Chapter 20 Flashcards
The instructions that a computer follows consist of a long series of binary digits in a language known as ________
machine language
A converts the
higher-level language into an executable file designed for use on a specific operating system.
compiler
When ______ are used, the programmer distributes the source code, which contains
instructions in the higher-level language.
interpreted languages
A _____ is internal code that defines the actions an object performs in response
to a message.
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Method
the results of a message being processed through a method.
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Behavior
A collection of the common methods from a set of objects that defines the behavior
of those objects is a _____
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Class
examples of classes that contain their methods.
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Instance
when methods from a class (parent or superclass) are
taken on by another subclass (child).
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Inheritance
the forwarding of a request by an object to another object
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Delegation
the characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external
conditions
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Polymorphism
The strength of the relationship between the purposes of the
methods within the same class.
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Cohesion
the level of interaction between objects.
Method Behavior Class Instance Inheritance Delegation Polymorphism Cohesion Coupling
Coupling
Objects that have _____
cohesion require lots of assistance from other objects to perform tasks and have high coupling
low
________ coupling provides better software design because objects are more
independent.
lower or higher
lower
What model does allow development to return to the previous phase to correct defects discovered during the subsequent phase ?
Software Capability Maturity Model IDEAL Model Agile Software Development Spiral Model Waterfall Model
Waterfall Model
Which model eschewed the rigid models of the past
in favor of approaches that placed an emphasis on the needs of the customer and on quickly developing new functionality that meets those needs in an iterative fashion.
Software Capability Maturity Model IDEAL Model Agile Software Development Spiral Model Waterfall Model
Agile Software Development
Initial Repeatable Defined Managed Optimizing
Describe which model
Software Capability Maturity Model IDEAL Model Agile Software Development Spiral Model Waterfall Model
Software Capability Maturity Model
Initiating Diagnosing Establishing Acting Learning
Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model
Waterfall Model
IDEAL Model
Which model t allows developers to return to the planning stages as changing technical demands and customer requirements necessitate the evolution of a system.
Spiral Model
shows the interrelationships over time between projects
and schedules
Gantt Charts
PERT
Gantt chart
_____ is used to direct improvements to project management
and software coding in order to produce more efficient software.
Gantt Charts
PERT
PERT
Which part of the change management process double-checks and ensure that any code inserted as a programming aid during the change
process (such as debugging code and/or back doors) is removed before releasing the new software to production ?
Request Control
Change Control
Release Control
Release Control
Which part of the change management process provides an organized framework within
which users can request modifi cations, managers can conduct cost/benefi t analysis, and
developers can prioritize tasks.
Request Control
Change Control
Release Control
Request Control
Which part of the change management process provides an organized framework within which multiple developers can create and test a solution prior to rolling it out into a production environment.
Request Control
Change Control
Release Control
Change Control
Which part of the change management process includes conforming to quality control restrictions, developing tools for update or change
deployment, properly documenting any coded changes, and restricting the effects of new
code to minimize diminishment of security.
Request Control
Change Control
Release Control
Change Control
DevOps approach consists of what parts ?
software development, quality assurance, and IT operations.
What allows application developers to bypass traditional web pages and interact directly with the underlying service through function calls ?
Application Programming Interfaces
A _____ database consists of flat two-dimensional tables made up of rows and columns.
In fact, each table looks similar to a spreadsheet fi le.
relational
The number of rows in the relation is referred to as _______, and the number of columns is the _______.
cardinality, degree
is selected from the set of candidate keys for a table to
be used to uniquely identify the records in a table.
Candidate Keys
Primary Keys
Foreign Keys
Primary Keys
a subset of attributes that can be used to uniquely
identify any record in a table.
Candidate Keys
Primary Keys
Foreign Keys
Candidate Keys
is used to enforce relationships between two tables, also known as referential integrity.
Candidate Keys
Primary Keys
Foreign Keys
Foreign Keys
once transactions are committed to the database, they must be preserved.
Atomicity
Consistency
Isolation
Durability
Durability
If any part of the transaction fails, the entire transaction must be rolled back as if it never occurred.
Atomicity
Consistency
Isolation
Durability
Atomicity
requires that transactions operate separately from each other
Atomicity
Consistency
Isolation
Durability
Isolation
When
a transaction is complete, the database must again be consistent with the rules, regardless
of whether those rules were violated during the processing of the transaction itself
Atomicity
Consistency
Isolation
Durability
Consistency
Multilevel security databases contain information at a number of different ________
classification levels
______ uses a “lock” feature to allow one user to make changes but deny
other users access to views or make changes to data elements at the same time.
Concurrency
_____ is the
concept of hiding individual database fields or cells or imposing more security restrictions
on them.
Cell suppression
_________ occurs when two or more rows in the same relational database table appear to have identical primary key elements but contain different data for use at differing
classification levels.
Polyinstantiation
____________ is a database feature that allows applications to communicate
with different types of databases without having to be directly programmed for
interaction with each type.
Open Database Connectivity (ODBC)
_______consists of volatile random access memory
(RAM) and is usually the most high-performance storage resource available to a system.
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Primary (or “real”) memory
_____ include magnetic
and optical media, such as tapes, disks, hard drives, fl ash drives, and CD/DVD storage.
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Secondary storage
_______ allows a system to simulate additional primary memory resources
through the use of secondary storage.
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Virtual memory
________ allows a system to simulate secondary storage resources through the
use of primary storage.
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Virtual storage
_______ allows the operating system to request contents from any point
within the media.
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Random access storage
______ requires scanning through the entire media from the beginning
to reach a specific address
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Sequential access storage
______ loses its contents when power is removed from the resource. RAM is
the most common type of volatile storage resource.
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Volatile storage
_______ does not depend upon the presence of power to maintain its contents.
Magnetic/optical media and nonvolatile RAM (NVRAM) are typical examples
Primary (or “real”) memory Secondary storage Virtual memory Virtual storage Random access storage Sequential access storage Volatile storage Nonvolatile storage
Nonvolatile storage