CSI 3060
"Become a Member of the Video Store and Rent Videotape" could be a name for a use case
False
"Become a Member of the Video Store and Rent Videotape" could be a name for a use case.
False
"Verify Credit Card" can never be a name of a use case.
False
A foreign key need to be unique.
False
A good database design divides your information into subject-based tables to increase redundant data.
False
A query language allows a user to specify a task by specifying how the task will be accomplished.
False
A schema is a view of the database used by one or more systems or users.
False
A secondary key is a field or combination of fields that uniquely identifies a particular member of an entity.
False
A system is reliable if it supports business requirements and meets user needs.
False
An application is a static entity.
False
An information system does not need applications to perform a task.
False
Input/Output devices are software that allows real-world users to interact with the virtual world of the information system.
False
Role and actor refer to two different things.
False
The application flow fulfills only functional requirements.
False
The database designer must determine where independency is within the data.
False
The example of "Checkout Groceries" relates to the real system
False
The example of "Checkout Groceries" relates to the real system.
False
The example of "Purchase Groceries" relates to an information system
False
The example of "Purchase Groceries" relates to an information system.
False
The objects don't have a behavior (operations) and/or attributes.
False
The physical model concentrates on the data requirements and the data to be stored independent of physical considerations.
False
The user interface is responsible for translating real-world messages into imaginary ones.
False
Use case modeling cannot be used for gathering requirements.
False
Use cases describe how a system accomplishes
False
Use cases describes how a system accomplishes.
False
Goal decides the relevance of activities in a use case.
True
The cashier interacts with the supermarket's Point-of-Sale system by sending and receiving "messages."
True
The flow of an application is decided by control objects.
True
The goal of the primary actor is specified by the name of the use case
True
The goal of the primary actor is specified by the name of the use case.
True
The most notable boundary object is the user interface.
True
The school system includes entities named STUDENT, COURSE, INSTRUCTOR, and ADVISOR.
True
Usually more than one solution can satisfy the same problem. Therefore, design must select between alternate solutions.
True
A ________ is what the successful completion of a use case achieves. A) system objective B) behavior C) goal D) scenario
C) goal
The messages that are received by the user interface layer and transmitted to the application are classified as ________. A) GUI B) output C) input D) DOS
C) input
A use case's ________ is its goal. It must be active, concise, and decisive. A) location B) address C) name D) actor
C) name
Resource editors are responsible for managing ________, including alternate texts for multilingual applications. A) applications B) operating systems C) non-code building blocks of the software D) databases
C) non-code building blocks of the software
Use cases are not effective in capturing the ________ requirements. A) functional B) business C) non-functional D) system
C) non-functional
A ________ is an ordered sequence of interactions between the actor(s) and the system to accomplish a goal. A) goal B) system C) scenario D) system boundary
C) scenario
Interpreters execute the instructions each and every time the program is run without ________. A) storing the instructions B) running the program C) storing the translation as an executable D) saving the program
C) storing the translation as an executable
Use case modeling is a set of ________ that, when taken together, describe the behavior of a system. A) diagrams B) flows C) use cases D) systems
C) use cases
Good coding standards can make it less likely that bugs ________. A) are reduced B) are completely eliminated C) will creep into the code D) will produce more bugs
C) will creep into the code
CMM:
Capability Maturity Model
A(n) ________ is an application that gathers the necessary modules into a package for installation on a target machine and allows the user to customize the installation. A) builder B) virtual machine C) code editor D) installer
D) installer
The goal of the primary actor is specified by the ________ of the use case. A) scenario B) system C) length D) name
D) name
Component testing is contingent upon a ________. A) monolithic application B) one-component application C) component-based architecture D) none of the above
D) none of the above
A data model is a relational database that is designed for query and analysis rather than for transaction processing.
False
A database is maintained and queried using the data mapping language (DML).
False
A debugger allows you to examine the program from outside.
False
A field might have one or dozens of fields, depending on what information is needed.
False
A record retention policy states your business's process for managing documents from retention to creation or disposal.
False
A successful information system requires training for all users, and managers, but not IT staff members.
False
A use case model consists of only one-use case
False
A use case model consists of only one-use case.
False
After risks are identified and controlled, they must be assessed.
