CSE 316 - Final Exam Review

Ace your homework & exams now with Quizwiz!

11.Which of the following allows you to push your changes to a git repository? Assume that you are the sole developer of the repo a. git push origin master b. git fetch master c. git pull d. git add .

A

16.Given the following code, what is the output?: var ANIMAL_TYPES = { MONKEY: "MONKEY", LION: "LION", ZEBRA: "ZEBRA"}; var animals = []; animals[ANIMAL_TYPES.MONKEY] = "orangutan"; animals[ANIMAL_TYPES.LION] = "mountain lion"; console.log("There are " + animals.length + " animals, "); console.log("One animal is a " + animal[ANIMAL_TYPES.LION]); a. There are 0 animals, One animal is a mountain lion b. There are 2 animals, One animal is null c. There are 0 animals, One animal is null d.d. There are 2 animals, One animal is a mountain lion

A

19.Which css property controls the text size? a.font-size b.text-size c.font-style d.text-style

A

24.What does the "O" in JSON stand for? a.Object b.Oriented c.Open Source d.Output e.Operating

A

3.What type of data structure is used to represent the DOM? a.Tree b.Stack c.Queue d.Linked List e.Heap

A

5.__________ refers to monitoring and updating deployed software a.Maintenance b.Support c.Unit Testing d.Debugging

A

6.____________ -> Design -> Evaluate Design -> Code -> Test, Debug, & Profile Components -> Integrate -> Test, Debug, & Profile Whole -> Deploy -> Maintain a.Requirements Analysis b.Poll Stakeholders c.Hire Developers d.Brainstorm Ideas

A

9.True or False: React is a JavaScript library a. True b. False

A

A class that has too many unrelated obligations, increasing its complexity and heft could be described using which anti-pattern? A.Blob B.Galaxy Code C.Functional Decomposition D.Cut and paste programming E.Spaghetti code F.Narrow Interface

A

In HW 3, what React feature let us share global data with components without having to explicitly pass them as props? A) Context B) Express C) HooksD) Mongoose E) Sequelize

A

In lecture we said that Relational Tables are to NoSQL ______ as Relational rows are to NoSQL ______? A) Collections, Documents D) Collections, Schemas B) Documents, Collections E) Documents, FieldsC) Schemas, Collections

A

In lecture we said that when employing a Relational Database, one would use the Structured Query Language (SQL) to CRUD data. SQL's JOIN command performs what relational math operation, which you would have seen in a Discrete Mathematics course like CSE 215?A) Cartesian Product B) Cross Product C) Dot Product D) InductionE) Quaternion

A

Local variables are stored inside what segment of memory? a.Call Stack b.Global c.Heap d.Text e.All of the above

A

The Prototype Design pattern is employed in the Java language through the use of what method? a.clone b.equals c.hashCode d.iterator e.toString

A

The Software Development LifeCycle is drawn below. Which step may involve writing the SRS? a.1 b.2 c.3 d.4 e.8

A

The jsTPS_Transaction interface uses which of the following design pattern? a.Strategy b.Factory c.Adapter d.Observer e.Singleton

A

What does the following code output: console.log([..."Saransh"]) a.["S", "a", "r", "a", "n", "s", "h"] b.["Saransh"] c."Saransh" d.[..."Saransh"]

A

What does the following diagram represent? (Diagram of A with a diamond arrow to B) a.A has a B b.B has an A c.A is a B d.B is an A e.A has a B and B has an A

A

What is a key property that transactions have? a.Atomicity b.Extensibility c.Reliability d.Scalability

A

Which design pattern is commonly employed by Lists? a.Iterator b.Singleton c.Builder d.State e.Senate

A

Which of the following is a Structural Design Pattern? a.Flyweight b.Builder c.Prototype d.Command e.State

A

Which one of the following statements below is true? a.An abstract class may have a constructor. b.An abstract class type may be instantiated. c.An interface may have a constructor d.A variable may have an interface as its actual type e.A variable may have an abstract class as its actual type

A

13.What is a prop in ReactJS? a.They are mutable objects that are passed down from the parent component to the child component b. They are immutable objects that are passed down from the parent component to the child component c.They are mutable objects that determine component rendering and behavior d.They are immutable objects that determine component rendering and behavior

B

18.What term is used to describe this development strategy that a program should prevent the user from even trying to click buttons that are not available by deactivating and updating certain controls? a.Transaction Processing System b.Foolproof design c.Graceful degradation d.Human Computer Adaption e.Robustivity

