Chapter 20 Flashcards

1
Q

The instructions that a computer follows consist of a long series of binary digits in a language known as ________

A

machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A converts the

higher-level language into an executable file designed for use on a specific operating system.

A

compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When ______ are used, the programmer distributes the source code, which contains
instructions in the higher-level language.

A

interpreted languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _____ is internal code that defines the actions an object performs in response
to a message.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the results of a message being processed through a method.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of the common methods from a set of objects that defines the behavior
of those objects is a _____

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

examples of classes that contain their methods.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

when methods from a class (parent or superclass) are
taken on by another subclass (child).

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Inheritance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the forwarding of a request by an object to another object

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Delegation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external
conditions

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The strength of the relationship between the purposes of the
methods within the same class.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Cohesion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the level of interaction between objects.

Method
Behavior
Class
Instance 
Inheritance
Delegation
Polymorphism 
Cohesion 
Coupling
A

Coupling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Objects that have _____

cohesion require lots of assistance from other objects to perform tasks and have high coupling

A

low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ coupling provides better software design because objects are more
independent.

lower or higher

A

lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What model does allow development to return to the previous phase to correct defects discovered during the subsequent phase ?

Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model 
Waterfall Model
A

Waterfall Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which model eschewed the rigid models of the past
in favor of approaches that placed an emphasis on the needs of the customer and on quickly developing new functionality that meets those needs in an iterative fashion.

Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model 
Waterfall Model
A

Agile Software Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Initial
Repeatable
Defined
Managed
Optimizing 

Describe which model

Software Capability Maturity Model
IDEAL Model
Agile Software Development
Spiral Model 
Waterfall Model
A

Software Capability Maturity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Initiating
Diagnosing
Establishing
Acting 
Learning

Software Capability Maturity Model

IDEAL Model

Agile Software Development

Spiral Model

Waterfall Model

A

IDEAL Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which model t allows developers to return to the planning stages as changing technical demands and customer requirements necessitate the evolution of a system.

A

Spiral Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

shows the interrelationships over time between projects
and schedules

Gantt Charts
PERT

A

Gantt chart

21
Q

_____ is used to direct improvements to project management
and software coding in order to produce more efficient software.

Gantt Charts
PERT

A

PERT

22
Q

Which part of the change management process double-checks and ensure that any code inserted as a programming aid during the change
process (such as debugging code and/or back doors) is removed before releasing the new software to production ?

Request Control
Change Control
Release Control

A

Release Control

23
Q

Which part of the change management process provides an organized framework within
which users can request modifi cations, managers can conduct cost/benefi t analysis, and
developers can prioritize tasks.

Request Control
Change Control
Release Control

A

Request Control

24
Q

Which part of the change management process provides an organized framework within which multiple developers can create and test a solution prior to rolling it out into a production environment.

Request Control
Change Control
Release Control

A

Change Control

25
Q

Which part of the change management process includes conforming to quality control restrictions, developing tools for update or change
deployment, properly documenting any coded changes, and restricting the effects of new
code to minimize diminishment of security.

Request Control
Change Control
Release Control

A

Change Control

26
Q

DevOps approach consists of what parts ?

A

software development, quality assurance, and IT operations.

27
Q

What allows application developers to bypass traditional web pages and interact directly with the underlying service through function calls ?

A

Application Programming Interfaces

28
Q

A _____ database consists of flat two-dimensional tables made up of rows and columns.
In fact, each table looks similar to a spreadsheet fi le.

A

relational

29
Q

The number of rows in the relation is referred to as _______, and the number of columns is the _______.

A

cardinality, degree

30
Q

is selected from the set of candidate keys for a table to
be used to uniquely identify the records in a table.

Candidate Keys
Primary Keys
Foreign Keys

A

Primary Keys

31
Q

a subset of attributes that can be used to uniquely
identify any record in a table.

Candidate Keys
Primary Keys
Foreign Keys

A

Candidate Keys

32
Q

is used to enforce relationships between two tables, also known as referential integrity.

Candidate Keys
Primary Keys
Foreign Keys

A

Foreign Keys

33
Q

once transactions are committed to the database, they must be preserved.

Atomicity
Consistency
Isolation
Durability

A

Durability

34
Q

If any part of the transaction fails, the entire transaction must be rolled back as if it never occurred.

Atomicity
Consistency
Isolation
Durability

A

Atomicity

35
Q

requires that transactions operate separately from each other

Atomicity
Consistency
Isolation
Durability

A

Isolation

36
Q

When
a transaction is complete, the database must again be consistent with the rules, regardless
of whether those rules were violated during the processing of the transaction itself

Atomicity
Consistency
Isolation
Durability

A

Consistency

37
Q

Multilevel security databases contain information at a number of different ________

A

classification levels

38
Q

______ uses a “lock” feature to allow one user to make changes but deny
other users access to views or make changes to data elements at the same time.

A

Concurrency

39
Q

_____ is the
concept of hiding individual database fields or cells or imposing more security restrictions
on them.

A

Cell suppression

40
Q

_________ occurs when two or more rows in the same relational database table appear to have identical primary key elements but contain different data for use at differing
classification levels.

A

Polyinstantiation

41
Q

____________ is a database feature that allows applications to communicate
with different types of databases without having to be directly programmed for
interaction with each type.

A

Open Database Connectivity (ODBC)

42
Q

_______consists of volatile random access memory
(RAM) and is usually the most high-performance storage resource available to a system.

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Primary (or “real”) memory

43
Q

_____ include magnetic
and optical media, such as tapes, disks, hard drives, fl ash drives, and CD/DVD storage.

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Secondary storage

44
Q

_______ allows a system to simulate additional primary memory resources
through the use of secondary storage.

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Virtual memory

45
Q

________ allows a system to simulate secondary storage resources through the
use of primary storage.

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Virtual storage

46
Q

_______ allows the operating system to request contents from any point
within the media.

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Random access storage

47
Q

______ requires scanning through the entire media from the beginning
to reach a specific address

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Sequential access storage

48
Q

______ loses its contents when power is removed from the resource. RAM is
the most common type of volatile storage resource.

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Volatile storage

49
Q

_______ does not depend upon the presence of power to maintain its contents.
Magnetic/optical media and nonvolatile RAM (NVRAM) are typical examples

Primary (or “real”) memory
Secondary storage
Virtual memory 
Virtual storage
Random access storage 
Sequential access storage
Volatile storage
Nonvolatile storage
A

Nonvolatile storage