False
Airline reservations is a narrow domain
False
Airline reservations is a narrow domain.
False
Coding depends on user requirements and is completely independent of design.
False
Compilers translate the human-readable code in high-level languages into machine languages and require the programmer to know how the computer works.
False
Control objects can destroy other objects if that is what the application must do.
False
DCL is used to update the database with new records.
False
Database administration involves data design, management, security, access, but not backup.
False
Design is the Path from Concept to Problem.
False
Design takes into account only functional requirements.
False
During the systems analysis phase, a physical model of the system was created.
False
In integration testing the focus is on individual components, while in component testing every component has to be tested again once a new component is integrated into the whole.
False
In the example of "Checkout Groceries," the primary actor is the cashier
False
In the example of "Checkout Groceries," the primary actor is the cashier.
False
In the example of "Purchase Groceries," the primary actor is the cashier.
False
In the real world, absolute security is a realistic goal.
False
Interpreters and compilers both translate the human-readable code in high-level languages into machine languages in the same manner.
False
Once data is entered, the company should store source documents in a safe location for ever.
False
Programming requires a single tool to achieve its goals.
False
RDBMS stands for Related Data Build Management System.
False
Role and actor refer to two different things
False
Sounds are not part of visual interface.
False
Structure diagram describes the interaction between the objects in the system
False
Structure diagram describes the interaction between the objects in the system.
False
System testing is the same as acceptance testing.
False
Testing is the first defense in assuring software quality.
False
The CREATE SCHEMA DDL command is used to create a table.
False
The DELETE TABLE DDL command is used to remove a table from the database.
False
The DROP command deletes rows from a table individually or in groups.
False
The key to database and application tuning is design, not performance.
False
The purpose of the model is to improve software quality, increase development time, and cut costs.
False
The syntax of programming languages is strict and demanding but they don't handle some abstract concepts.
False
Use case modeling cannot be used for gathering requirements
False
6) Use cases are not inherently object-oriented.
True
A DBMS provides an interface between a database and users who need to access the data.
True
A common field is an attribute that appears in more than one entity.
True
A comprehensive test plan should include scenarios for every possible situation the program could encounter.
True
A database table is defined using the data definition language (DDL).
True
A deployment diagram is very similar to class and component diagrams, except that it depicts the relationship between nodes.
True
A deployment diagram models the relationships between software components and computing "nodes" such as servers, workstations, and networks.
True
A domain is a collection of current and future of software applications that share a set of common characteristics.
True
A system is maintainable if it is flexible, scalable, and easily modified.
True
A use case aims to achieve a specific goal by following a set of steps called a scenario
True
A use case aims to achieve a specific goal by following a set of steps called a scenario.
True
A use case describes what a system does as viewed from the outside
True
A use case describes what a system does as viewed from the outside.
True
Activity diagram is a general-purpose diagram for visualizing and verifying a logical flow
True
Activity diagram is a general-purpose diagram for visualizing and verifying a logical flow.
True
Actor is a role that any user who has been given the part can play
True
Actor is a role that any user who has been given the part can play.
True
An actor is an entity outside the system that interacts with the system to achieve a specific goal.
True
Any field that is not a primary key or a candidate key is called a non-key field.
True
Application design starts with identifying the generic components of the solution.
True
Application security involves the identification of system users and consideration of user-related security issues.
True
Attackers break into a system to cause damage, steal information, or gain recognition.
True
Cardinality describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.
True
Component testing is not a replacement for unit testing, but follows a similar tactic and should start when unit testing stops.
True
Components of a use case are tightly integrated and cannot be understood properly without each other.
True
DBMS is software system used to store, retrieve, and run queries on data.
True
Database design involves classifying data and identifying interrelationships.
True
Database includes a fault diagnosability infrastructure for preventing, detecting, diagnosing, and resolving database problems.
True
Database security is creating and enforcing policies and practices of auditing and accountability for inappropriate or unauthorized actions.
True
Design is an evolution from a conceptual solution to a concrete one.
True
Design must produce a builder's view of the system.
True
Domain concepts define behavior and the structure of a domain
True
Domain concepts define behavior and the structure of a domain.
True
Domain expert is a knowledgeable person working in a domain.
