Software Engineering Final Exam (T/F, MC, FITB)
In PHP, every variable name starts with ____________, on both declaration and usage.
$
Match the responsibilities and concepts in domain model of "Safe Home Access Control" case study. 1. Coordinate actions of all concepts associated with a use case, a logical grouping of use cases, or the entire system and delegate the work to other concepts. 2. Operate the alarm bell to signal possible break-ins. 3. Verify whether or not the key-code entered by the user is valid. 4. Operate the lock device to armed/disarmed positions. All Answer Choices A. Controller B. KeyChecker C. AlarmOperator D. LockOperator
1 - A. Controller 2 - C. AlarmOperator 3 - B. KeyChecker 4 - D. LockOperator
Match the symbol and logic 1. ^ 2. ¬ 3. v 4. ∀ All Answer Choices A. not B. or C. for any D. and
1 - D. and 2 - A. not 3 - B. or 4 - C. for any
In stock trade case study, match context and type of domain it is in 1. investment portfolio 2. software-to-be 3. bank All Answer Choices A. machine domain B. Given domain C. Design domain
1. - C. Design domain 2 - A. machine domain 3 - B. Given domain
Match the following concepts in Home Access Model. 1. Notifier 2. DatabaseConnection 3. Archiver 4. SearchRequest All Answer Choices: A. entity B. boundary
1. Notifier - B. boundary 2. DatabaseConnection - B. boundary 3. Archiver - A. entity 4. SearchRequest - B. boundary
Order the waterfall process: Implementation, Requirement, Testing, Design, Deployment and maintenance
1. Requirement 2. Design 3. implementation 4. Testing 5. Deployment and maintenance
Match the attributes with the concepts: 1. timeStamp 2. numberOfAttepmts 3. deviceStatus 4. maxNumOfAttempts Answer choices: a. Key b. Controller c. LightOperator
1. timeStamp - A. Key 2. numberOfAttepmts - C. LightOperator 3. deviceStatus - B. Controller 4. maxNumOfAttempts - C. LightOperator
If I want to create a database table named Students. Write the first three words in SQL command to do so. ________________________
CREATE TABLE Students
(T/F) A state is a relation among individual entities and values, which cannot change over time.
False
(T/F) A useful strategy for building a domain model is to start with the internal concepts (Step 1), and then identify their interact directly with the actors (Step 2).
False
(T/F) An actor associate with a person.
False
(T/F) Analysis dealt with how the elements of the system work and interact while design determines what is needed for our system.
False
(T/F) High Cohesion Principle helps to reduce the number of associations among the objects.
False
(T/F) If you observe that some classes have considerably greater number of operations than others, you should think this is not abnormal.
False
(T/F) In practice, if we design well, each test case we run will successful expose some faults.
False
(T/F) In use case analysis, we consider the system as a "transparent box' while in domain modeling, we consider the system as a "black box"
False
Match the following for a detailed use case "Lock" 1. precondition 2. postcondition 3. primary actor 4. secondary actor All Answer Choices A. The door is closed and lock armed & the auto-lock timer is reset. B. The system always displays the menu of available functions. C. Any of Landlord, Tenant, or Timer D. LockDevice, LightSwitch, Timer
Precondition - B. The system always displays the menu of available functions. Postcondition - A. The door is closed and lock armed & the auto-lock timer is reset. Primary Actor - C. Any of Landlord, Tenant, or Timer Secondary actor - D. LockDevice, LightSwitch, Timer
(T/F) "Software shall be written for people first" is a law of software engineer, according to Dr. Ivan Marsic.
True
(T/F) "To see if some parts already exist and can be reused" is one of the reasons to decompose the system.
True
(T/F) A test is a finite collection of test cases.
True
(T/F) All the concepts from domain model should be able to trace to class diagram.
True
(T/F) An actor can be a primary actor or secondary actor, depending on the use cases.
True
(T/F) An object hides its states (attributes). The attributes are accessible only through the object's interface.
