CIS 476 7,8,9,10 quizzes
Which of the following are Centralized Version Control Systems?
- perforce - CVS - subversion
Which are the three principal layers that Fowler's book focuses on?
- presentation - domain - data source
Which of the following language features were added to Java SE 7
- string in case/switch - diamond syntax for generics - try with resources - multi-catch exceptions - support for NIO.2
Which of the following should you have before you begin the Wideband Delphi process? (select all that apply)
- vision document - scope document
Enumerate the five steps (in the proper order) involved in the analysis of an ethical dilemma.
1. Identify the facts 2. Identify what the ethical dilemma is 3. Identify the stakeholders. 4. Identify the options you can take to "solve" this ethical dilemma 5. Identify the consequences of the options you have chosen
Which is the best (and most radical) technique for addressing the software problem?
buy instead of build
What makes it impossible to change the contents of any file or directory without Git knowing about it?
checksums
Java EE runtime enviro that provide certain services to the components they host such as life-cycle management, dependency injection, concurrency, etc, are called
containers
Which of the following was only made possible by the rise of the internet?
cyberbullying
The property that you need to associate your callback function with is named:
onreadystatechange
Which planning method is used by eXtreme Programming (XP)?
the planning game
Security is one of the vertical _______ that has an impact at all levels of the EA framework.
threads
According to Dave Thomas: "When faced with two or more alternatives that deliver roughly the same value, take the path that makes future change easier." is how to do something in an agile fashion.
true
At present, no one commercial tool can do all of the things that are needed in the EA program.
true
Dave Thomas has an issue with using "Agile" as a noun.
true
Enterprise architects must deal with "business logic" that is not always logical
true
Java EE is a superset of Java SE
true
Java EE is an umbrella specification that bundles and integrates others
true
Linus Torvalds, the creator of Linux, also created Git.
true
The NICE Framework can be viewed as a non-prescriptive cybersecurity workforce dictionary.
true
The NICE Framework is a resource that will strengthen an organization's ability to communicate consistently and clearly about cybersecurity work and its cybersecurity workforce.
true
The Project Management Plan (PMP) serves as the common documentation source for all phases of the CPIC process.
true
Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later.
true
The author suggests that freezing current and future views of the EA at regular periods. Which was used in his example?
twice a year
Match each item on the left with its Key Element:
Design = information security Awareness Training = personnel SOPs = operations Wiring Closets = physical protection Cable Plants = physical protection Disaster Recovery = operations Procedures Training = personnel Assurance = information security
Which of the following are part of Dave Thomas' advice for doing something in an "agile" fashion?
Find out where you are Take a small step towards your goal Adjust your understanding based on what you learned
What was the decision made as a result of using the EA in the Case Study?
Purchase the WELLCO ERP along with a $1.6M module that replaces SITS
Match terms and definitions
Response time = time to process a request Responsiveness = how quickly the system acknowledges a request Latency = minimum time to get any response Throughput = how much work is done in a given amount of time Scalability = measure of how adding resources affects performance
Match the definition of architecture with its author.
The highest level concept of a system in its environment = IEEE Standard An understanding of the system shared by the expert developers = Ralph Johnson Architecture is the decision that you wish you could get right early in a project = Ralph Johnson Architecture is about the important stuff. Whatever that is = Martin Fowler
Which version control system (VCS) was used by Microsoft and integrated as part of Visual Studio?
Visual SourceSafe (VSS)
Which is the best summary of Dr. Brook's classic paper, no silver bullet?
"The very nature of software makes it unlikely that there will be any inventions that will do for software productivity, reliability, and simplicity what electronics innovations did for computer hardware.
The future view of the EA documents is also called the:
"to-be" view
Classify each of the following according to Dr. Brooks' assessment of inherent software challenges (essential) vs non-inherent (accidental) difficulties
- Complexity (essential) - Expressing ideas in code (accidental) - Changeability of software (essential) - Testing code (accidental) - Invisibility of software (essential)
Companies can use the NICE framework to:
- Inventory and track their cybersecurity workforce - Identify training and qualification requirements - Improve position descriptions and job vacancy announcements - Identify the most relevant work roles - Establish a shared terminology between hiring managers and HR staff
Which of the following are actual Computer Science / Information Science academic publications?