True
Every piece of information should be traceable back to the input data that produced it.
True
Goal decides the relevance of activities in a use case
True
If the customer finds all desired items, brings them to the checkout counter, pays for them, and carries them out, then a normal flow has occurred.
True
Implementation transforms the abstract concepts of analysis and the detailed specifications of design into an actual product that people use.
True
In OLTP systems, performance requirements require that historical data be frequently moved to an archive.
True
In a database, we save data into rows and columns into a series of tables.
True
In component testing the focus is on individual components, while in integration testing every component has to be tested again once a new component is integrated into the whole.
True
In databases, null values are not equivalent to zero.
True
In software development, unit is the smallest piece of code that has an identity.
True
In the "Checkout Groceries" system, if an item does not have a label to scan and the cashier asks a sales manager to identify the code, an alternate flow has occurred
True
In the "Checkout Groceries" system, if an item does not have a label to scan and the cashier asks a sales manager to identify the code, an alternate flow has occurred.
True
Normalization is the process of creating table designs by assigning specific fields or attributes to each table in the database.
True
Physical design modeling defines the services that an object must provide, hence, creating a precise scope for coding.
True
SQL is a standard language for database access.
True
Schema is the complete definition of a database, including descriptions of all fields, tables, and relationships.
True
Source code editors have features specifically designed to simplify and speed up the input of source code.
True
The Point-of-Sale system interacts with the bank to validate a credit card.
True
The SQL command used to populate tables is the INSERT command.
True
The behavior of displayers can be dynamic or non-dynamic.
True
The deployment diagram is about how the software is configured in relation to hardware
True
The language must support the concepts that lie at the foundation of the development methodologies.
True
The risk management process is iterative, and it means risks are constantly identified, assessed, and controlled.
True
The system design specification serves as a blueprint for constructing the new system.
True
The user interface must guide users through the steps necessary to accomplish meaningful tasks.
True
Use a case diagram as a visual meta-model.
True
Use case diagram is a visual meta-model
True
Use cases are not inherently object-oriented
True
Use cases are useful for communicating upstream with stakeholders as well as exchanging information downstream with designers and programmers.
True
Vulnerability is a security weakness or soft spot, and an exploit is an attack that takes advantage of vulnerability.
True
Whenever source documents pass between departments, the transfer should be recorded.
True
in the beginning, software development was all about coding, but today coding is a very small and insignificant part of software development.
True
Name the two commonly used encryption techniques.
Private key encryption and public-key encryption.
____ employs a user interface that guides the users, step-by-step, through simple forms or pages.
A wizard
The actor can be a human or other ________ system. A) internal B) future C) past D) external
D) external
In CUSTOMER table the postal code field would be used as a --------------. A) Primary key B) secondary key C) Candidate key D) All of the above
B) secondary key
Testing is a part of ________. A) software measurement B) software quality assurance C) software development D) both B & C
B) software quality assurance
Displayers provide ________ information. A) textual B) textual and pictorial C) pictorial D) input and output
B) textual and pictorial
A(n) ________ is composed of steps that are conditional. A) Alternate flow B) Sub-flow C) Normal flow D) Exception flow
A) Alternate flow
-------------- is a hostile act that targets the system, or the company itself. A) Attack B) Authorization C) Risk D) All of the above
A) Attack
________ classes control the interaction between the system or application and entities outside the system. A) Boundary B) Utility C) Stereotype D) None of the above
A) Boundary
High-quality software cannot result from low-quality code because code is ________. A) the brick and the mortar of a software product B) too easy C) too difficult D) irrelevant
A) the brick and the mortar of a software product
------------------- describes all data elements included in the logical design. A) Data Dictionary B) Table C) Primary key D) Scalability
A) Data Dictionary
----------------- policies and procedures protect data from loss or damage, which is a vital goal in every organization. A) Data security B) Data encryption C) Data decryption D) All of the above
A) Data security
________ is all about creating something new and selecting the best possible solution. A) Design B) Analysis C) Implementation D) A requirement
A) Design
________ objects are those objects that are needed to build the solution. A) Design B) Real C) Multiple D) Concrete
A) Design
________ are those events that prevent certain steps, or the entire use case, from completing successfully. A) Exception flows B) Normal flows C) Sub-flows D) Alternate flows
A) Exception flows
Utility classes are also called ________. A) service classes B) control classes C) boundary classes D) superclasses
A) service classes
Design aims to arrive at the ________ of the system development. A) specifications B) boundaries C) goals D) objectives
A) specifications
Which of the following is NOT a design class? A) standard B) control C) boundary D) utility
A) standard
The choice of the programming language depends on many factors, including ________. A) technology B) personnel C) computers D) routers
A) technology
Design extends modeling from ________. A) concrete to conceptual B) physical to logical C) conceptual to concrete D) radical to mainstream
C) conceptual to concrete
Labels, graphs, and pictures are examples of ________. A) containers B) selectors C) displayers D) editors
C) displayers
Business concepts are discovered during ________. A) behavioral modeling B) decision making C) domain analysis D) requirements gathering
C) domain analysis
A software application is a ________ entity. A) static B) progressive C) dynamic D) controlled
C) dynamic
The main window of a word-processing application is an example of a(n) ________. A) displayer B) visual control C) editor D) container
C) editor
Name and explain the risk control strategies.
