Not Categorised Glossary Flashcards

These cards are a copy of the glossary provided by TM354. Except where definitions are 'see x', these cards have been omitted.

1
Q

Application Controller Pattern

A

A design pattern which addresses the concerns in the interaction between actors and a system, when the interaction takes place through user interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Boundary-Condition Testing

A

Unit testing in which test data are chosen to check that methods perform correctly at the extremities of input ranges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Class Method

A

A method defining how a class responds to a message, rather than how instances of the class respond to messages. (See also instance method.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Class Variable

A

In Java, a data field declared as static. (See also instance variable.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Component Architecture

A

An architecture specified in terms of components and the connections between them. It can be specialised by selecting appropriate versions of each component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration Respository

A

A library of configuration items managed by the configuration management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuration Version

A

A consistent collection of versions of configuration items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control-Structure Testing

A

Unit testing in which test data is chosen to check that algorithms are coded correctly and to execute each statement in the code at least once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Copyright Law

A

The automatic legal protection afforded to an individual or organisation that publishes the expression of an idea, including software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Critical Path

A

A series of activities in a PERT chart which have no slack and therefore must be completed on time to ensure that the project is not late.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Lock-In

A

The fact that each cloud service presents users with what is in effect a unique interface, making it difficult for a user to move their data and software from one cloud provider to another, as well as presenting problems in integrating with other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain-Specific Knowledge

A

A necessary but not sufficient element of competence made up of knowledge specifically concerned with the particular task or type of application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethical Decision

A

A decision which may result in a living thing, including its environment, being adversely affected – emotionally, practically or morally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethical Decision Making

A

Choosing between behaviour that is morally ‘right’ and that which is morally ‘wrong’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Forward Engineering

A

The process, usually automated or semi-automated in a CASE tool, for producing programming language source code from a model. If the code is automatically generated it usually requires additional human input before it is complete and can be machine compiled or interpreted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Freeware

A

A piece of software that is given away free to users, although the copyright remains with the originator and the original software cannot be distributed by anyone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Freezing

A

A stage in change control where any further changes to a baseline are forbidden, which means disabling further check in operations for the items in the corresponding configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Gantt Chart

A

A project management chart named after its originator, the American management consultant Henry Laurence Gantt, in which the horizontal direction represents time and the vertical direction represents activities, and which can be set out as a table, whose rows show when the work takes place, or as a bar chart, whose horizontal bars show when the work takes place. Gantt charts emphasise the times at which things happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Generic Collection

A

In Java, collection types can be parameterised by the type of the objects they contain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hacking

A

In the popular media, the term is synonymous with computer misuse. In the computing community, a hacker is one who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorising about programming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hardware Independence

A

The degree to which the software is decoupled from the hardware on which it operates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hybrid Cloud

A

A cloud offered by an organisation that combines a private cloud with externally provided cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Instance Method

A

A method that describes how a particular operation is carried out by every instance of a class. It contains the code that determines how every instance of a class responds to a particular message. (See also class method.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Instumentation

A

The degree to which the system monitors its own operation and identifies errors that occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Law of Patents

A

The law that relates to the protection of inventions.

26
Q

Legal Contract

A

A legal contract sets out the parameters of an agreement in a legally binding way. Breaking such a contract can result in legal action being taken.

27
Q

Loop Testing

A

A white box testing technique that is used to test loop constructs to ensure they execute the right number of times.

28
Q

Mailbox Semantics

A

A way of getting two active objects to communicate. The sender sends a message and then carries on processing, regardless of what the receiver is doing. The receiver, working at its own speed, can then read waiting messages and process them.

29
Q

Major Defect

A

A defect which, if not corrected, would either cause a malfunction or prevent the attainment of a required result.

30
Q

Message Driven Beans

A

EJB beans that support asynchronous processing through message passing.

31
Q

Milestone

A

In project management, the points where key deliverables are completed, reviewed and then frozen.

32
Q

Minor Defect

A

A defect which, if not corrected, would neither cause a malfunction nor prevent the attainment of a required result.

