Chapter 20 Flashcards

1
Q

The instructions that a computer follows consist of a long series of binary digits in a language known as ________

A

machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A converts the

higher-level language into an executable file designed for use on a specific operating system.

A

compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When ______ are used, the programmer distributes the source code, which contains
instructions in the higher-level language.

A

interpreted languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _____ is internal code that defines the actions an object performs in response
to a message.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the results of a message being processed through a method.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of the common methods from a set of objects that defines the behavior
of those objects is a _____

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

examples of classes that contain their methods.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

when methods from a class (parent or superclass) are
taken on by another subclass (child).

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Inheritance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the forwarding of a request by an object to another object

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Delegation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external
conditions

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The strength of the relationship between the purposes of the
methods within the same class.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Cohesion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the level of interaction between objects.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Coupling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Objects that have _____

cohesion require lots of assistance from other objects to perform tasks and have high coupling

A

low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ coupling provides better software design because objects are more
independent.

lower or higher

A

lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What model does allow development to return to the previous phase to correct defects discovered during the subsequent phase ?

Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model 
Waterfall Model
A

Waterfall Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which model eschewed the rigid models of the past
in favor of approaches that placed an emphasis on the needs of the customer and on quickly developing new functionality that meets those needs in an iterative fashion.

Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model 
Waterfall Model
A

Agile Software Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Initial
Repeatable
Defined
Managed
Optimizing 

Describe which model

Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model 
Waterfall Model
A

Software Capability Maturity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Initiating
Diagnosing
Establishing
Acting 
Learning

Software Capability Maturity Model

IDEAL Model

Agile Software Development

Spiral Model

Waterfall Model

A

IDEAL Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which model t allows developers to return to the planning stages as changing technical demands and customer requirements necessitate the evolution of a system.

A

Spiral Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

shows the interrelationships over time between projects
and schedules

Gantt Charts
PERT

A

Gantt chart

21
Q

_____ is used to direct improvements to project management
and software coding in order to produce more efficient software.

Gantt Charts
PERT

22
Q

Which part of the change management process double-checks and ensure that any code inserted as a programming aid during the change
process (such as debugging code and/or back doors) is removed before releasing the new software to production ?

Request Control
Change Control
Release Control

A

Release Control

23
Q

Which part of the change management process provides an organized framework within
which users can request modifi cations, managers can conduct cost/benefi t analysis, and
developers can prioritize tasks.

Request Control
Change Control
Release Control

A

Request Control

24
Q

Which part of the change management process provides an organized framework within which multiple developers can create and test a solution prior to rolling it out into a production environment.

Request Control
Change Control
Release Control

A

Change Control

25
Which part of the change management process includes conforming to quality control restrictions, developing tools for update or change deployment, properly documenting any coded changes, and restricting the effects of new code to minimize diminishment of security. Request Control Change Control Release Control
Change Control
26
DevOps approach consists of what parts ?
software development, quality assurance, and IT operations.
27
What allows application developers to bypass traditional web pages and interact directly with the underlying service through function calls ?
Application Programming Interfaces
28
A _____ database consists of flat two-dimensional tables made up of rows and columns. In fact, each table looks similar to a spreadsheet fi le.
relational
29
The number of rows in the relation is referred to as _______, and the number of columns is the _______.
cardinality, degree
30
is selected from the set of candidate keys for a table to be used to uniquely identify the records in a table. Candidate Keys Primary Keys Foreign Keys
Primary Keys
31
a subset of attributes that can be used to uniquely identify any record in a table. Candidate Keys Primary Keys Foreign Keys
Candidate Keys
32
is used to enforce relationships between two tables, also known as referential integrity. Candidate Keys Primary Keys Foreign Keys
Foreign Keys
33
once transactions are committed to the database, they must be preserved. Atomicity Consistency Isolation Durability
Durability
34
If any part of the transaction fails, the entire transaction must be rolled back as if it never occurred. Atomicity Consistency Isolation Durability
Atomicity
35
requires that transactions operate separately from each other Atomicity Consistency Isolation Durability
Isolation
36
When a transaction is complete, the database must again be consistent with the rules, regardless of whether those rules were violated during the processing of the transaction itself Atomicity Consistency Isolation Durability
Consistency
37
Multilevel security databases contain information at a number of different ________
classification levels
38
______ uses a “lock” feature to allow one user to make changes but deny other users access to views or make changes to data elements at the same time.
Concurrency
39
_____ is the concept of hiding individual database fields or cells or imposing more security restrictions on them.
Cell suppression
40
_________ occurs when two or more rows in the same relational database table appear to have identical primary key elements but contain different data for use at differing classification levels.
Polyinstantiation
41
____________ is a database feature that allows applications to communicate with different types of databases without having to be directly programmed for interaction with each type.
Open Database Connectivity (ODBC)
42
_______consists of volatile random access memory (RAM) and is usually the most high-performance storage resource available to a system. ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Primary (or “real”) memory
43
_____ include magnetic and optical media, such as tapes, disks, hard drives, fl ash drives, and CD/DVD storage. ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Secondary storage
44
_______ allows a system to simulate additional primary memory resources through the use of secondary storage. ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Virtual memory
45
________ allows a system to simulate secondary storage resources through the use of primary storage. ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Virtual storage
46
_______ allows the operating system to request contents from any point within the media. ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Random access storage
47
______ requires scanning through the entire media from the beginning to reach a specific address ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Sequential access storage
48
______ loses its contents when power is removed from the resource. RAM is the most common type of volatile storage resource. ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Volatile storage
49
_______ does not depend upon the presence of power to maintain its contents. Magnetic/optical media and nonvolatile RAM (NVRAM) are typical examples ``` Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage ```
Nonvolatile storage