CSC151 Exam II
30 (SKIP)
(SKIP)
List of four phases in the problem-solving process
1. Understand the problem 2. Get an idea of how the algorithm will solve that problem 3. Formulate algorithm and represented as a program 4. Evaluate the program for accuracy
Which of the following appears to be the most functionally cohesive?
A module that only records deposits to checking accounts
The 4 layers of software for controlling communication on The Internet:
Application, transport, network, link
Languages that use mnemonics instead of machine language to represent a program
Assembly
______ testing to see if the software system meets the requirements identified during the original analysis.
Black box
_______ testing to see if the system performs in a timely manner
Black box
_____ is compatible with wireless.
CSMA/CA (True)
_________ dictates that each message be broadcast to all the machines on the bus, keeping only those address to itself.
CSMA/CD; (TRUE)
A collection of connected computers in a single building or building complex
LAN
An assertion at a point in a loop that is true every time that point in the loop is reached
Loop invariant
A network of computers that is intermediate in size often spending a local community
MAN
___________ are made up of linked computers connected for the purpose of transferring data from machine to machine.
Networks
An instance of the class
Object
A network whose internal operation is based on designs that are in the public domain
Open
Which of the following is NOT a legal technique for protecting the property rights of a software developer?— ____ (copyright law, software license, and software patent are legal techniques to protect the property rights of a software developer)
Open-source software
Information to be sent over the Internet is broken down into more manageable sized components called ___________. Each is numbered and contains information for making sure it reaches its destination.
Packet
The following statement represents... Errors in a software system tend to be concentrated in relatively small areas.
Pareto principle
A technique of obtaining information by simply asking for it. It is a play on words and is often carried out through email
Phishing
Conditions that must be satisfied at the end of the program
Postconditions
A software unit that acts as an intermediary between a client and a server with a goal of shielding the client from adverse actions of the server
Proxy Server
______ is a notational system in which ideas can be expressed informally during the algorithm development process.
Pseudocode
Functions are program units that are similar to procedures except that a value is transferred back to the calling program unit as "the value of the function."
TRUE
The unique address that contains the information needed buy a browser to contact the proper server and request the desired document
URL
______ is where the Internet infrastructure is used to provide voice communication similar to that of traditional telephone system.
Voice Over Internet Protocol (voip)
A network of computers that spans a great distance, perhaps in neighboring communities are on opposite sides of the world
WAN
Which the following software engineering methodologies is the most rigid
Waterfall model
A program written by Tim Berners-Lee based on hypertext and hypermedia
World Wide Web
A translator that converts a single instruction from a high-level language to machine language and executes it before converting the next instruction
interpreter
An _____ is an ordered set of unambiguous, executable steps that defines a terminating process.
algorithm
The use of design patterns in software engineering was adopted from what other field
architecture
A common data structure that is a block of elements of the same type as a one dimensional list, a two dimensional tables with rows and columns, or tables with higher dimensions
array
Examples of primitive datatypes: integer, Boolean, character, float,,, NOT string Programs that convert the mnemonic expressions into machine language expressions
assemblers
All of the following are ________________: IMAP, MIME, POP3, SMTP (NOT SNAP)
associated with email
All of the following are _____________: UDP, IP, TCP (NOT ODP)
associated with the Internet
A technique used to make sure that a person is who he/she says he/she is
authentication
Which of the following is a form of glass box testing
basis path testing
A device that looks at the destination address that accompanies each message and forward a message across the connection only when that message is destined for a computer on the other side
bridge
A package containing a party's name and that party's public key
certificate
A blueprint of an object
class
A network whose internal operation is based on designs that are owned and controlled by a particular entity such as an individual or a corporation
closed
A translator that converts an entire source program into an object (executable) program
compiler
Special methods defined within a class that are executed automatically when an object is constructed from the class
constructors???
The paradigm that asks a programmer to describe the problem to be solved rather than an algorithm to be followed
declarative paradigm
A process of overloading a computer with messages
denial of service (DoS)
If a class diagram indicates a one-to-one relationship between class X and class Y, then
each object of type X will be associated with only one object of type Y.