- Avoidance eliminates the risk by adding protective safeguards - Mitigation reduces the impact of risk by careful planning and preparation - Transference shifts the risk to another asset or party, such as an insurance company. - Acceptance means that nothing is done. Companies usually accept a risk only when the protection clearly is not worth the expense.
Explain the elements of the system security
- Confidentiality, protects information from unauthorized disclosure and safeguards privacy. - Integrity, prevents unauthorized users from creating, modifying, or deleting information. - Availability, ensures that authorized users have timely and reliable access to necessary information.
Name and explain shortly the three interactive tasks in risk management
- Risk identification analyzes the organization's assets, threats, and vulnerabilities. - Risk assessment measures risk likelihood and impact - Risk control develops safeguards that reduce risks and their impact.
Name the different types of checking
- Unit testing - Component testing - Integration testing - System testing - Acceptance testing Only need to remember 2 or 3
Describe various flows in the narrative of a use case.
1- Normal flow is the best-case scenario that results in the successful completion of the use case. 2- Alternate flow, which is present only if conditional steps are needed. 3- Sub-flows if steps in the normal flow contain sub-steps. 4-Exceptions, which describe what may prevent the completion of one step or the entire use case.
What is a database?
A database is an organized collection of structured information, or data, typically stored electronically in a computer system.
Identify the four components of a use case and tell how they affect each other. Answer:
A use case has four well-defined components: a goal as the successful outcome of the use case; stakeholders whose interests are affected by the outcome, including actor(s) who interact with the system to achieve the goal; a system that provides the required services for the actors; and a step-by-step scenario that guides both the actor(s) and the system toward the finish line.
What does the scalability of a DBMS?
A system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
Explain the following concepts: A) Primary key B) Foreign key C) Candidate key D) Nonkey
A) Primary key: A field or combination of fields that uniquely identifies a particular member of an entity. B) Foreign key: A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables. C) Candidate key: Any field that can serve as a primary key is called a candidate key. D) Nonkey: Any field that is not a primary key or a candidate key is called a nonkey field.
Explain the following concepts: A) Table B) SQL C) Normalization D) Referential Integrity
A) Table: Tables are the basic unit of data storage in an Oracle Database. Data is stored in rows and columns. B) SQL: A programming language used by nearly all relational databases to query, manipulate, and define data, and to provide access control. C) Normalization: The process of creating table designs by assigning specific fields or attributes to each table in the database. D) Referential Integrity: it is for data validity check. A set of rules that avoids data inconsistency and quality problems. It involves applying a set of rules that can help identify and correct inherent problems and complexities in table designs.