- Programming Considered as a Human Activity - The Psychology of Computer Programming - Exploratory Experiments in Programmer Behavior
Which of the following are true of Wideband Delphi? (select all that apply)
- Requires the entire team to correct one another - Requires the creation of a WBS - Was developed at the Rand Corporation in the 1940s - Involves an estimation team with 3 to 7 members
Which are the "Lead Players" that are the focus of Kemper's Chapter 3?
- SVN - Git - Mercurial
Which of the following are Candidate Ethical Principles?
- The Golden Rule - Universalism - No Free Lunch - The Perfect Information Rule
Which of the following are used to declare metadata that is associated with Java EE entities and or objects
- annotations (using the @feature notation) - deployment descriptors (using XML)
Which are the main file states in Git?
- committed - modified - staged
Which techniques are used to fulfill the mission set forth by NICE?
- education - training - workforce development
Which of the following are Distributed Version Control Systems?
- git - bazaar - mercurial
NICE works with (involving a partnership between) which parties?
- government - academia - the private sector
Which of the following are threats to the security of the enterprise?
- hackers - terrorism - fire - floods - disgruntled employees - unintentional mistakes
AJAX is:
Asynchronous JavaScript And Xml
Match
Concepts of Operations Scenario = strategic level Use-Case Narrative and Diagram = business level Logical Data Model = information level Web Application Diagram = systems/services level Network Connectivity Diagram = infrastructure level
As used in chapter 8, what does EACR stand for?
Enterprise Architecture Change Request
The author recommends placing the repository on-line, available to the anyone via the company's public website.
False
Match the agile value with the non-agile value it supersedes:
Individuals and Interactions = processes and tools Working Software = comprehensive documentation Customer Collaboration = contract negotiation Responding to Change = following a plan
The approach to the design of the example EA repository is based on the work of:
John Zachman
AJAX works with
Microsoft Edge Opera Firefox Chrome *All of the above(literal answer)
Rows of The Living Enterprise EA Repository represent: (select all that apply)
Mid Level View High Level View Detailed View
Which organization is responsible for NICE?
NIST
What does the NICE acronym stand for?
National Initiative for Cybersecurity Education
Which of the following is an object used for AJAX communication?
XMLHttpRequest
According to Fowler, which of the following are important benefits of using a layered architecture? (select all that apply)
You can understand a single layer without knowing much about the others. You can substitute layers with alternative implementations of the same basic services. Layers make good places for standardization. Once you have a layer built, you can use it for many higher-level services.
If two team members disagree about an estimate, which of the following can help find a compromise?
discussing assumptions
Which is the best tag to use to display AJAX results?
division div
A good EA should always demand 100% foolproof security.
false
According to Dr. Brooks, someday we will discover a "silver bullet" that will enable to software to progress as fast has hardware
false
According to Fowler, Enterprise Architecture and Enterprise Application Architecture are the same thing.
false
According to Steve McConnell, if you want to be a superior programmer, intelligence is more important than character.
false
CSS is critical to the operation of AJAX.
false
Enterprise applications rarely need to interface with other systems (i.e., they are usually stand-alone systems).
false
In the Wideband Delphi process, the project manager would make a good moderator.
false
Project success is generally ensured when the project manager is the sole source of estimates.
false
The role of the Architect in software development is clear and unambiguous.
false
Which VCS conceptualizes its data as a stream of snapshots?
git
If you want to get a copy of the code from an existing Git project, which command should you use first?
git clone
Ideally, the Security and Privacy Program should be managed by the:
information systems security manager (ISSM)
Which is longer in duration?
program
Which is the best way to accelerate your CS/IT/IS career?
read