Domain 8 Flashcards
Uses programs to assist in the creation and maintenance of other computer programs
CASE (computer aided software engineering)
What are the 3 types of CASE software?
tools: support only specific task in the sw production process
workbenches: support one or a few sw process activities by integrating several tools in a single application
environments: support all or at least part of the sw production process with a collection of tools and workbenches
free of charge to use sw
freeware
fully functional proprietary software that may be initially free of charge
shareware
partially functioning proprietary software with key features disabled
crippleware
linear application development model that uses rigid phases; when one phase ends, the next begins.
waterfall
has highly overlapping steps. named after sashimi for its overlapping layers of fish. The steps are similar to waterfall except it’s steps overlap
sashimi
an agile development method that uses pairs of programmers who work off a detailed specification
XP (extreme programming)
a software development model designed to control risk
spiral
Rapidly develops sw via the use of prototypes, ‘dummy’ GUIs, back -end databases and more
RAD (rapid application development)
A customer focused group that focuses on the entire lifecycle of a project
IPT (integrated product team)
Having a third party store an archive of computer software
software escrow
Tracks changes to a specific piece of software
configuration management
tracks changes across an entire software development program
change management
every foreign key in a secondary table matches a primary key in the parent table
referential integrity
each attribute value is consistent with the attribute data type
semantic integrity
each tuple has a unique primary key that is not null
entity integrity
language used to create, modify, and delete tables in a database
DDL (data definition language)
used to query and update data stored in tables of a database
DML (data manipulation language)
XXS excutes a script in a ___ context
trusted
privately sharing vulnerability information with a vendor and withholding public release until a patch is available
responsible disclosure
releasing vulnerability details publicly
full disclosure
A maturity framework for evaluating and improving the software development process
CMM ( Capability maturity model)
facilitator of a scrum team
scrum master