Which of the following is NOT an interpreted language? A) UML B) Visual Basic C) all scripting languages D) JavaScript
A) UML
Coding standards are most essential when ________. A) a team is involved in coding, debugging, and maintenance B) individual programmers work on unique programs C) analyst and designer don't get along D) designers don't appreciate programmers
A) a team is involved in coding, debugging, and maintenance
Which of the following is NOT a phase of software testing? A) alpha B) unit C) integration D) acceptance
A) alpha
The user interface is primarily ________ that makes the interaction between two different worlds of human and machine possible. A) an interpreter B) a device C) a use case D) an information system
A) an interpreter
Use case modeling represents the ________ of a system. A) behavior B) condition C) technology D) heart and soul
A) behavior
Finding ________ is part of everyone's expectations from testing. A) bugs B) answers C) solutions D) debuggers
A) bugs
Walkthrough and inspection are two types of ________. A) code review B) coding standards C) debuggers D) installers
A) code review
When developing an information system, design helps the ________ modeling of the solution. A) concrete B) abstract C) conceptual D) behavioral
A) concrete
A use case is a ________ that formalizes the interaction between stakeholders and the system. A) contract B) procedure C) programming language D) system policy
A) contract
Builders ________ required binary modules, and linkers ________ them. A) create, connect B) acquire, separate C) create, separate D) acquire, connect
A) create, connect
In a relational database, referential integrity means that a ----------------- value cannot be entered in one table unless it matches an existing primary key in another table. A) foreign key B) primary key C) secondary key D) candidate key
A) foreign key
The design phase of system development deals with the question of _________ to build the system. A) how B) where C) when D) why
A) how
The process of development starts with gathering requirements and concludes with ________. A) implementation B) analysis C) design D) programming
A) implementation
Activity diagram is a general-purpose diagram for visualizing and verifying a -----------------. A) logical flow B) alternate flow C) Both of the above D) None of the above
A) logical flow
The manner in which the user interface guides users through the flow of the application is called ________. A) navigation B) the layout C) workflow D) a guideline
A) navigation
Assemblers expect the code to have a ________ relationship to the machine language. A) one-to-one B) one-to-many C) many-to-one D) many-to-many
A) one-to-one
Which of the following is NOT a major component of application software? A) operating system B) user interface C) persistence D) entity objects
A) operating system
The messages sent from an application to a user are classified as ________. A) output B) input C) GUI D) DOS
A) output
A use case describes what a system does as viewed from ________ the system. A) outside B) inside C) within D) the bottom of
A) outside
An actor is identified by a unique name which describes a unique ________. A) role B) person C) goal D) scenario
A) role
The primary candidates for becoming actors are domain concepts classified as ________. A) roles B) business rules C) clients D) people
A) roles
A product passes acceptance testing when ________. A) the people who have paid for its development accept it B) the product is accepted without testing C) the machine is acceptable to the user D) the process is acceptable to the client
A) the people who have paid for its development accept it
The only visible component of application software is ________. A) the user interface B) persistence C) a business rule D) utility
A) the user interface
Application design revisit ________ and re-examine them from the viewpoint of design. A) use cases B) utility classes C) activity diagrams D) interface objects
A) use cases
Use cases describe ________ a system accomplishes. A) what B) how C) when D) where
A) what
What is Actor Generalization? Give 2 examples.
Actor Generalization is the abstracting actors into one higher level. The actor that is the outcome of generalization is called an abstract actor. 1. Customer (Private Customer and Corporate Customer) 2. Administrative staff (billing clerk, registration clerk, and appointment clerk)
The analyst must provide an _______ that records the source of each data item and when it entered the system.
