.

Desk checking

What is desk checking?

Desk checking is the process of reviewing the program code to spot logic errors, which produce incorrect results. This process can be performed by the person who wrote the program or by other programmers.

What does ERD stand for? Explain the ERD.

ERD = entity-relationship diagram It is a model that shows the logical relationships and interaction among system entities. It provides an overall view of the system and a blueprint for creating the physical data structures.

_____ scrambles the contents of a file or document to protect it from unauthorized access.

Encryption

Name two techniques to secure a network.

Encryption and firewall

What are the system installation tasks?

Prepare a separate operational and test environment Perform system changeover Perform data conversion Provide training for users, managers, and IT staff Carry out post-implementation tasks.

Explain the risk management

In the real world, it is not realistic to achieve absolute security. Instead, managers must balance the value of the assets being protected, potential risks to the organization, and security costs

Explain integration testing

Integration testing means testing two or more programs that depend on each other. In integration testing, every component must be tested again once a new component is integrated into the whole.

What does JDBC stand for? Explain the JDBC.

JDBC = java database connectivity It enables Java applications to exchange data with any database that uses SQL statements and is JDBC-compliant.

What does ODBC stand for? Explain the ODBC.

ODBC = Open database connectivity It is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

QA:

Quality Assurance

________ are rules designed to meet all legal requirements and business needs for keeping records.

Records Retention Policy

What is social engineering?

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions.

Explain and system testing. What are the major objectives in system testing?

System testing could also be referred to as system-level testing. It includes all likely processing situations, and its objective is to reassure users, developers, and managers that the program meets all specifications and that all necessary features have been included.

What is a deployment diagram? What does a node mean?

The deployment diagram is a UML tool. It is used to visualize the static aspect of the physical nodes and their relationships and to specify their details for construction. It is also a structural diagram that depicts the relationship between nodes. Node is a physical element that exists at run time and that represents a computational resource, generally having at least some memory and, oftentimes, processing capability

How the hardening makes a system secure?

The hardening process makes a system more secure by removing unnecessary accounts services and features.

Describe the difference between primary and secondary actors.

The primary actor is an actor whose goal is expressed by the name of the use case. The services that the system provides through a use case are primarily for the benefit of the primary actor. A secondary actor is the actor who supports the primary actor to reach the goal of the use case

Explain the unit testing. What is the objective in unit testing?

Unit testing is the process of testing an individual program or module. The objective is to identify and eliminate execution errors that could cause the program to terminate abnormally and logic errors that could have been missed during desk checking.

Describe what use case modeling is.

Use case modeling is a set of use cases that, when taken together, describe the behavior of a system. A use case is a unit of this model. It can also be defined as a contract between entities that have a stake in the outcome of a use case (i.e., stakeholders) and the system.

A BIOS-level password, also called a ______or a ______.

boot-level password or a power-on password

____ is the process of putting the new information system online and retiring the old system.

changeover

In object-oriented languages, the unit is a _____ and in structured languages, this unit is a function.

class

When performing a data conversion, the existing ____ is loaded into the new system.

data

The ____ process makes a system more secure by removing unnecessary accounts, services, and features.

hardening

A motion sensor uses _____ to detect movement.

infrared technology

In ______ every component has to be tested again once a new component is integrated into the whole.

integration testing

What is code review? What are the types? Explain.

it is a major tool for enforcing standards Walkthrough is less formal and essentially consists of going over the lists of questions and/or possible defects provided by the participants Inspection, on the other hand, is more formal and consists of going over code line-by-line.

What are the types of relationships in ERD. Explain shortly.

one-to-one relationship: Abbreviated 1:1. It exists when exactly one of the second entity occurs for each instance of the first entity. one-to-many relationship: Abbreviated 1:M. It exists when one occurrence of the first entity can relate to many instances of the second entity, but each instance of the second entity can associate with only one instance of the first entity. many-to-many relationship: Abbreviated M:N. It exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.

A ______ consists of detailed procedures that specify how and when the testing will be performed, who will participate, and what test data will be used.

test plan

During the integration testing the output from _______ becomes input to the master file update program.

the validation program


संबंधित स्टडी सेट्स

Six Step Decision-Making Model for Determining Nursing Scope of Practice

View Set

Exam FX general insurance concepts

View Set

CEA Chapter 1, CEA Chapter 2, CEA Chapter 3

View Set

LENB 3135 Chapter 19 Study Questions

View Set

Perry- Chapter 48: Musculoskeletal or Articular Dysfunction

View Set

unit 8 The media phrasal verbs exercises

View Set