ENGR 107 Final Exam Review Flashcards

1
Q

What is the product verification process?

A

It is a process that verifies that a system or product meets system specifications or requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What question does the verification process answer?

A

Are we building the product right?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the product validation process?

A

It is a process that validates that a system or product meets customer requirements or needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What question does the product validation process answer?

A

Are we building the right product?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four fundamental methods of verification?

A

Inspection, Demonstration, Test, and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does inspection involve?

A

Visual examination of an end product,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is inspection generally used?

A

It is generally used to verify physical design features or specific manufacturer identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of the inspection method being utilized?

A

Visually examining a car to ensure that it has windows, power adjustable seats, AC, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does demonstration involve?

A

Using the product as it is intended to be used to verify the results are as planned or expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of the demonstration process being used?

A

The portion of the Design Project where a demonstration of the project is given. The purpose of this demonstration is to prove that the product works like it should and fulfills the given requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of testing?

A

Producing data at specific points for each specified requirement under controlled conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of tests that could be performed on a product?

A

Wanting to show that a car speeds up within a certain time frame, it accelerates properly, and it slows down appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does analysis involve?

A

Verification of a product or system using models, calculations, and testing equipment

Includes the use of mathematical modeling and simulation as analytical tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of analysis being used?

A

Completing a series of tests for a car. Which rev the engine is at at a specific revolution per minute (rpm) for a set length of time, while monitoring engine vibration and temp, to verify that the expected results have been achieved.

The info can be used to model the failure point of the engine, such as the max rpm sustained over a specific time period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the different types of verification outputs?

A

Product Verification Report, Discrepancy Reports, and Compliance Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Product Verification Report?

A

A report that shows the results of
the verification activities.

17
Q

What is a Discrepancy Report?

A

A report where results that do not make sense are recorded.

18
Q

What is Compliance Documentation?

A

Documentation to ensure that all applicable rules / regulations are complied with.

19
Q

What is an example scenario that would require Compliance Documentation?

A

If an electrical product is being created, you need to make sure that it complies with the rules / regulations in your country. (Only a consideration when the product is being released to the market.)

20
Q

The National Society of Professional Engineers (NSPE) created a list of 5 standards of ethical behavior for engineers to follow in their professional lives. What are they?

A
  1. Protecting Public Safety
  2. Acting with Integrity
  3. Being honest in public
    communications
  4. Only performing tasks that they are qualified to do
  5. Remaining faithful and trustworthy to employers
21
Q

How does an engineer protect public safety?

A
  1. By using standard and approved materials.
  2. By following the appropriate set(s) of engineering procedures.
22
Q

How do engineers act with integrity and honesty?

A
  1. By remaining honest in all of their transactions
  2. Even when faced with a dilemma or other pressures in their duty, remaining honest.
23
Q

How do engineers protect clients and employers?

A
  1. By maintaining discretion when dealing with their clients’ info.
    Ex. name, age, gender, location, etc.
  2. By preserving this info unless the client states otherwise.
24
Q

How do engineers ensure ethical decision making in areas of uncertainty?

A

By choosing the decision that is ethical and serves the interest of the society rather than individual gain.

25
Q

What is a verified product?

A

A final product once it has gone through the verification process and it complies with all of the established rules / requirements.

26
Q

What is an example of a verified product?

A

The pill dispenser my group presented, since we tested it out and made sure it met all of the rules / requirements.

27
Q

What is Cybersecurity?

A

The practice of protecting systems, networks, and programs from digital attacks.

28
Q

How can you ensure data confidentiality?

A
  1. Encrypt sensitive data, such as credit card numbers or PII, when you transmit it over networks or store it on computers.
  2. Use access controls, such as user authentication and authorization, to limit who can access sensitive data and what they can do with it.
  3. Use physical controls, such as locks and security cameras, to prevent unauthorized access to sensitive data in physical locations, such as data centers or office buildings.
29
Q

Which aspect of CIA does phishing mainly impact? How would you prevent a phishing attack by knowing this info?

A

Confidentiality

  1. Encrypt sensitive data, such as credit card numbers or PII, when you transmit it over networks or store it on computers.
  2. Use access controls, such as user authentication and authorization, to limit who can access sensitive data and what they can do with it.
  3. Use physical controls, such as locks and security cameras, to prevent unauthorized access to sensitive data in physical locations, such as data centers or office buildings.
30
Q

How can you ensure data availability?

A
  1. Deploy redundant systems, so that if one system fails the others can continue to operate and provide the data needed.
  2. Use load balancers, which distribute incoming requests across multiple systems so that no one system becomes overwhelmed and unavailable
  3. Run regular quality control tests to help identify availability issues before they cause disruptions
31
Q

What is a phishing attack?

A

Email, text, or voice messages that trick users into downloading malware, sharing sensitive info, of sending funds to the wrong people

Fraudulent emails that resemble emails from reputable sources

32
Q

Which aspect of the CIA Triad is Malware most related to? How would you prevent a malware attack based on this info?

A

Integrity

  1. Data should be stored in physically secure locations
  2. Encrypt data and securely store the encryption key
  3. Audit data access and changes regularly
  4. Use cyber analysis tools to monitor the flow of info and users into, through, and out of your systems, and address irregularities quickly
  5. Create a data backup and restoration strategy
33
Q

How can you ensure data integrity?

A
  1. Data should be stored in physically secure locations
  2. Encrypt data and securely store the encryption key
  3. Audit data access and changes regularly
  4. Use cyber analysis tools to monitor the flow of info and users into, through, and out of your systems, and address irregularities quickly
  5. Create a data backup and restoration strategy
34
Q

What is Ransomware?

A

A type of malicious software (malware)

Designed to extort money by blocking access to files or the computer system until the ransom is paid

Paying the ransom does not guarantee that the files will be recovered or the system restored

35
Q

Which aspect of the CIA Triad is Ransomware most related to? How would you prevent a ransomware attack based on this info?

A

Availability
1. Deploy redundant systems, so that if one system fails the others can continue to operate and provide the data needed.

  1. Use load balancers, which distribute incoming requests across multiple systems so that no one system becomes overwhelmed and unavailable
  2. Run regular quality control tests to help identify availability issues before they cause disruptions
36
Q

What is a Distributed Denial of Service (DDos) attack?

A

Attempts to crash a server, website, or network by overloading it with traffic (usually from a botnet)

37
Q

Which aspect of the CIA Triad is a DDos most related to? How would you prevent a DDos attack based on this info?

A

Availability

  1. Deploy redundant systems, so that if one system fails the others can continue to operate and provide the data needed.
  2. Use load balancers, which distribute incoming requests across multiple systems so that no one system becomes overwhelmed and unavailable
  3. Run regular quality control tests to help identify availability issues before they cause disruptions
38
Q

What is a botnet?

A

A network of multiple distributed systems that a cybercriminal hijacks using malware and operates via remote control