B

20.What company owns and operates Github? a.Atlassian b.Microsoft c.Mozilla d.Oracle e.Sun Microsystems

B

21.When implementing MVC, what happens when the model's underlying data structure is modified? a.Model notifies controller b.Model notifies view c.Model reloads its data d.All of the above e.None of the above

B

7.Is Javascript Strongly Typed a.Yes b.No

B

In HW 1 we called functions like createElement, createTextNode, and getElementById on what native, global, JavaScript object?A) cssB) document C) jquery D) rootE) window

B

In our hw1, it was specified that your program should prevent the user from even trying to perform illegal operations by enabling/disabling certain controls. What term is used to describe this development strategy? a.BuzzwordJargon b.Foolproof Design c.Graceful Degradation d.Human Computer Adaption e.Robustivity

B

We discussed how developers use a term to describe writing code without testing while you go, but rather, waiting until large pieces are written before performing any testing. What is this term called? a.Blob b.Design to Fail c.Design to Test d.Monster Programming e.Spaghetti Code

B

What JavaScript array method creates and returns a new array where each element in the original array has had some operation performed on each element?A) cloneB) map C) new D) splice E) update

B

What do we call the tree data structure that manages all the content currently in a Web page? a.Binary Search Tree b.DOM c.Heap d.JSON e.Schema

B

What does the V in MVC stand for a.Venmo b.View c.Vector d.Virtual-machine e.Vision

B

What is the correct output from following sql query? Select FIRST_NAME from Worker WHERE WORKER_ID < 3 A.Vishal, Monika B.Monika, Niharika C.Monika, Niharika, Vishal D.Satish, Geetika

B

What term best describes "a description of a problem and its solution that can apply to many similar programming situations" A.Abstraction B.Design Pattern C.Enumeration D.Generics E.Polymorphism

B

When manipulating a div in raw JavaScript, once we get an element, we can set its contents (like specifying child elements) by assigning a String to what variable?A) htmlB) innerHTML C) src D) text E) txt

B

When using JSX, what attribute is used for specifying an element's style class? A) classB) classNameC) classStyle D) styleE) styleClass

B

Which of the following design pattern is used when the process of creating a object is particularly complex? a.Factory b.Builder c.A and B d.None of the above e.Execute order 66

B

Which of the following design pattern was NOT used in HW 1 and 2? a.State b.Singleton c.Template d.Strategy e.Observer

B

Which of the following design principles employs the Observer design pattern? a.DRY b.MVC c.SOLID d.ACID

B

Which of the following is NOT a property of the Singleton design pattern? a.Has a private constructor b.Its class can't be extended c.Don't have to worry about passing objects around d.Don't have to worry about object consistency e.Can be used as a method argument

B

Which of the following is a Creational Design Pattern? a.Flyweight b.Builder c.Facade d.Command e.State

B

Which of the following is not necessarily associated with a Malware attack? a.Trojans b.Brute force c.Worms d.Attaching to useful code e.Ransomware

B

Which segment of memory reserves data for variables initialized with the new keyword? a.Stack b.Heap c.Text d.Global e.BSS

B

Which type of design pattern is specifically concerned about communication between objects? a.Structural b.Behavioral c.Creational d.All of the above e.a & b

B

14.Which one of these JavaScript statements will output false in the console? a. 0 == '' b. 0 == '0' c. 0 === new String("0") d. 0 == new String("0")

C

23.In HW1 we saved the List Data in a file. What was the file extension for the file? a..css b..html c..json d..js e..data

C

Scenario: You have built an application for a client in order for them to integrate it into their system. However, the interface for the client's last vendor is completely different from yours. Since your application is complex as it is, changing your system entirely is not a feasible option. Which of the following design patterns can you use to solve this issue? a.Decorator b.Facade c.Adapter d.Flyweight e.Component Architecture

C

What CSS display type did we use for the layout of sequences of things like ListCards and SongCards? What CSS display type did we use for the layout of sequences of things like ListCards and SongCards? A) absoluteB) fixedC) flex D) gridE) relative

C

What HTML element can be specified with a type of "text" in order to create a text field? A) controlB) divC) input D) modal E) span

C

What are the results of the following expressions? 1: 5 + '3' 2: '5' - 3 A)"53", "2" B) 53, undefined C) "53", 2 D)"8", 2 E) 8, undefined F) 8, 2 G) error, error H) depends on JS version

C

What company owns and maintains React? a.Microsoft b.Google c.Facebook d.Twitter e.Snapchat