A primary prevention technique to filter traffic passing through a point in the network
firewall
Which of the following is a stronger form of cohesion
functional cohesion
The paradigm in which a program is viewed as an entity that accepts inputs and produces output
functional paradigm
Variables whose scopes are not restricted to a particular part of a program are called ____ variables
global
Descriptive names used to refer to memory locations. Examples are Price, ShippingCharge, and TotalCost
identifiers
Paradigm that describes the programming process to be the development of a sequence of commands that, when followed, manipulate data to produce the desired result
imperative or procedural paradigm
What is the state of software development in which the following is performed. Programming is conducted
implementation
a _____ is a repetitive structure in which a collection of statements is executed in a repetitive fashion under the direction of some control process.
loop
Another name for a procedure in the object oriented paradigm
method
An encryption scheme that involves the swapping of a common key that is widely available to many people who need to send a message to the person. That person also has a unique key that is secret and not shared. It uses that key to decrypt the messages sent by the senders.
public key encryption
A circular form of repetition in which each stage of a problem is executed as a sub task of the precious stage. (previous?) A method or function calls itself
recursion
A device that simply passes signals back-and-forth between the two original buses usually with amplification and without consideration of the meaning of the signals
repeater
Keywords that have special meaning in a program and cannot be used by the programmer for other purposes within the program
reserved words
Special purpose computers used for forwarding messages
router
The search algorithm that looks for a target by looking at the first item in the list and then repetitively looking at other items in the list until the item is found or there is nowhere else to look
sequential search
Masquerading as a party other than one's self
spoofing
A technique of solving a problem by not attempting to conquer the entire problem at once, but by viewing the problem at hand in terms of several sub problems
step-wise refinement
Which of the following is a way of testing the design of a software program
structured walkthrough
Which of the following is most likely an example of a one-to-one relationship
student ID and student
A bridge with multiple connections allowing it to connect several buses rather than just two
switch
A protocol system that was established to allow computer users to access computers from greater distances and create a terminal session. It requires the user to follow the login process of the computer
telenet
The Pareto principle is traditionally applied during which phase of software development
testing
Which of the following is NOT represented in a class diagram
the number of class instances
Copyright laws were established
to allow authors to distribute their work while maintaining certain ownership rights
A general category of programs that convert programs expresses in high-level primitives into machine language programs
translator
A ___ is software that infects a computer by inserting itself into programs that already reside in the machine.
virus
Which of the following is the oldest approach to software development
waterfall model
A _____ is an autonomous program that transfers itself through a network, taking up residence in computers and forwarding copies of itself to other computers.
worm
The portion of the program in which a variable can be referenced is called the scope of the program
True
Servers that provide an address translation services to clients
Domain Name System
Actual parameters informal parameters are two names for the same thing
FALSE
A passageway between a network and the outside network
Gateway
_____________ designing test data to ensure that each instruction is executed at least once
Glass box
The language used to develop webpages
HTML (hypertext markup language)
________ is a nonprofit corporation established to coordinate the Internet's operation.
ICANN
The protocol of the World Wide Web. It is used to transfer hypertext documents between browsers and Web servers __________
IETF (Internet engineering task force)
Which of the following is a notational system for representing object-oriented designs
UML diagrams
Natural languages are the languages that humans use and formal languages are languages such as programming languages
True
Which of the following is NOT related to the others?
Class diagram
_______________ is where huge pools of shared computers on the network can be allocated for use by clients as needed. It is the latest trend in distributed systems.
Cloud computing
____ is ensuring that a module performed a unique task in its entirety
Cohesion
____________ is the Interaction between modules
Cohesion
A statement that alters the execution sequence of the program
Control statement
__________ is passing data from one model to another
Coupling
Which of the following is the method proposed by UML for representing sequences of communication between objects?
Sequence diagram
Unwanted junk mail
Spam
A _______ is a program that enters a computer system disguised as a desirable program that is willingly imported by the victim.
Trojan Horse
An instance of a class
object
A Paradigm in which software is viewed as a collection of units each of which can be capable of performing the actions that are immediately related to itself as well as requesting actions of other objects
object oriented paradigm
Conditions that must be satisfied at the beginning of a programs execution
preconditions
A ____ is a single building block from a well-defined set of building blocks from which algorithm representations can be can constructed.
primitive
A set of instructions for performing a task it can be used as an abstract tool by other program units
procedure
A collection of primitives along with a collection of rules stating how the primitives can be combined to represent more complex ideas constitutes a
programming language