SDD Flashcards

1
Q

What are the different stages in the iterative design method

A

A dance in the dark every Monday
Analysis
Design
Implementation
Testing
Documentation
Evaluation
Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evaluation: What does a ROBUST program have

A

A Robust programme deals with incorrect inputs and or variable types and should cope with this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Evaluation: what should reliable code have

A

Software is reliable if it always produces the expected result. IT should not stop due to design faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Evaluation: what should a Correct program have

A

the program should meet the requirements of the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evaluation: what should a readable program have

A

The program is easily understood by another programmer. eg: white spaces, internal commentary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Evaluation: Portable

A

The program can be easily adapted to run on a different operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evaluation: Maintainable

A

The program is easily changed and adapted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evaluation: Efficient

A

The program should run without using excessive system resources. e.g. Processor time, Ram, hard disk space or bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between Iterative and Agile methodologies in reference to Client Interaction

A

Iterative: Involved during analysis and end of project only
Agile: Regularly involved and consulted throughout project. Provides feedback at every stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between Iterative and Agile methodologies in reference to Teamwork

A

Iterative: Independent specialist teams work in isolation on each phase of the project.
Agile: Teams consisting of a range of specialists collaborate and communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between Iterative and Agile methodologies in reference to Documentation.

A

Iterative: Comprehensive documentation produced throughout the project
Agile: Concise documentation kept to a minimum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between Iterative and Agile methodologies in reference to Adaptive vs predictive.

A

Predictive methodology (Iterative) - the analysis phase used to predict the development pathway.
Adaptive methodology (Agile) - allows for ongoing changes to be made as the project requires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to set up the record Cars with license plate, manufacturer and colour columns.

A

RECORD Car IS
{STRING license plate, STRING manufacturer, STRING colour}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference between Iterative and Agile methodologies in reference to Testing

A

Iterative: Testing is carried out when the implementation phase of the project is complete.
Agile: Testing is carried out when the implementation phase of the project is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the predefined function ORD do

A

changes character to ASCII
e.g. A -> 65

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to set up an array of records called allcars for 100 spaces in relation to the record Cars

A

DIM allcars(100) as Cars

15
Q

What does the predefined function CHR do

A

changes ASCII to character
e.g. 65 -> A

16
Q

How to read an array from a file

A

OPEN filename
FOR counter FROM 1 to 10 DO
RECEIVE array(counter) From filename
END FOR
CLOSE filename

17
Q

How to write an array to a file

A

OPEN filename
FOR counter FROM 1 to 10 DO
SEND array(counter) to filename
END FOR
CLOSE filename

18
Q

What does Systemic testing mean

A

Systemic testing is where tests are done in a way which is planned and which can be documented as a result.

19
Q

What does Comprehensive testing mean

A

Comprehensive testing is when every aspect of the software is tested.

20
Q

How to word an end user requirement answer

A

The end user would like to see…

21
Q

How to word a Functional Requirement answer

A

The database must have a query to…

22
Q

What is a primary key?

A

A primary key is a field in a table that contains a piece of data that is unique for every record.

23
What is a foreign key?
A foreign key is a field in a table that is the primary key of another table. It is used with the primary key to link the tables together.
24
What is a compound key?
A compound key combines two or more attributes to identify each entity occurrence. In a relational database, a compound key is a primary key that comprises of two or more foreign keys from another table.
25
How to calculate the range of values
2 to the power of bits divided by 2 for negative divided by 2 and minus 1 for positive.
26
When moving a real number forward in decimals, the exponent is
negative
27
2 advantages of a bitmap graphics are
You can edit individual pixels Produces more realistic photographic images
28
2 disadvantages of a bitmap graphic are
File sizes are larger as the content of every pixel has to be stored, even blank ones. Scaling- the photo loses quality as it gets bigger.
29
2 advantages of a vector graph
File size is smaller than bitmap Scaling is independent meaning you can scale images without blurring
30
2 disadvantages of a vector graph
You can't edit individual pixels in the image. Difficult to create photo-realistic images as it only uses shapes.
31
Fetch execute cycle: read
The address bus stores/carries/holds the address of the memory location of the data (currently being read from) The readline is activated on the control bus The databus transfers data to the processor/register The instruction is decoded and executed
32
Fetch execute cycle: write
The address stores/carries/holds the address of the memory location of the data (currently being written to) The write line is activated on the control bus The required data is placed on the Data bus The Databus transfers data to Memory Location
33
Computer misuse act (3 points)
Unauthorised access to computer material Unauthorised access with intent to commit further offence Unauthorised modification of computer material
34
What's the definition of a symmetric key
encryption used the same key to encrypt and to decrypt code
35
What's the definition of a public key
The sender uses one key to encrypt
36
What's the definition of a private key
The receiver decrypts the data
37
What are advantages of modular code (2)
Each part of the solution can be tested independently Limits accessibility of local variables