C

What does the Global Segment of memory store? a.Program Instructions b.Temporary Variables c.Static Variables d.Text e.Instantiated Variables

C

What is the relationship between our components and React.Component in HW 2? a.Aggregation b.Containment c.Inheritance d.Composition e.No relationship

C

What is the software engineering term used to describe the breaking down of a problem into smaller, more manageable problems, until smaller solutions can easily be solved? a.Breakdown lifecycle b.Data driven design c.Decomposition d.Dependency reduction e.Extreme Programming

C

What things might have been done by our transactions in HW 2? A) call render on componentsB) send props to componentsC) set state variables inside components D) All of the Above E) None of the Above

C

What type of data structure is used to store the DOM? A) Binary TreeB) GraphC) K-ary Tree D) Heap E) Stack

C

What type of diagram would typically be used in building a Requirements Analysis document? a.UML Class Diagram b.UML Sequence Diagram c.UML Use Case Diagram d.All of the above e.None of the above

C

Which SQL query allows for finding all people with the first names "Jane" or "Joe", returning ONLY the ID column in the resulting table? a.SELECT * FROM Student WHERE FIRST_NAME == 'Jane' OR FIRST_NAME == 'Joe' b.GET ID FROM TABLE Student WHERE FIRST_NAME == 'Jane' OR FIRST_NAME == 'Joe' c.SELECT ID FROM Student WHERE FIRST_NAME == 'Jane' OR FIRST_NAME == 'Joe' d.FETCH ID FROM Student WHERE FIRST_NAME == 'Jane' OR FIRST_NAME == 'Joe' e.SELECT ID FROM Student WHERE FIRST_NAME == 'Jane' AND FIRST_NAME == 'Joe'

C

Which of the following is stored in the memory text segment? a.String objects b.Method arguments c.Program instructions d.Dynamic data e.Global static data

C

Which of the following is true regarding "open design" in software security? a.No cubicles b.Keys must be public c.Algorithms for encrypting/decrypting must be public d.It depends on the secrecy of algorithms e.B & D

C

Which of the following tools that we've been using can be described as a "process manager", which we've used to manage our server application, letting us update and reload and restart our server on the fly?A) cmdB) mongoose C) nodemon D) npm E) yarn

C

8.What is the output of the following code? [[]==true, []===true] a.[true, false] b.[true, true] c.[false, true] d.[false, false] e.None of the above

D

Given two parties that wish to communicate, which of the following is true regarding public key encryption? a.There are two keys total, a private key for encryption and a public key for decryption b.There are two keys total, a public key for encryption and a private key for decryption c.There are four keys total, two private keys for encryption and two public keys for decryption, one of each set belonging to one party d.There are four keys total, two public keys for encryption and two private keys for decryption, one of each set belonging to one party e.None of the above

D

How can one wait for an async function to finish? a.Use async await b.Add .then() to the end of the function call c.Specify a callback d.All of the above e.You can't wait for an async function to finish

D

If a parent component is composed in part of <FooChild foo='this.state.abc' />, inside the FooChild class, how might one reference the variable abc?A) <div>{this.state.abc}</div>B) <div>{this.state.foo.abc}</div> C) <div>{this.props.abc}</div>D) <div>{this.props.foo}</div>E) <div>{this.props.foo.abc}</div>

D

If we have a JavaScript HTMLElement variable representing an unordered list in the DOM and we wish to add a list item, what method could call on the list variable to add the list item?A) addB) addChild C) addElement D) appendChild E) push

D

In HW 1, in which class did we keep the playlists as an instance variable and provide methods for manipulating list data in various ways?A) PlaylistB) PlaylisterApp C) PlaylisterController D) PlaylisterModel E) PlaylisterView

D

In a UML class diagram, (Java) protected members are preceded by a.- b.+ c.$ d.# e.~

D

What CSS display type did we use for the big picture layout of our application's top-level container? A) absoluteB) fixedC) flex D) grid E) relative

D

What React Component method is required to return a single JSX element? A) componentDidMountB) constructorC) map D) render E) setState

D

What distinguishes the keywords null and undefined from each other? a.undefined can be used as a placeholder in a variable while null cannot b. undefined is a primitive type while null is not c.undefined is a falsy type while null is not d.undefined is a type in itself while null is an object

D

What does SRS stand for? a.Some real stuff b.Stark really smart c.Specify required software d.Software requirements specification e.Systems software specialization

