Chapter 1 -2

Ace your homework & exams now with Quizwiz!

For systems with a long life, M____ costs may be several times software development costs.

Maintenance

Legacy software must often be adapted in order to M_____ the needs of new computing environments or technology.

Meet

Since well written cloud applications might do more of the processing on the cloud server, the cloud computing device might require less processing power and M_____

Memory

Computer M____ is the professional and ethical responsibility associated with not using your technical skills to plant viruses or sabotage systems.

Misuse.

A mobile web application allows a mobile device to gain access to web-based content via a browser that has been specifically designed to accommodate the strengths and weaknesses of the M____ platform.

Mobile

According to the slides, M____ is software that has been specifically designed to reside on mobile platform.

Mobile Apps

M_____ Law says that processor memory/speed D_______ every two years.

Moore's, Doubles

Software deteriorates rather than wears out because____

Multiple change requests introduce errors in competent interactions.

____ is software that uses the Web as a computing engine.

Net Sourcing

____ is software that involves "free" source code open to the computing community.

Open Source

The following represents the ___ myth: If I decide to outsource the project to a third party, I can just relax and let the firm build it.

Outsourcing Myth

According to the slides, the negative things, often associated with legacy software include:

Poor Quality, Inextensible Designs, Convoluted Code, Poor or non-existent documentation.

A Software P______ model is a simplified Representation of a software process, presented from a specific perspective.

Process.

Since well written cloud application might do more of the processing on the cloud server, the cloud computing device might require less P___ P____ and memory.

Processing Power

A P____ L_____ software is a set of software-intensive systems that share a common, managed set of features satisfying the specific needs of a particular market segment or mission and that are developed from a common set of core assets in a prescribed way.

Product Line

____ is software that is designed to provide specific capability for use by many different customers; examples would include spreadsheets, computer graphics, business financial applications, word processing, etc.

Product-Line Software

According to the slides, Lower-CASE Tools support these later process activities as P_____, D____, and T_____.

Programming, Testing, Debugging.

The following represents the ___ myth: Project requirements continually change, but change can be easily accommodated because our software is flexible.

Project Change Myth

The following represents the ___ myth: Until I get the program running, I have no way of assessing it's quality.

Quality Assurance Myth

The following represents the ___ myth: A general statement about objectives is sufficient to begin writing programs; we can fill in the details later.

Requirements Myth

According to the slides, Upper-CASE Tools support these early process activities (R or S)____ and D____

Requirements, Design

In cloud computing, computing devices reside outside the cloud will have access to a variety of R___ within the Cloud.

Resources.

According to the slides, the cloud computing device can be more a T____ client.

Thin

{T/F} According to the slides, the distinction between a mobile app and a web app will blur.

True

U____ is the attribute of good software associated with the software's usage by the users for which it was designed.

Usability.

V____ is the generic software process activity associated with checking that the software is what the customer wants.

Validation

According to the slides, the mobile applications user interface takes advantage of interoperability with W____ based resources, such as a browser.

Web

______ is software that spans a wide variety of applications that can incorporate hypertext files, e-commerce and database processing.

Web Apps (WebRef)

According to the textbook, there are four broad categories of software are "Evolving to dominate the industry". They are:

WebApps, Mobile Apps, Cloud Computing, and Product Line Software.

According to the slides, Dr. Hicks heard a software engineer say that over ____% of software projects never used.

40

During the past 30 years, software productivity has improved an average of ____% per year.

6

According to the slides over ____ percent of all software projects finish late.

90

______ is software that makes use of non-numerical algorithms to solve complex problems that are not amendable to computation or straightforward analysis; applications might include robotics, expert system, pattern recognition, neural networks, game playing, etc.

AI Software

The cloud architecture can be segmented to provide access at a variety of different A____ levels from full public access to private cloud architectures accessible only to those with authorization.

Access

Legacy software must be Re-A______ to make it viable within a network environment.

Adapted

____ are stand-alone programs that solve a specific business need; examples might include an airline reservations system, a point of sales transaction processing, or a real-time manufacturing application.

Application Software

ACM is an acronym for ____.

Association for Computing Machinery

B____ software is software developed for a single customer according to their specification.

Bespoke

C___ C____ encompasses an infrastructure or "eco-system" that enables any user, anywhere, to use a computing device to share computing resources on a broad scale.

Cloud Computing

Com_____ is the professional and ethical responsibility associated with making sure that those jobs you accept are within your levels of understanding and knowledge.

Competence.

Co____ misuse is the professional and ethical responsibility associated with not using your technical skills to plant viruses or sabotage systems.

Computer

_____ {Computer science/Software Engineering} is concerned with theory and fundamentals

Computer Science

CASE is an acronym for _________.

Computer-Aided-Software-Engineering.

Con_____ is the professional and ethical responsibility associated with not sharing a companies information with others [with or without a written agreement].

Confidentiality.

It is the ___ Law that says as an e-type system evolves all associated with it, developers, sales personnel, users, for example, must maintain mastery of its content and behavior to achieve satisfactory evolution.

Conservation of Familiarity.

It is the ____ law that says the average effective global activity rate is an evolving e-type system is invariant/constant over product lifetime.

Conservation of Organizational Stability

It is the ___ Law that says e-type systems must be continually adapted else they become progressively less satisfactory

Continuing Change

Is the ____ Law that says "the functional content of E-Type systems must be continually increased to maintain user satisfaction over their lifetime."

