CIS 476 7,8,9,10 quizzes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following are Centralized Version Control Systems?

- perforce - CVS - subversion

Which are the three principal layers that Fowler's book focuses on?

- presentation - domain - data source

Which of the following language features were added to Java SE 7

- string in case/switch - diamond syntax for generics - try with resources - multi-catch exceptions - support for NIO.2

Which of the following should you have before you begin the Wideband Delphi process? (select all that apply)

- vision document - scope document

Enumerate the five steps (in the proper order) involved in the analysis of an ethical dilemma.

1. Identify the facts 2. Identify what the ethical dilemma is 3. Identify the stakeholders. 4. Identify the options you can take to "solve" this ethical dilemma 5. Identify the consequences of the options you have chosen

Which is the best (and most radical) technique for addressing the software problem?

buy instead of build

What makes it impossible to change the contents of any file or directory without Git knowing about it?

checksums

Java EE runtime enviro that provide certain services to the components they host such as life-cycle management, dependency injection, concurrency, etc, are called

containers

Which of the following was only made possible by the rise of the internet?

cyberbullying

The property that you need to associate your callback function with is named:

onreadystatechange

Which planning method is used by eXtreme Programming (XP)?

the planning game

Security is one of the vertical _______ that has an impact at all levels of the EA framework.

threads

According to Dave Thomas: "When faced with two or more alternatives that deliver roughly the same value, take the path that makes future change easier." is how to do something in an agile fashion.

true

At present, no one commercial tool can do all of the things that are needed in the EA program.

true

Dave Thomas has an issue with using "Agile" as a noun.

true

Enterprise architects must deal with "business logic" that is not always logical

true

Java EE is a superset of Java SE

true

Java EE is an umbrella specification that bundles and integrates others

true

Linus Torvalds, the creator of Linux, also created Git.

true

The NICE Framework can be viewed as a non-prescriptive cybersecurity workforce dictionary.

true

The NICE Framework is a resource that will strengthen an organization's ability to communicate consistently and clearly about cybersecurity work and its cybersecurity workforce.

true

The Project Management Plan (PMP) serves as the common documentation source for all phases of the CPIC process.

true

Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later.

true

The author suggests that freezing current and future views of the EA at regular periods. Which was used in his example?

twice a year

Match each item on the left with its Key Element:

Design = information security Awareness Training = personnel SOPs = operations Wiring Closets = physical protection Cable Plants = physical protection Disaster Recovery = operations Procedures Training = personnel Assurance = information security

Which of the following are part of Dave Thomas' advice for doing something in an "agile" fashion?

Find out where you are Take a small step towards your goal Adjust your understanding based on what you learned

What was the decision made as a result of using the EA in the Case Study?

Purchase the WELLCO ERP along with a $1.6M module that replaces SITS

Match terms and definitions

Response time = time to process a request Responsiveness = how quickly the system acknowledges a request Latency = minimum time to get any response Throughput = how much work is done in a given amount of time Scalability = measure of how adding resources affects performance

Match the definition of architecture with its author.

The highest level concept of a system in its environment = IEEE Standard An understanding of the system shared by the expert developers = Ralph Johnson Architecture is the decision that you wish you could get right early in a project = Ralph Johnson Architecture is about the important stuff. Whatever that is = Martin Fowler

Which version control system (VCS) was used by Microsoft and integrated as part of Visual Studio?

Visual SourceSafe (VSS)

Which is the best summary of Dr. Brook's classic paper, no silver bullet?

"The very nature of software makes it unlikely that there will be any inventions that will do for software productivity, reliability, and simplicity what electronics innovations did for computer hardware.

The future view of the EA documents is also called the:

"to-be" view

Classify each of the following according to Dr. Brooks' assessment of inherent software challenges (essential) vs non-inherent (accidental) difficulties

- Complexity (essential) - Expressing ideas in code (accidental) - Changeability of software (essential) - Testing code (accidental) - Invisibility of software (essential)

Companies can use the NICE framework to:

- Inventory and track their cybersecurity workforce - Identify training and qualification requirements - Improve position descriptions and job vacancy announcements - Identify the most relevant work roles - Establish a shared terminology between hiring managers and HR staff

Which of the following are actual Computer Science / Information Science academic publications?