Audit trail
--------------- eliminates the risk by adding protective safeguards. A) Mitigation B) Avoidance C) Transference D) Acceptance
B) Avoidance
--------------- is the process of putting the new information system online and retiring the old system. A) Installation B) Changeover C) Training D) All of the above
B) Changeover
-----------------is a territory with shared concepts and rules. A) Analysis B) Domain C) Requirement D) All of the above
B) Domain
The ________ approach enables users to interact with the computer through real-world metaphors. A) user friendly B) Graphical User Interface (GUI) C) real-time D) applet programming
B) Graphical User Interface (GUI)
JDBC enables ------------------- to exchange data with any database that uses SQL statements and is JDBC-compliant. A) Database B) Java applications C) Bothe a the above D) None of the above
B) Java applications
A(n) ________ is the best-case scenario for a use case. A) Alternate flow B) Normal flow C) Sub-flow D) Exception flow
B) Normal flow
A ------------ is a field or combination of fields that uniquely identifies a particular member of an entity. A) Foreign key B) Primary key C) Secondary key D) None of the above
B) Primary key
----------------- means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise. A) Cardinality B) Scalability C) Both of the above D) None of the above
B) Scalability
________ are an example of manipulators. A) Icons B) Scroll bars C) Menus D) Buttons
B) Scroll bars
________ are those entities whose interests are affected by the success or the failure of the use case. A) Viewers B) Stakeholders C) Programmers D) Clients
B) Stakeholders
The user interface is a layer of ________ objects that manage interaction with the user. A) control B) boundary C) utility D) virtual
B) boundary
The ________ bundles the complex series of requests to the entity objects into a common workflow that is easily accessed by the boundary objects. A) persistence object B) control object C) utility object D) encapsulate object
B) control object
Design defines the services that an object must provide and, as a result, ________. A) creates coding automatically B) creates a precise scope for coding C) complements analysis D) we don't really need coding
B) creates a precise scope for coding
To create initial use cases you start with ________. A) counting actors B) domain analysis C) looking into problem space D) looking into solution space
B) domain analysis
Sensitive data can be coded, in a process of ----------------. A) decryption B) encryption C) none of the above D) both of the above
B) encryption
We can combine actors at the same time through ________. A) specialization B) generalization C) both A & B D) neither A nor B
B) generalization
Which of the following is NOT one of the factors in choosing the programming language? A) proprietary languages needed for certain products B) legacy systems C) organizational environment D) methodology
B) legacy systems
Hyperlinks are widely used as ________. A) selectors B) navigators C) containers D) editors
B) navigators
ode review is an important activity in software development, but it is often ________. A) expensive B) neglected C) guided by user requirements D) not productive
B) neglected
A context diagram describes the interaction of ________ entities with the system. A) inside B) outside C) both A & B D) neither A or B
B) outside
The idea behind virtual machines is ________, since the applications can run on any platform that supports the virtual machine. A) platform dependence B) platform independence C) machine independence D) machine dependence
B) platform independence
Which of the following is an appropriate name for a use case? A) manage patient B) refer patient C) patient management D) all of the above
B) refer patient
A ------------is an internal or external entity that could endanger an asset. A) risk B) threat C) None of them D) Both of them
B) threat
The ________ is where the interaction between the user and the application takes place. A) requirements phase B) user interface C) system level D) application
B) user interface
A field is called --------------. A) Attribute B) Column C) Both of the above D) None of the above
C) Both of the above
________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
C) Control
------------- is software system used to store, retrieve, and run queries on data. A) ODBC B) JDBC C) DBMS D) All of the above
C) DBMS
In software engineering, ----------------- is the process of analyzing related software systems in a domain to find their common and variable parts. A) System design B) Requirement gathering C) Domain analysis D) logical design
C) Domain analysis
________ is a set of activities that transform the abstract concepts of analysis and the detailed specification of design into an actual product that people use. A) Analysis B) Design C) Implementation D) Programming
C) Implementation
----------------------- involves applying a set of rules that can help identify and correct inherent problems and complexities in table designs. A) Globalization B) Interstation C) Normalization D) Identification
C) Normalization
------------------ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data. A) CASE B) ERD C) ODBC D) DBMS
C) ODBC
A -------------------- is a view of the database used by one or more systems or users. A) Table B) Schema C) Subschema D) All of the above
C) Subschema
A ----------- contains a set of related records that store data about a specific entity. A) Column B) Row C) Table D) Database
C) Table
The task of ________ is to provide solutions to the users of an information system. A) a utility program B) an operating system C) application software D) an interface
C) application software
A deployment diagram is used ________. A) to visualize the static aspect of the physical nodes and their relationships B) to specify they physical nodes' details for construction C) both A & B D) neither A or B
C) both A & B
Software testing must provide answers to ________. A) verification B) validation C) both A & B D) neither A or B
C) both A & B
System testing is ________. A) conducted when all components of a system or subsystem are in place B) a kind of "dress rehearsal" before it is shown to the paying clients C) both A & B D) neither A or B
C) both A & B
Design must produce a(n) ________ view of the system. A) owner's B) user's C) builder's D) client's
C) builder's
Syntax errors are detected by ________. A) virtual machines B) interpreters C) code editors D) compliers
C) code editors
By defining programming as coding that is a system of symbols and rules used to represent instructions to a computer, we are ignoring a host of other activities such as ________. A) an object-oriented approach B) design activities C) compilers and interpreters D) the programmers' skill set