D

What is the correct order in which the following methods for a React component will be called? a.componentWillMount > componentDidMount > constructor > render b.constructor > render > componentWillMount > componentDidMount > render c.componentWillMount > constructor > render > componentDidMount d.constructor > componentWillMount > render > componentDidMount e.Depends on unknown factors

D

Which of the following is NOT a type of cyber attack? a.Drive-by b.Birthday c.XSS d.Data-choke e.DOS

D

Which of the following is a Behavioral Design Pattern? a.Flyweight b.Builder c.Prototype d.Command e.Factory

D

Which of the following is an example of a relational database? a.Firebase b.MongoDB c.Amazon DynamoDB d.MySQL e.Cassandra

D

10.10. CRUD stands for create data, retrieve data, update data, and ___________________

Delete

1.What is not part of MERN a.Node b.MongoDB c.React d.Express e.Nodemon

E

2.Which of these is not a W3C Standard a.HTML b.Javascript c.CSS d.Ajax e.React

E

22.What term is used to describe how well a program will perform when we increase the size of the number of users or the amount of data processed? a.Extensibility b.Flexibility c.Regression d.Robustness e.Scalability

E

25.The css rule defined below would be applied to which of the following elements? input { ... } a.<input class="input">... b.<input id="input>... c.<input name="input>.. d.Both A and B e.All of the above

E

A JWT is comprised of what? a.Payload and Mantissa b.Header, Signature, and Footer c.Header, Payload, and Footer d.Payload and Signature e.Header, Payload, and Signature f.Header, Payload, Signature, and Footer g.Header, Signature, and Mantissa

E

A modification on which attribute will properly modify the text inside a div in raw JavaScript? a.myDiv.text b.myDiv.src c.myDiv.txt d.myDiv.style.text e.myDiv.innerHTML

E

A program that lacks a sensical structure and is particularly difficult to understand/maintain is an example of what? A.Blob B.Galaxy Code C.Inheritance Galore D.Meatball E.Spaghetti code F.Narrow Interface

E

Given an object instance 'person' with a variable called 'name', what other way could you access person's name field other than person.name? a.name.person b.person[name] c.person -> name d.person.get(name) e.person["name"] f.None of the above

E

In JavaScript, when one declares a variable inside a .js file, outside of any function or class, it makes it accessible to all via what variable?A) docB) element C) global D) view E) window

E

We have been using arrow functions to ensure that "this" refers to a particular object instance that the function was called on. This is an example of: a.Event Masking b.Pairing c.Function application d.Runtime Polymorphism e.Binding

E

What design pattern works by dynamically changing the representation of an object as needed? A.Command B.Iterator C.Observer D.Singleton E.State

E

What is a property that progressive web applications must have? a.Installable (for mobile) b.Served via HTTPS c.Browser Independence d.None of the above e.All of the above

E

Which of the following allows you to create things without the need to know the type/class of what you are creating? a.McKillaGorilla b.Component Architecture c.Decorator d.Singleton e.Factory

E

Which of the following classes from the Java API uses Iterator? a.WebService b.Transform c.InlineView d.Dialog e.Vector

E

Which of the following design patterns implements an algorithm? a.Factory b.Iterator c.Singleton d.State e.Strategy

E

Which of the following is NOT necessarily needed for good modular design? a.Explicit connections between modules b.Proper use of abstraction c.Independent implementation of modules d.Use of narrow interfaces e.Algorithm efficiency

E

Which of the following is a way in which temporary data can get its values? a.Retrieval from database b.Input streams c.The computer's system d.Program calculations e.All of the above

E

Which of the following is not one of the "8 principles of web security"? a.Confidentiality b.Non-repudiation c.Authentication d.Message Integrity e.Threat models

E

Which of the following is true about DoS and DDoS attacks? a.They often don't provide a direct benefit to the attacker b.They inject code into vulnerable targets c.They overwhelm a system's resources d.A & B e.A & C f.B & C g.A, B, & C

E

Which of the following is true about AJAX? a.It is a programming language b.It allows for asynchronous data retrieval c.It is a set of web development techniques using multiple technologies d.It opens a two-way connection between client and server e.B & D f.A & D g.B & C

G

How can you run JavaScript Inside an HTML File?

script tag


Related study sets

Mastering Biology Chapter 6 quiz

View Set

Patho Unit 3 PrepU with Explanations Chapter 27

View Set

Lesson 6 Passive Optical Networks

View Set

Microeconomics True/false Final Exam

View Set

Statistical Terms/Databases and Data Sets- 1

View Set

Ethics ch.7, 8, and 9 Homework Questions

View Set