- Programming Considered as a Human Activity - The Psychology of Computer Programming - Exploratory Experiments in Programmer Behavior

Which of the following are true of Wideband Delphi? (select all that apply)

- Requires the entire team to correct one another - Requires the creation of a WBS - Was developed at the Rand Corporation in the 1940s - Involves an estimation team with 3 to 7 members

Which are the "Lead Players" that are the focus of Kemper's Chapter 3?

- SVN - Git - Mercurial

Which of the following are Candidate Ethical Principles?

- The Golden Rule - Universalism - No Free Lunch - The Perfect Information Rule

Which of the following are used to declare metadata that is associated with Java EE entities and or objects

- annotations (using the @feature notation) - deployment descriptors (using XML)

Which are the main file states in Git?

- committed - modified - staged

Which techniques are used to fulfill the mission set forth by NICE?

- education - training - workforce development

Which of the following are Distributed Version Control Systems?

- git - bazaar - mercurial

NICE works with (involving a partnership between) which parties?

- government - academia - the private sector

Which of the following are threats to the security of the enterprise?

- hackers - terrorism - fire - floods - disgruntled employees - unintentional mistakes

AJAX is:

Asynchronous JavaScript And Xml

Match

Concepts of Operations Scenario = strategic level Use-Case Narrative and Diagram = business level Logical Data Model = information level Web Application Diagram = systems/services level Network Connectivity Diagram = infrastructure level

As used in chapter 8, what does EACR stand for?

Enterprise Architecture Change Request

The author recommends placing the repository on-line, available to the anyone via the company's public website.

False

Match the agile value with the non-agile value it supersedes:

Individuals and Interactions = processes and tools Working Software = comprehensive documentation Customer Collaboration = contract negotiation Responding to Change = following a plan

The approach to the design of the example EA repository is based on the work of:

John Zachman

AJAX works with

Microsoft Edge Opera Firefox Chrome *All of the above(literal answer)

Rows of The Living Enterprise EA Repository represent: (select all that apply)

Mid Level View High Level View Detailed View

Which organization is responsible for NICE?

NIST

What does the NICE acronym stand for?

National Initiative for Cybersecurity Education

Which of the following is an object used for AJAX communication?

XMLHttpRequest

According to Fowler, which of the following are important benefits of using a layered architecture? (select all that apply)

You can understand a single layer without knowing much about the others. You can substitute layers with alternative implementations of the same basic services. Layers make good places for standardization. Once you have a layer built, you can use it for many higher-level services.

If two team members disagree about an estimate, which of the following can help find a compromise?

discussing assumptions

Which is the best tag to use to display AJAX results?

division div

A good EA should always demand 100% foolproof security.

false

According to Dr. Brooks, someday we will discover a "silver bullet" that will enable to software to progress as fast has hardware

false

According to Fowler, Enterprise Architecture and Enterprise Application Architecture are the same thing.

false

According to Steve McConnell, if you want to be a superior programmer, intelligence is more important than character.

false

CSS is critical to the operation of AJAX.

false

Enterprise applications rarely need to interface with other systems (i.e., they are usually stand-alone systems).

false

In the Wideband Delphi process, the project manager would make a good moderator.

false

Project success is generally ensured when the project manager is the sole source of estimates.

false

The role of the Architect in software development is clear and unambiguous.

false

Which VCS conceptualizes its data as a stream of snapshots?

git

If you want to get a copy of the code from an existing Git project, which command should you use first?

git clone

Ideally, the Security and Privacy Program should be managed by the:

information systems security manager (ISSM)

Which is longer in duration?

program

Which is the best way to accelerate your CS/IT/IS career?

read


Set pelajaran terkait

Supplemental Nutrition Assistance Program (SNAP)

View Set

1.1.1. Explain the importance of water as a solvent in transport, including its dipole nature.

View Set

AP Gov. Unit 4-College Board and Khan Academy

View Set

vocab workshop level h unit 2 synonyms and antonyms

View Set

Introduction to Linux - Chapter 17

View Set

NUR 3320 Exam 2: Review Questions

View Set