C) compilers and interpreters
Name the activities in implementation
Coding - Testing- Deployment- Maintenance
______ testing extends unit testing.
Component
20) A risk manager needs a combination of ------------------. A) business knowledge, B) IT skills C) experience with security tools and techniques D) All of the above
D) All of the above
A ------------------ is a primary key that consists of two or more columns. A) composite key B) concatenated key C) combination key D) All of the above
D) All of the above
Security protects the system and keeps it ----------. A) Safe B) free from danger C) Reliable D) All of the above
D) All of the above
Which of the following is an entity? A) Student B) Course C) Advisor D) All of the above
D) All of the above
Whish of the following is a type of data security? A) password B) shielding sensitive data C) controlling user access D) All of the above
D) All of the above
Which of the following is not an entity? A) Customer B) Customer_name C) Customer_phone D) Both B and C
D) Both B and C
________ detail steps in the normal flow that consists of discrete sub-steps. A) Alternate flows B) Exception flows C) Normal flows D) Sub-flows
D) Sub-flows
A source code editor is a text editor designed specifically for ________. A) providing a quick way to run a compiler, interpreter B) creating and editing code by programmers C) providing a quick way to run a debugger D) all of the above
D) all of the above
Design takes into account ________ requirements. A) functional B) technical C) non-functional D) all of the above
D) all of the above
Major use cases are identified by analyzing business ________. A) processes B) functions C) activities D) all of the above
D) all of the above
Revision control software ________. A) is used to maintain documentation and configuration files B) is used to maintain documentation source code C) can be applied to any type of stored information or data D) all of the above
D) all of the above
The exact nature of training depends on ________. A) the nature of application B) who is using the system C) whether the application is developed in-house or for the mass market D) all of the above
D) all of the above
The purpose of the CMM model is ________. A) improve software quality B) reduce development time C) cut costs D) all of the above
D) all of the above
Which of the following is a feature of use case scenario? A) A step is a transaction. B) Steps can be repeated. C) A step can call on another use case. D) all of the above
D) all of the above
Which of the following is an example of interface containers? A) Web pages B) forms C) frames D) all of the above
D) all of the above
Which of the following is one of the UI responsibilities? A) accepting and editing user input B) producing human-intelligible output C) guiding users to accomplish tasks D) all of the above
D) all of the above
Implementation requires a range of activities including ________. A) testing B) deployment C) maintenance D) all the above
D) all the above
Which of the following is NOT one of the components of a use case? A) a goal B) actors C) a scenario D) behavior
D) behavior
"Register student" is an appropriate ________ for a use case. A) goal B) name C) scenario D) both A & B
D) both A & B
The ________ interface is the type of interface where the user types instructions to the computer in a special language. A) interactive B) real-time C) user friendly D) command-line
D) command-line
Compilers translate the human-readable code in high-level languages into machine languages without ________. A) knowing the language B) knowing the technology C) knowing the name of the programmer D) requiring the programmer to know how the computer works
D) requiring the programmer to know how the computer works
A slider that controls the sound level and the balance of various devices connected to the sound card is an example of a(n) ________. A) editor B) displayer C) container D) selector
D) selector
If you have flawed analysis and defective design, you should ________. A) write multiple codes B) start all over again C) avoid coding completely D) stop reviewing your code
D) stop reviewing your code
What does DBA stand for? What are the responsibilities of a DBA?
DBA = DataBase Administrator A DBA is responsible for DBMS management and support. DBAs are concerned with data security and integrity, preventing unauthorized access, providing backup and recovery, audit trails, maintaining the database, and supporting user needs.
What does DBMS stand for? Explain the DBMS.
DBMS = DataBase Management System It is software system used to store, retrieve, and run queries on data. A DBMS serves as an interface between an end-user and a database, allowing users to create, read, update, and delete data in the database.
________ utilities should be able to restore lost or damaged data.
Data recovery
What is happening during the deployment? Name its activities.
During the deployment, it covers all activities that make the software available for use. It consists of Release, Installation, Updating, and Adaptation.
