Incorrect Exam Questions Flashcards
Why should you write algorithms before writing code?
They help avoid problems/errors in logic early, and also allow the scope of the task to be determined
What goes at the start and end of pseudocode?
START, STOP
Which search algorithm is the best option for unsorted lists?
Linear search, as binary search requires the data to be sorted FIRST.
What is cross-site scripting?
When a web application inputs malicious script to the user’s web browser
What are some procedures to manage data and files?
1) Regular backups
2) Naming conventions of files/folders
3) Regular archiving
What is the disposal of files?
data is deleted PERMANENTLY (even copies)
What is the purpose of naming conventions?
They aid the programmer by providing consistency in the naming of variables
in software solutions.
They also aid those who are reading the
program, providing them with better understanding, later on.
What is the difference between a function and a procedure?
A function usually returns a value whereas a procedure does not
Purpose of the SRS
To document the needs of the stakeholders and to indicate how the system is expected to perform
How is archiving used to manage data?
Archiving reduces the amount of data that is kept in active storage. This is done by moving data off of active storage and onto another system such as tape storage.
What impact will a delay of a task have on a Gantt chart project’s timeline if it isn’t on the critical path?
No impact at all
What are the advantages of the Agile model?
1) Clients are more included in the process
2) Allows adaptive design
3) Produces early visible results
What are 2 reasons for collecting feedback on the user experience from different types of customers?
1) Better view of the user experience when gathered from a multitude of demographics
2) Better for finding holes/errors in the code, as more parts of the solution can be tested thoroughly
When asked to JUSTIFY your choice between some options, how should you answer the question?
1) Clearly outline which option
2) Why? -> List the advantages
3) List at least ONE LIMITATION of the alternatives
What file type is a better option when transferring data?
XML, as it is extensible in its structure
What is a Man-in-the-middle attack?
Gaining access to a user’s data by inserting themselves in the middle of the communication that the user is having with the information system they are connected with (EAVESDROPPING)
Why can selection sort be preferred over quick sort sometimes?
As selection sort is easier to program than a quick sort, and works best with SMALL amounts of data
What are some software security controls?
1) Encryption
2) Firewalls
3) Anti-virus protection
4) User authentication -> passwords
What are some risk management strategies?
1) Software auditing
2) Version control
3) Compliance checking in relation to the use of 3rd party sofware
What is affordance?
What a user can do with an object based off their capabilities, or an attribute of an object that allow people to know how to use it
Which development model is best suited to projects involving changing scope, requirements, and few dependencies
Spiral
What does it mean if tasks are on the critical path?
Critical path is the longest time between start and finish
Difference between a Method and an Event?
A method is a function within a class which can be called anytime, whereas an Event is a detected change of state, such as a user pressing enter
What does «includes» & «excludes» mean
Includes means that the first process always activates (includes) the second process
Extends means that the second process can be optionally activated by the first process (conditional)
What data structure is most suitable to store multiple pieces of information?
Records
Are archives stored in a short term or long term storage
Long term storage, compressed to preserve storage space
If a user is in breach of the privacy act for keeping client sensitive information open on a wireless network without a password, which principle is involved?
All personal information gathered from clients must be secured from any unauthorised access, use or disclosure
What is the order of the 3 validation techniques?
1) Existence
2) Type
3) Range
What is internal documentation?
Describes key variables and procedures within a program, that assist with the variety of users of the program, or future programmers in understanding the code