Domain 8 Flashcards

1
Q

Uses programs to assist in the creation and maintenance of other computer programs

A

CASE (computer aided software engineering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of CASE software?

A

tools: support only specific task in the sw production process

workbenches: support one or a few sw process activities by integrating several tools in a single application

environments: support all or at least part of the sw production process with a collection of tools and workbenches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

free of charge to use sw

A

freeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

fully functional proprietary software that may be initially free of charge

A

shareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

partially functioning proprietary software with key features disabled

A

crippleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

linear application development model that uses rigid phases; when one phase ends, the next begins.

A

waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

has highly overlapping steps. named after sashimi for its overlapping layers of fish. The steps are similar to waterfall except it’s steps overlap

A

sashimi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an agile development method that uses pairs of programmers who work off a detailed specification

A

XP (extreme programming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a software development model designed to control risk

A

spiral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rapidly develops sw via the use of prototypes, ‘dummy’ GUIs, back -end databases and more

A

RAD (rapid application development)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A customer focused group that focuses on the entire lifecycle of a project

A

IPT (integrated product team)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Having a third party store an archive of computer software

A

software escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tracks changes to a specific piece of software

A

configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

tracks changes across an entire software development program

A

change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

every foreign key in a secondary table matches a primary key in the parent table

A

referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

each attribute value is consistent with the attribute data type

A

semantic integrity

17
Q

each tuple has a unique primary key that is not null

A

entity integrity

18
Q

language used to create, modify, and delete tables in a database

A

DDL (data definition language)

19
Q

used to query and update data stored in tables of a database

A

DML (data manipulation language)

20
Q

XXS excutes a script in a ___ context

A

trusted

21
Q

privately sharing vulnerability information with a vendor and withholding public release until a patch is available

A

responsible disclosure

22
Q

releasing vulnerability details publicly

A

full disclosure

23
Q

A maturity framework for evaluating and improving the software development process

A

CMM ( Capability maturity model)

24
Q

facilitator of a scrum team

A

scrum master

25
Q

Gradually releasing new features to a subset of users as an early warning system to see if anything breaks before releasing to a wider audience

A

Canary

26
Q

CMM ratings and describe them

A

Initial: processes unpredictable poorly controlled and reactive

Repeatable: Processes characterized for projects, and often reactive

Defined: Processes characterized for projects and is proactive

Managed: Processes measured and controlled

Optimized: Focus on process improvement

27
Q

Most commonly used API and is lightweight and fast

A

REST

28
Q

More complex and heavyweight API but provides more capabilities

A

SOAP

29
Q

creating code that is difficult to understand

A

code obfuscation

30
Q

modifies the look of the code

A

lexical

31
Q

modifies flow of control of code

A

control flow

32
Q

Persistent XSS attack

A

stored XSS attack

33
Q

More common XSS attack

A

reflective

34
Q

How do you prevent XSS attacks?

A

input validation

35
Q

Guarantees database transactions are processed reliably

A

ACID

A: atomicity - all changes take effect or none of them do

C: consistency - updates to the database are consistent with the rules, the rules are enforced

I: isolation - transactions are invisible to others until they are complete

D: durability: - completed transactions will not be lost

36
Q

Guarantees database transactions are processed reliably

A

ACID

A: atomicity - all changes take effect or none of them do

C: consistency - updates to the database are consistent with the rules, the rules are enforced

I: isolation - transactions are invisible to others until they are complete

D: durability: - completed transactions wil not be lost