______ is the process of reviewing the program code to spot logic errors, which produce incorrect results.
Desk checking
What is desk checking?
Desk checking is the process of reviewing the program code to spot logic errors, which produce incorrect results. This process can be performed by the person who wrote the program or by other programmers.
What does ERD stand for? Explain the ERD.
ERD = entity-relationship diagram It is a model that shows the logical relationships and interaction among system entities. It provides an overall view of the system and a blueprint for creating the physical data structures.
_____ scrambles the contents of a file or document to protect it from unauthorized access.
Encryption
Name two techniques to secure a network.
Encryption and firewall
What are the system installation tasks?
Prepare a separate operational and test environment Perform system changeover Perform data conversion Provide training for users, managers, and IT staff Carry out post-implementation tasks.
Explain the risk management
In the real world, it is not realistic to achieve absolute security. Instead, managers must balance the value of the assets being protected, potential risks to the organization, and security costs
Explain integration testing
Integration testing means testing two or more programs that depend on each other. In integration testing, every component must be tested again once a new component is integrated into the whole.
What does JDBC stand for? Explain the JDBC.
JDBC = java database connectivity It enables Java applications to exchange data with any database that uses SQL statements and is JDBC-compliant.
What does ODBC stand for? Explain the ODBC.
ODBC = Open database connectivity It is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
QA:
Quality Assurance
________ are rules designed to meet all legal requirements and business needs for keeping records.
Records Retention Policy
What is social engineering?
Social engineering is the term used for a broad range of malicious activities accomplished through human interactions.
Explain and system testing. What are the major objectives in system testing?
System testing could also be referred to as system-level testing. It includes all likely processing situations, and its objective is to reassure users, developers, and managers that the program meets all specifications and that all necessary features have been included.
What is a deployment diagram? What does a node mean?
The deployment diagram is a UML tool. It is used to visualize the static aspect of the physical nodes and their relationships and to specify their details for construction. It is also a structural diagram that depicts the relationship between nodes. Node is a physical element that exists at run time and that represents a computational resource, generally having at least some memory and, oftentimes, processing capability
How the hardening makes a system secure?
The hardening process makes a system more secure by removing unnecessary accounts services and features.
Describe the difference between primary and secondary actors.
The primary actor is an actor whose goal is expressed by the name of the use case. The services that the system provides through a use case are primarily for the benefit of the primary actor. A secondary actor is the actor who supports the primary actor to reach the goal of the use case
Explain the unit testing. What is the objective in unit testing?
Unit testing is the process of testing an individual program or module. The objective is to identify and eliminate execution errors that could cause the program to terminate abnormally and logic errors that could have been missed during desk checking.
Describe what use case modeling is.
Use case modeling is a set of use cases that, when taken together, describe the behavior of a system. A use case is a unit of this model. It can also be defined as a contract between entities that have a stake in the outcome of a use case (i.e., stakeholders) and the system.
A BIOS-level password, also called a ______or a ______.
boot-level password or a power-on password
____ is the process of putting the new information system online and retiring the old system.
changeover
In object-oriented languages, the unit is a _____ and in structured languages, this unit is a function.
class
When performing a data conversion, the existing ____ is loaded into the new system.
data
The ____ process makes a system more secure by removing unnecessary accounts, services, and features.
hardening
A motion sensor uses _____ to detect movement.
infrared technology
In ______ every component has to be tested again once a new component is integrated into the whole.
integration testing
What is code review? What are the types? Explain.
it is a major tool for enforcing standards Walkthrough is less formal and essentially consists of going over the lists of questions and/or possible defects provided by the participants Inspection, on the other hand, is more formal and consists of going over code line-by-line.
What are the types of relationships in ERD. Explain shortly.
one-to-one relationship: Abbreviated 1:1. It exists when exactly one of the second entity occurs for each instance of the first entity. one-to-many relationship: Abbreviated 1:M. It exists when one occurrence of the first entity can relate to many instances of the second entity, but each instance of the second entity can associate with only one instance of the first entity. many-to-many relationship: Abbreviated M:N. It exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.
A ______ consists of detailed procedures that specify how and when the testing will be performed, who will participate, and what test data will be used.
test plan
During the integration testing the output from _______ becomes input to the master file update program.
the validation program