True
(T/F) Assume that LightController is a child class of HouseholdDeviceController, Then the LightController inherit all public methods in HoursholdDeviceController class, except constructors.
True
(T/F) Concept name is always a noun phrase.
True
(T/F) Deterministic phenomena are the causal phenomena for which the occurrence or non- occurrence can be established with certainty.
True
(T/F) HTML is stateless
True
(T/F) If client request a .html file, server just sends that file.
True
(T/F) In PHP, 5 "2 things" results "52 things"
True
(T/F) In case study "Safe Home Access Control", The whole system architectural style is Central Repository.
True
(T/F) In general, considering the system as a set of parts that define state tuples presents a cleaner and more modular approach than a single aggregate state.
True
(T/F) In safe home access case study, If I test the controller class first, I am using Top-Down Integration Testing.
True
(T/F) Layered architectural style is also called tiered software architecture.
True
(T/F) PHP arrays are a mixture of regular arrays in other programming language and hash-maps
True
(T/F) Relational Database is a set of "relations".
True
(T/F) SQL table use atomic types only. No composite types.
True
(T/F) Software engineer must learn the problem domain in order to build a software that meets the customer's requirement.
True
(T/F) The object-oriented approach starts by breaking up the whole program into software objects with specialized roles and creating a division of labor
True
(T/F) The traceability matrix traces the domain concepts to the use cases from which they were derived.
True
(T/F) maxAttemptPeriod may be used to control the abuse use risk in our "Safe Home Access Control" case study
True
What does UML stand for? Answer: _____________
Unified Modeling Language
Which of the following results in false in PHP? a. "0" b. 1 c. 0 d. ""
a. "0" c. 0 d. ""
_______________________ refers to analyzing a running program by probing it with various inputs. It involves choosing test data only from the specification, without looking at the implementation. a. Black Box Testing b. White Box Testing
a. Black Box Testing
Databases use which of the following architectural styles? a. Central Repository b. Pipe-and-Filter c. REST d. MVC
a. Central Repository
With SQL, how can you delete the records where the "FirstName" is "Hong" in the Persons Table? a. DELETE FROM Persons WHERE FirstName = 'Hong' b. DELETE IN Persons WHERE FirstName = 'Hong' c. DELETE ROW FirstName='Hong' FROM Persons d. DELETE FirstName='Hong' FROM Persons
a. DELETE FROM Persons WHERE FirstName = 'Hong'
Which of the following are important design principle at local object level a. Expert Doer Principle b. High Coupling Principle c. High Cohesion Principle d. Less Message Principle
a. Expert Doer Principle c. High Cohesion Principle
FSMs stands for? a. Finite State Machines b. Finite Study Methods c. Finite Search Methods d. Fine Search Methods
a. Finite State Machines
With SQL, how can you insert "Doe" as the "LastName" in the "Persons" table? a. INSERT INTO Persons (LastName) VALUES ('Doe') b. INSERT ('Doe') INTO Persons (LastName) c. INSERT Persons (LastName) VALUES ('Doe') d. INSERT INTO Persons ('Doe') INTO LastName
a. INSERT INTO Persons (LastName) VALUES ('Doe')
With SQL, how do you select all the records from a table named "Persons" where the value of the column "FirstName" starts with an "M"? a. SELECT * FROM Persons WHERE FirstName LIKE 'M%' b. SELECT * FROM Persons WHERE FirstName='M%' c. SELECT * FROM Persons WHERE FirstName LIKE '%M%' d. SELECT * FROM Persons WHERE FirstName='%M%'
a. SELECT * FROM Persons WHERE FirstName LIKE 'M%'
Which of the following are purposes of the traceability matrix of use cases? a. To check all requirements are covered by the use cases b. To check none of the use case introduced without a reason c. To prioritize the work on use case d. To track down teamwork contribution
a. To check all requirements are covered by the use cases b. To check none of the use case introduced without a reason c. To prioritize the work on use case
Which of the following describe the system behavior? a. Use case diagram b. interaction diagram c. domain model d. class diagram
a. Use case diagram b. interaction diagram
What is the relationship between KeyStorage and Key classes in Safe Home Access class diagram? a. aggregation b. is-a c. has-a d. inheritance
a. aggregation
Which of the following responsibility is assigned during the software design? a. communicating b. doing c. knowing
a. communicating
Which of the following focuses on implementing the functional requirements? a. design b. architecture
a. design
What is the relationship between a child class and a parent class? a. is-a b. use-a c. has-a d. creates
a. is-a
In Pipe-and-Filter architecture, which of the following is the connector? a. pipe b. filter c. no such a architectural style d. neither pipe nor filter
a. pipe
In acceptance test for Safe Home Access project, which of the following input data will produce "fail" result? a. valid key of a current tenant on someone else's apartment b. valid key of a just-added tenant on his/ her apartment c. an invalid key on any apartment d. valid key of a current tenant on his/her apartment
a. valid key of a current tenant on someone else's apartment c. an invalid key on any apartment
The schema of a SQL table is the table name and its _________________.