33
Q

Morality

A

The degree of conformity to a set of principles that determine ‘rightness’.

34
Q

Observer Pattern

A

A design pattern that addresses the issue of supporting dependencies between objects, whilst keeping coupling low.

35
Q

Open-Source Software

A

Similar to freeware, except that it is maintained and upgraded openly by a community of expert users; code can be modified.

36
Q

Operability

A

The ease of operation of a program.

37
Q

PERT Chart

A

A project management chart in which PERT stands for Project (or Program) Evaluation and Review Technique. It shows the activities as boxes with lines joining them to indicate the interdependencies and the flow of critical information. PERT charts emphasise interdependencies and allow critical pathanalysis.

38
Q

Predefined Type

A

A data type that is provided by a programming or a modelling language and available to the developer. Examples are data types for numbers, strings and collections.

39
Q

Preferred Version

A

In configuration management, the default version which is checked out, usually the latest.

40
Q

Private Cloud

A

A cloud that belongs to a particular organisation, usually one large enough to generate economies of scale internally.

41
Q

Process-Related Human Factors

A

Factors affecting the performance of a software engineer which arise either from the characteristics and skills of the engineer or are external influences that have an impact on how effectively they can apply themselves to the task. They include person-related human factors, task-related human factors, and environment-related human factors.

42
Q

Product-Related Human Factors

A

The human factors involved in the people–technology relationship.

43
Q

Public Cloud

A

A cloud such as Amazon EC2 or Google App Engine which is available to anyone willing to purchase the service.

44
Q

Public-Domain Software

A

Similar to freeware except that the originator has signed away the copyright. This means that users can modify the software, redistribute it or incorporate it into their own work.

45
Q

QMS

A

Quality Management System

An organisation-wide mechanism for building quality into projects and for managing the quality control process. Consists of the managerial structure, responsibilities, capabilities and resources that ensure that software products developed by projects will have the qualities desired by both the customer and the developer.

46
Q

Quality Manual

A

A document containing quality standards, guidelines and procedures.

47
Q

Quality Plan

A

A document specifying the quality controls for a project.

48
Q

Rendezvous Semantics

A

A way of getting two active objects to communicate. The sender indicates a desire to talk and the receiver indicates a desire to listen. Whichever of these happens first causes that thread to block until the other has happened, at which point communication takes place.

49
Q

Resource Balancing/Levelling

A

The process of juggling the assignment of resources to activities over time so that each resource is used at its capacity, and each activity receives the resources that it needs.

50
Q

Reverse Engineering

A

The process, usually automated or semi-automated in a CASE tool, for deriving a model from source code alone.

51
Q

Robustness

A

The degree of immunity from damage when a program encounters an error. Also referred to as error tolerance.

52
Q

Self-Documentation

A

The degree to which the source code of a program provides meaningful documentation.

53
Q

SLA

A

Service Level Agreement

A statement of the assume-guarantee contract of the cloud service.

54
Q

Service Registry

A

Allows a consumer to find a service.

55
Q

Session Beans

A

A session bean represents a single client inside the application server. To access an application that is deployed on the server, the client invokes the session bean’s methods. The session bean performs work for its client, shielding the client from complexity by executing business tasks inside the server.

56
Q

Shareware

A

Software that is intended to be trialled for a limited period (often 30 days). Users are expected to register and pay any appropriate fee after this time has elapsed.

57
Q

System Independence

A

The degree to which a system is independent of non-standard programming language features, operating system characteristics, and other environmental constraints.

58
Q

System Size

A

A method for estimating the time to complete a software project based on the number of functions, the amount of data and the number of users. At completion of the project, it can be measured by the number of lines of code (LOC or KLOC) and the volume of data.

59
Q

Test Harness

A

Software added to a system to facilitate testing.

60
Q

Test Stub

A

A testing tool providing very simple pieces of code which stand in for the called method. A test stub will implement the same signature as the called method, but provide none of its functionality, printing only verification messages for the data sent to it and returning to the caller with the ‘expected’ value.