Domain 8 Flashcards

1
Q

Uses programs to assist in the creation and maintenance of other computer programs

A

CASE (computer aided software engineering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of CASE software?

A

tools: support only specific task in the sw production process

workbenches: support one or a few sw process activities by integrating several tools in a single application

environments: support all or at least part of the sw production process with a collection of tools and workbenches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

free of charge to use sw

A

freeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

fully functional proprietary software that may be initially free of charge

A

shareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

partially functioning proprietary software with key features disabled

A

crippleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

linear application development model that uses rigid phases; when one phase ends, the next begins.

A

waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

has highly overlapping steps. named after sashimi for its overlapping layers of fish. The steps are similar to waterfall except it’s steps overlap

A

sashimi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an agile development method that uses pairs of programmers who work off a detailed specification

A

XP (extreme programming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a software development model designed to control risk

A

spiral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rapidly develops sw via the use of prototypes, ‘dummy’ GUIs, back -end databases and more

A

RAD (rapid application development)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A customer focused group that focuses on the entire lifecycle of a project

A

IPT (integrated product team)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Having a third party store an archive of computer software

A

software escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tracks changes to a specific piece of software

A

configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

tracks changes across an entire software development program

A

change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

every foreign key in a secondary table matches a primary key in the parent table

A

referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

each attribute value is consistent with the attribute data type

A

semantic integrity

17
Q

each tuple has a unique primary key that is not null

A

entity integrity

18
Q

language used to create, modify, and delete tables in a database

A

DDL (data definition language)

19
Q

used to query and update data stored in tables of a database

A

DML (data manipulation language)

20
Q

XXS excutes a script in a ___ context

21
Q

privately sharing vulnerability information with a vendor and withholding public release until a patch is available

A

responsible disclosure

22
Q

releasing vulnerability details publicly

A

full disclosure

23
Q

A maturity framework for evaluating and improving the software development process

A

CMM ( Capability maturity model)

24
Q

facilitator of a scrum team

A

scrum master

25
Gradually releasing new features to a subset of users as an early warning system to see if anything breaks before releasing to a wider audience
Canary
26
CMM ratings and describe them
Initial: processes unpredictable poorly controlled and reactive Repeatable: Processes characterized for projects, and often reactive Defined: Processes characterized for projects and is proactive Managed: Processes measured and controlled Optimized: Focus on process improvement
27
Most commonly used API and is lightweight and fast
REST
28
More complex and heavyweight API but provides more capabilities
SOAP
29
creating code that is difficult to understand
code obfuscation
30
modifies the look of the code
lexical
31
modifies flow of control of code
control flow
32
Persistent XSS attack
stored XSS attack
33
More common XSS attack
reflective
34
How do you prevent XSS attacks?
input validation
35
Guarantees database transactions are processed reliably
ACID A: atomicity - all changes take effect or none of them do C: consistency - updates to the database are consistent with the rules, the rules are enforced I: isolation - transactions are invisible to others until they are complete D: durability: - completed transactions will not be lost
36
Guarantees database transactions are processed reliably
ACID A: atomicity - all changes take effect or none of them do C: consistency - updates to the database are consistent with the rules, the rules are enforced I: isolation - transactions are invisible to others until they are complete D: durability: - completed transactions wil not be lost