attributes
Which of the following is NOT a proposition? a. Mary got A in her programming class b. Close the door, please. c. 6 is an even number d. Programming is fun
b. Close the door, please.
In "Safe Home Access Control" case study, for use case "Inspect Access History", which of the following will be assign the responsibility for "Rendering the retrieved list"? a. Database b. Controller c. Page Maker d. Database Connection
b. Controller
Which of the follows are states of a DVD player's subsystems such as PowerButton, DiscTray, and PlayButton? a. Playing b. Empty c. NotPowered d. Off
b. Empty d. Off
In his example, the author implemented the KeyStorage class as a ___________________ a. HashTable b. List c. HashMap d. Array
b. List
In use case "Inspect Access History" in "Safe Home Access Control" case study, which of the following has no association with concept "PageMaker"? a. DataBaseConnection b. Notifier c. InterfacePage d. Controller
b. Notifier
Which of the following concepts are categorized as a "Worker" in the domain modeling of "Safe Home Access Control"? a. DataBaseConnection b. Notifier c. InterfacePage d. Controller
b. Notifier
Which of the following is an use case in the UML representation of an ATM project? a. Customer b. Withdraw Cash c. Money d. Transaction record
b. Withdraw Cash
Which of the following is NOT a concept in case study "Personal Investment Assistant"? a. last trade b. can be c. ask price d. price quote
b. can be
The thing to be tested is also known as _____________________ a. test stub b. fixture c. test driver
b. fixture
Which of the following functions are used to get or varify a variable type in PHP? a. print b. is_integer() c. gettype () d. is_string ()
b. is_integer() c. gettype () d. is_string ()
Which of the following will be the function body for setter method for attribute lightIntensity? Assume the argument of the method has name intensity? a. intensity = lightIntensity; b. lightIntensity = intensity; c. LightIntensity = intensity; d. this.intensity = intensity;
b. lightIntensity = intensity;
Which of the following is the lowest level in hierarchy of software system scope levels? a. product line b. methods c. packages d. classes
b. methods
When we say that "Software is complex", we mean that: a. software is complicated b. software is composed of many simple parts that related to each other c. software is hard to understand or explain d. none of the above
b. software is composed of many simple parts that related to each other
Suppose that I want to write a software to handle stock trade. Which of the following is an entity? a. stock price b. stock c. posting a stock price quotation
b. stock
Which of the following is NOT a valid transitions between two states of Controller class in "Safe Home Access" case study? a. Locked to Unlocked b. Accepting to Unlocked c. Blocked to Unlocked d. Accepting to Blocked
c. Blocked to Unlocked
Which of the following is NOT a concept in "Home Access Control" case study? a. Design for security b. Design for reuse c. Design for cheap d. Design for change
c. Design for cheap
_____________________ is a black-box testing method that divides the space of all possible inputs into equivalence groups such that the program "behaves the same" on each group. The goal is to reduce the total number of test cases by selecting representative input values from each equivalence group. a. Control Flow Testing b. State-based Testing c. Equivalence Testing d. Boundary Testing
c. Equivalence Testing
The PHP processor has two modes: copy (_________), and interpret (____________) a. PHP, PHP b. HTML, HTML c. HTML, PHP d. PHP, HTML
c. HTML, PHP
In MVC architecture, which part holds all data? a. View b. Controller c. Model
c. Model
In the "Safe Home Access Control" case study, which of the following is NOT an actor? a. Landlord b. Tenant c. Professor d. Device