Continuing Growth

____ are techniques that navigate through databases in an attempt to extract business-level information; these databases may indeed span different database formats and implementations.

Data Mining

Software is D___ S____ that enable the programs to adequately manipulate information

Data structures

Today WebApps have evolved into sophisticated computing tools that not only provide stand-alone function to the end user, but also ave been integrated with corportate D___ and B_____ applications.

Databases, Business.

According to the slides, the cloud provides access to data that resides with D___ and other data structures.

Databases.

It is the ____ law that says the quality of e-type systems will appear to be declining unless they are rigorously maintained and adapted to operational environment changes.

Declining Quality

The following represents the ___ myth: the only deliverable work product for a successful project is the working program.

Deliverable Myth

D____ is the attribute of good software associated with the software's trustworthiness.

Dependability..

As time passed, the augmentation of HTML by D___ tools enabled Web engineers to provide computing capability along with informational consent.

Development

D____ is the generic software process activity associated production of the software system

Development

According to the slides, approximately 60% of the costs associated with Software Engineering are associated with ____

Development.

The following represents the ___ myth: Software Engineering will make us create voluminous and unnecessary documentation and will invariantly/constantly slow us down

Documentation Myth

E___ is the attribute of good software associated with the software's usage of system resources.

Efficiency

_____ is software that resides within a product or system which can be used to implement and control features and functions that are to be available to the end user.

Embedded Software

__________ is software that uses number crunching algorithms used to solve problems such as stress analysis, molecular biology, simulation, CAD, etc.

Engineering/Scientific Software.

E_____ is the generic software process activity associated with changing the software in response to changing demands

Evolution

Since cloud computing devices can access Ex____ applications on cloud servers that actual full-blown applications do not have to reside on the computing device.

Executable

{T/F} The costs of Hardware on a PC are often greater than the software costs.

False

{T/F} Web servers may not exists within the cloud.

False

{T/F} Change cannot be easily accommodated in most software systems unless the system was designed with change in mind.

False.

Is the ____ Law that says e-type evolution processes constitute multi-level, multi-loop, multi-agent feedback systems and must be treated as such to achieve significant improvement over any reasonable base.

Feedback system

According to the slides, a recent survey indicates that ___ out of 5 developers use some open source software

Four

M____ is the attribute of good software associated with the software's ability to evolve and meet changing needs.

Maintainability.

G____ software is software developed to be sold to a range of different customers

Generic

According to the textbook, a mobile app can gain direct access to the H____ characteristics of the device and then provide the local processing and storage capabilities noted earlier.

Hardware.

Software engineers must behave in an H___ and E____ way if they are to be respected as professionals.

Honest, Ethical

What is the Mongolian Hoard Myth?

If we get behind schedule, we can add more programmers and catch up.

Legacy software must often be enhanced in order to Im______ new business requirements

Implement

It is the ___ Law that says as an e-type system evolves its complexity increases unless work is done to maintain or reduce it.

Increasing Complexity.

Software is I____ that when executed provide desired features, function, and performance

Information

IEEE is an acronym for ____

Institute Electrical and Electronics Engineers.

The software crisis is that software is delivered La___, over Bu_____, and with residual Fa_____.

Late, Budget, Faults

According to the textbook, Dr. K. Liu says that: many legacy systems remain supportive to core business functions and are indispensable to the business. Hence, legacy software is characterized by L____ and B____ critically.

Longevity, Business.

List the four attributes of good software as found in the slides.

Maintainability, Dependability, Efficiency, Usability.

It is the ___ Law that say the e-type system evolution process is self-regulating with distribution of product and process measures close to normal.

Self Regulation

Computer So______ is the product that software professionals build and then support over the long term

Software

Computer s______ is important because it effects nearly every aspect of our lives.

Software

S______ Engineering is concerned with designing, implementing, testing, and delivering software applications.

Software

S_____ E_______ are the folks that build and support computer software

Software Engineers

______ {Computer Science/Software Engineering} is an engineering discipline which is concerned with all aspects of software production.

Software engineering

According to the slides software engineering is concerned with T____, M____, and T____ for professional software development.

Theories, Methods, Tools.

Sp____ is the generic software process activity associated with what the system should do and its development constraints.

Specification

According to the slides, the four generic software process activities are:

Specification, Development, Validation, Evolution.

Who said: What a computer is to me is the most remarkable tool that we have ever come up with. It's the equivalent of a bicycle for our minds.

Steve Jobs

According to the slides, the mobile applications user interface takes advantage of persistent St_____ capabilities within the platform.

Storage.

S__ Engineering is concerned with all aspects of computer-based systems development including hardware, software, and process engineering.

System

Approximately 40% of the costs associated with Software Engineering are associated with ____

Testing codes.

In the early days of the WWW, websites consisted of little more than a set of linked hypertext files that presented information using Te_____ and limited Gr_____.

Text, Graphics.

The following represents the ___ myth: If we get behind schedule, we can add more programmers and catch up?

The Mongolian Hoard Myth

Software analysis & design often begins with the large/general picture and continually focuses in on the sp___________.

specifications


Related study sets

Chapter 22 Quiz: trading securities

View Set

Cellular Regulation Terms & Questions

View Set

Chapter 1: Ionzing Radiation and Basic Principles of X-Rays Generation

View Set

HESI Comprehensive Exit Exam 1 (And Rationale)

View Set

combo wine 4 (tasting/pairing focused)

View Set

Mgmt Digital Forensics/eDisc - Chapter 15

View Set