SDD Flashcards

1
Q

What are the different stages in the iterative design method

A

A dance in the dark every Monday
Analysis
Design
Implementation
Testing
Documentation
Evaluation
Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evaluation: What does a ROBUST program have

A

A Robust programme deals with incorrect inputs and or variable types and should cope with this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Evaluation: what should reliable code have

A

Software is reliable if it always produces the expected result. IT should not stop due to design faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Evaluation: what should a Correct program have

A

the program should meet the requirements of the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evaluation: what should a readable program have

A

The program is easily understood by another programmer. eg: white spaces, internal commentary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Evaluation: Portable

A

The program can be easily adapted to run on a different operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evaluation: Maintainable

A

The program is easily changed and adapted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evaluation: Efficient

A

The program should run without using excessive system resources. e.g. Processor time, Ram, hard disk space or bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between Iterative and Agile methodologies in reference to Client Interaction

A

Iterative: Involved during analysis and end of project only
Agile: Regularly involved and consulted throughout project. Provides feedback at every stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between Iterative and Agile methodologies in reference to Teamwork

A

Iterative: Independent specialist teams work in isolation on each phase of the project.
Agile: Teams consisting of a range of specialists collaborate and communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between Iterative and Agile methodologies in reference to Documentation.

A

Iterative: Comprehensive documentation produced throughout the project
Agile: Concise documentation kept to a minimum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between Iterative and Agile methodologies in reference to Adaptive vs predictive.

A

Predictive methodology (Iterative) - the analysis phase used to predict the development pathway.
Adaptive methodology (Agile) - allows for ongoing changes to be made as the project requires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to set up the record Cars with license plate, manufacturer and colour columns.

A

RECORD Car IS
{STRING license plate, STRING manufacturer, STRING colour}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference between Iterative and Agile methodologies in reference to Testing

A

Iterative: Testing is carried out when the implementation phase of the project is complete.
Agile: Testing is carried out when the implementation phase of the project is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the predefined function ORD do

A

changes character to ASCII
e.g. A -> 65

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to set up an array of records called allcars for 100 spaces in relation to the record Cars

A

DIM allcars(100) as Cars

15
Q

What does the predefined function CHR do

A

changes ASCII to character
e.g. 65 -> A

16
Q

How to read an array from a file

A

OPEN filename
FOR counter FROM 1 to 10 DO
RECEIVE array(counter) From filename
END FOR
CLOSE filename

17
Q

How to write an array to a file

A

OPEN filename
FOR counter FROM 1 to 10 DO
SEND array(counter) to filename
END FOR
CLOSE filename

18
Q

What does Systemic testing mean

A

Systemic testing is where tests are done in a way which is planned and which can be documented as a result.

19
Q

What does Comprehensive testing mean

A

Comprehensive testing is when every aspect of the software is tested.

20
Q

How to word an end user requirement answer

A

The end user would like to see…

21
Q

How to word a Functional Requirement answer

A

The database must have a query to…

22
Q

What is a primary key?

A

A primary key is a field in a table that contains a piece of data that is unique for every record.

23
Q

What is a foreign key?

A

A foreign key is a field in a table that is the primary key of another table. It is used with the primary key to link the tables together.

24
Q

What is a compound key?

A

A compound key combines two or more attributes to identify each entity occurrence. In a relational database, a compound key is a primary key that comprises of two or more foreign keys from another table.

25
Q

How to calculate the range of values

A

2 to the power of bits
divided by 2 for negative
divided by 2 and minus 1 for positive.

26
Q

When moving a real number forward in decimals, the exponent is

A

negative

27
Q

2 advantages of a bitmap graphics are

A

You can edit individual pixels
Produces more realistic photographic images

28
Q

2 disadvantages of a bitmap graphic are

A

File sizes are larger as the content of every pixel has to be stored, even blank ones.
Scaling- the photo loses quality as it gets bigger.

29
Q

2 advantages of a vector graph

A

File size is smaller than bitmap
Scaling is independent meaning you can scale images without blurring

30
Q

2 disadvantages of a vector graph

A

You can’t edit individual pixels in the image.
Difficult to create photo-realistic images as it only uses shapes.

31
Q

Fetch execute cycle: read

A

The address bus stores/carries/holds the address of the memory location of the data (currently being read from)

The readline is activated on the control bus

The databus transfers data to the processor/register

The instruction is decoded and executed

32
Q

Fetch execute cycle: write

A

The address stores/carries/holds the address of the memory location of the data (currently being written to)

The write line is activated on the control bus

The required data is placed on the Data bus

The Databus transfers data to Memory Location

33
Q

Computer misuse act (3 points)

A

Unauthorised access to computer material

Unauthorised access with intent to commit further offence

Unauthorised modification of computer material

34
Q

What’s the definition of a symmetric key

A

encryption used the same key to encrypt and to decrypt code

35
Q

What’s the definition of a public key

A

The sender uses one key to encrypt

36
Q

What’s the definition of a private key

A

The receiver decrypts the data

37
Q

What are advantages of modular code (2)

A

Each part of the solution can be tested independently
Limits accessibility of local variables