c. Professor
How can you change "Zeng" into "Zheng" in the "LastName" column in the Persons table? a. UPDATE Persons SET LastName='Zeng' INTO LastName='Zheng' b. MODIFY Persons SET LastName='Zeng' WHERE LastName='Zheng' c. UPDATE Persons SET LastName='Zeng' WHERE LastName='Zheng' d. MODIFY Persons SET LastName='Zeng' INTO LastName='Zheng'
c. UPDATE Persons SET LastName='Zeng' WHERE LastName='Zheng'
In use case "Unlock", (in case study "Safe Home Access Control"), which of the following is the primary actor? The goal for this use case is "To disarm the lock and enter, get space lighted up" a. LockDevice b. LightSwitch c. landlord or tenant d. tenant only e. landlord only
c. landlord or tenant
Regarding to the case study Stock Trade, which of the follows is the event that trigger the transition from state InPreparation to Pending? a. One of the two states doesn't exist b. matched c. submit d. archive
c. submit
In UML notation, which of the following represents the protected visibility of an attribute or method? a. * b. + c. - d. #
d. #
Which of the following is NOT a concept in "Home Access Control" case study? a. Burglar b. Key c. Tenant d. Enters
d. Enters
Which SQL keyword is used to sort the result-set? a. SORT BY b. SORT c. ORDER d. ORDER BY
d. ORDER BY
Which of the following type of communication between Objects sending untargeted messages? a. none of the above b. One-to-one c. via a shared element d. One-to-many
d. One-to-many
What does PHP stand for? a. Personal Hypertext Processor b. Private Home Page c. Personal Home Page d. PHP: Hypertext Preprocessor
d. PHP: Hypertext Preprocessor
The property that the same method behaves differently on different subclasses of the same class is called ___________________ a. Encapsulation b. Inheritance c. Responsibility d. Polymorphism
d. Polymorphism
A popular approach to micro-level design is known as RDD. What RDD stands for? a. Responsibility-detected design b. Relationship-detected design c. Relationship-driven design d. Responsibility-driven design
d. Responsibility-driven design
In case study "Safe Home Access System", which of the following is a subsystem? a. subsystem for device control b. subsystem for administration c. subsystem for remote data access d. all of the above
d. all of the above
Which of the following is used to put PHP code in an HTML file externally? a. # b. <?php?> c. // d. include
d. include
Which of the following characteristics is NOT local to object itself? a. polymorphism b. encapsulation c. inheritance d. responsibility
d. responsibility
A(n) __________ is a relation among individual entities and values, which can change over time a. event b. phenomenon c. relation d. state
d. state
Database management system is a set of software programs that controls the organization, storage and retrieval of ___________ from databases.
data
Software architecture is a set of high-level ____________ that determines the structure of the solution.
decisions
If a user's goal has several subgoals, some of which are optional, we can indicate this information in a use case diagram using the _____________ stereotype.
extend
In object oriented programming, objects communicate each other by sending __________________
messages
Contracts in domain model consist of preconditions and ______________________
postconditions
The divide-and-conquer approach goes under different names: reductionism, modularity, and structuralism. The "object orientation" is along the lines of the _______________ paradigm.
reductionism
Detailed use cases are usually written as usage ___________ or scripts, listing a specific sequence of actions and interactions between the actors and the system.
scenarios
The key purpose of system sequence diagrams (as is the case with use cases) is to represent what information must pass the system boundary and in what _________________.
sequence